LMNTRIX Deceive is an advanced deception-based detection engine built into the LMNTRIX XDR platform. Instead of waiting for signature matches or behavioural anomalies, Deceive lays interactive traps and lures across your infrastructure—tricking adversaries into revealing themselves before they can cause harm.
By mimicking high-value assets like credentials, servers, shares, and cloud services, Deceive turns your network into a minefield for attackers. Every interaction with a deception artifact generates a high-confidence alert, empowering LMNTRIX analysts to rapidly investigate, contain, and respond — while the attacker is still in the early stages of the kill chain.
Signature-based tools miss unknown threats
Behavioural analytics suffer false positives
Passive detection reacts too late — after compromise
LMNTRIX Deceive flips the script — proactively engaging attackers during reconnaissance, credential harvesting, and lateral movement.
Attack Phase | Detection Technique |
---|---|
Reconnaissance | Fake AD objects, decoy file shares, lures |
Credential Theft | Planted fake credentials in memory & cache |
Lateral Movement | Interactions with decoy hosts, fake RDP/SSH |
Insider Threats | User access to deceptive content or shares |
Malware/C2 | Command-and-control triggers via decoy systems |
Cloud Abuse | Fake S3 buckets and cloud service decoys |
Deceive is natively integrated into the LMNTRIX XDR platform, allowing:
Every interaction is validated by the LMNTRIX SOC
Remote containment actions initiated when needed
“Deception is immune to false positives because attackers must make the first move.”
– Carlo Minassian – Founder & CEO – LMNTRIX.
Unlike anomaly-based tools, LMNTRIX Deceive relies on attacker engagement. If an adversary touches a decoy, it’s a genuine threat. This results in ultra-high fidelity alerts, virtually eliminating alert fatigue for your SOC or our analysts.
Automated rollout across endpoints, servers, and cloud
Zero user impact — fully passive and invisible
Supports hybrid, cloud, and air-gapped networks
Licensed per endpoint for predictable scaling
No jargon. Just straight answers on LMNTRIX Deceptions.
LMNTRIX Deceive is a subscription feature of LMNTRIX XDR and an integral part of our Active Defense architecture. Our approach weaves a deceptive layer over your entire network – every endpoint, server and network component is coated with deceptions. The moment an attacker penetrates your network, they are in an illusive world where all the data is unreliable. If attackers cannot collect reliable data, they cannot make decisions. And if they cannot make decisions, the attack is paralysed. This approach provides the following benefits:
The intent of the service is to address insider threats and advanced human adversaries that are now on your network moving laterally stealing data and actively working to elevate their privileges. Existing solutions such as SIEM, IPS, EDR, Sandboxes, NextGen Firewalls, Web and Email Gateways are defenseless against this threat vector. By deploying deceptions everywhere, we are able to address this difficult threat vector.
LMNTRIX Deceive changes the asymmetry of cyber warfare, by focusing on the weakest link in a targeted attack – the human team behind it. Targeted attacks are orchestrated by human teams. And humans are always vulnerable. Advanced attackers rely on one simple fact – that what they see is real and that the data they collect is reliable. Firewall, Anti-virus, EDR, Sandbox, IDS, and intelligence feed technologies generate so much data that the signal is lost.
Attackers prowling a target network look for juicy content. They browse Active Directory for file servers and explore file shares looking for documents, try default passwords against network devices and web services, and scan for open services across the network.
LMNTRIX Deceive is a cloud-based service running off the LMNTRIX XDR where deceptions are deployed from, alerts reviewed, notifications configured and devices managed from.
LMNTRIX Deceive incorporates 4 types of deceptions. These are Decoys, Breadcrumbs, Tags, and Personas. Each is designed to address a different insider threat and human adversary threat type and together they form a powerful defense.
Decoys are appliances that can represent one or more servers/services. These include operating systems, file servers, web servers, routers, switches, file shares with files, applications (NAS, FTP, SSH, etc). Decoys are available in appliance, VM or docker formats.
They are pre-configured and shipped to Customer’s to deploy on their networks. We recommend one per segment and one per 100 endpoints where budget permits. Each decoy communicates with the LMNTRIX Cloud for management and alerting.
Each Decoy is configured to match your existing network segment profile. For example, if you have a segment of Windows 7 desktops then we would deploy a Windows 7 Decoy amongst your existing fleet.
The deception capability offered by Decoys is to detect less sophisticated external adversaries and insider threats that are randomly conducting network reconnaissance and trying to gain access to customer’s network and data.
Whenever a Decoy is accessed (such as a network scan, ssh, ftp, file access, share access), an alert is captured by the LMNTRIX XDR and an incident created and investigated by the LMNTRIX CDC. Legitimate company employees should never have any reason to access a Decoy, as such every alert generated by a Decoy is treated as a high severity alert by the LMNTRIX CDC.
What services are supported by Decoys?
Each Decoy ships with 10 or more different types of detection modules. The Customer is responsible for selecting one or more detection modules within the Service Starter pack.
LMNTRIX Mobile protects users and their devices from many types of threats. These threats are broadly categorized into Network, Device and Malware threats.
When an attacker gains access to the database and attempts to click on a file he will be prompted to put in the password for the file and the alert gets triggered.
Typically, on the top 5 list of adversary (APT or nation state) and red team techniques used once a point of breach is achieved is the enumeration of the Active Directory Radius service. The AD Decoy is a service that runs on each client AD server and alerts LMNTRIX when such activity takes place.
How does the AD Decoy work?
The AD Decoy queries the event viewer to find the logon events for normal users and Kerberos users for event IDs and shows the alerts on the LMNTRIX XDR for monitoring and response by the CDC
How is the AD Decoy deployed?
The AD Decoy deployment process is made up of the following 3 steps.
Please find the install/uninstall steps for this service enable in Windows AD Servers.
Pre-requisites: .Net Framework 4.0 or higher
AD server version: windows server 2012 and later.
Steps for installation :
InstallSvc.cmd i (Refer below image)
Once the installation is completed. “Check Events” windows service automatically starts and queries the logon events from the Event Viewer (Security Log). In the config file debug value is set to True so this service will generate the log file in the service installed folder. Debug file name format : debug_DDMMYYYY.log
Steps for Uninstallation :
InstallSvc.cmd u (Refer below image)
What information is captured when an AD Decoy alert is triggered?
Any enumeration of Radius or login activity related to the fake users or SPN users generates a deception threat alert on the XDR with the details below.
The LMNTRIX CDC will not alert you on every alert triggered by a Decoy. Instead, we aggregate related events to form a single incident. For example, if an attacker launches a brute-force attempt against your FTP server, you want to receive a single alert about the attack, not one per username tried.
Incidents are defined as duplicated events from the same source against the same target service within a period.
The LMNTRIX XDR records every single event generated by decoys and made available for forensic investigations irrespective of the amount of detail reported in an incident record.
A Breadcrumb refers to a small, subtle piece of false information or data that is intentionally placed within a system to lure or mislead attackers. These Breadcrumbs are part of our broader deception strategy designed to divert attackers towards a Decoy system (a honeypot) or to provide misleading intelligence.
For example, Breadcrumbs can be fake credentials, misleading file names, or false configurations that lead attackers to believe they are accessing valuable resources. When an attacker interacts with a Breadcrumb, it triggers monitoring and alerts defenders, giving them insights into the attacker’s tactics, techniques, and procedures (TTPs).
The goal is to increase the complexity of the attacker’s task while gathering intelligence without risking actual assets. This technique is often used to complement more traditional security measures, adding a layer of misdirection to protect sensitive information and infrastructure.
Breadcrumbs are deployed across all Customer endpoints (servers and desktops). Each endpoint is populated with multiple interesting breadcrumbs to increase the chances of fooling attackers. Once an attacker takes a bait (breadcrumb) and tries to communicate with a breadcrumb, they are directed to the LMNTRIX XDR where they are monitored by our intrusion analysts as they communicate with our Decoy platform as we record all their actions.
Breadcrumbs rely on the integration of LMNTRIX XDR with Customer’s Active Directory for breadcrumb deployment. There are no agents or software deployed on endpoint, only interesting breadcrumbs, such as fake Admin accounts, saved Usernames/Password, and web browsing history. The breadcrumb deployment process takes less than 300 milliseconds and for windows machines which are a part of Active directory, we use legitimate API calls for breadcrumb deployment and for Linux machines which are not integrated with Active directory, we use SSH to deploy deceptions on those machines.
The process is repeated once a month to ensure breadcrumb persistence.
During an advanced attack, an attacker gains access to an endpoint without knowing where that endpoint sits in the network structure. The attacker employs a range of tools to iteratively discover the network hierarchy from that endpoint. The collected information is analyzed to plan access attempts to lateral network locations. The goal of the attack is to locate sensitive information such as confidential company data.
The agentless solution offered by LMNTRIX presents attackers with a deceptive network view, exploiting the attacker’s belief that all received data is valid. Limitless enticing deceptions detect and divert an attack, immediately gathering information about the attacker’s ongoing activity when access is attempted, without the attacker’s awareness. Superior technology, real-time source-based forensics, and intimate knowledge of cyber-attacker psychology ensures visibility of attacks and returns information-control to the network administrators.
The following are the 3 phases on how breadcrumbs work:
Once our Breadcrumbs are deployed, they have minimal impact on your network, applications and users. The following provides the impact of breadcrumbs on your end-users, IT and attackers:
Following is a list of Breadcrumbs that LMNTRIX takes advantage of. There are 11 categories in total and each one generates an alert to our CDC when tripped.
This is a highly interactive service running on the breadcrumb server and this produces 2 alerts.
The first alert is sent when someone accesses the webpage
The demo can be shown by trying to interact with the ports 3306(Mysql) and 1433(Mssql) using python.
The session is highly interactive and from the screenshot above, it clearly shows that all the commands that’s a part of the FTP protocol family.
The VNC Breadcrumb produces deceptive information relating to servers which can be accessed to the VNC service. Incident alerts are triggered by attempts to access the breadcrumb server.
On Windows desktops, we recommend the use of the following breadcrumbs:
On Linux Servers, we recommend the use of the following breadcrumbs:
Recommended Breadcrumbs common for both platforms
To access a domain, LMNTRIX requires the details of two different users in your user directory
DIRECTORY USER: LMNTRIX uses the directory user to navigate your user directory
SERVICE USER: LMNTRIX can use the service user to deploy deceptions on network hosts
Note: In each supported AD domain, the Local Admin AD group must be created in the domain Builtin container.
Set the user attribute Account is sensitive and cannot be delegated to TRUE
Tags are unique tags that are embedded in a variety of places such as in documents, emails, Linkedin, bitcoin, images, databases, etc. that nobody should be accessing. They have the same profile and naming conventions as that used by the customer. If anyone accesses them then an alert is sent to the LMNTRIX XDR and for our intrusion analysts to investigate and escalate to the Customer if necessary. Tags can include files or emails within SaaS platforms such as Office365, Dropbox, Google Drive, HipChat, Slack, etc to monitor the vendor engineers accessing Customer files.
The use of Tags as a form of Deception deployed on real assets (workstations and servers) is aimed at detecting attackers both internal and external to the organization that have gained actual access to the Customer assets. Furthermore, Tags is one of the few methods that allows LMNTRIX to get close to confirming attack attribution. Unlike Breadcrumbs that rely on Decoys for alerting, Tags generate alerts independent of Decoys.
Tags are a “quick, painless way to help defenders discover they’ve been breached (by having attackers announce themselves).” To accomplish this, we create tags such as:
When the intruder accesses or makes use of the tag, LMNTRIX will notify you via email and share a few details about the event in the form of an incident.
Web Tags
These are unique URL tags that are triggered whenever someone requests for a URL.
They are deployed in the form of an email subject line in your emails, embedded as a tag in some of your documents and as a tag in the form of a password.html files.
Best Practices:
Here is an example of a Webbug tag that we deploy for our Customer’s and the alert that we receive at the Cyber Defense center.
http://lmntrixtags.us/articles/tags/static/57wv83vsr0gskmwssixedeth7/index.html
DNS Tags
DNS Tags are unique hostnames that gets triggered whenever an attacker performs a lookup on your domain.
Best Practices:
Here is an example of a DNS tag that we deploy for our Customer’s and the alert that we receive at the Cyber Defense center.
j64qemw57le0pf7s688cp547q.lmntrixtags.us
We provide SMTP tags to monitor any attacks on your databases with a unique email address
Best Practices:
We deploy unique QR codes and this is used as a tag on your containers which are left in secure locations.
As soon as the QR code is scanned, the attacker is prompted with a tag link and once he clicks on it, our CDC receives an alert and we would be able to provide our Customer with the location of these containers.
Best Practices:
Here is an alert that our analysts at the CDC receive.
MS Word and Adobe Acrobat Tags
We deploy a tag in the form of a word file or a pdf file in any of the Customer’s servers. As soon as the attacker opens this file for editing, an alert is triggered and our analysts at the CDC start investigating it before the attacker even realizes that he is being monitored.
Best Practices:
Leave these files on a web server in an inaccessible directory, to detect webserver breaches.
Here is an example of MS word tag that we deploy for our Customer’s.
Here is an alert that our analysts at the CDC receive
Here is an example of Adobe Acrobat tag that we deploy for our Customer’s
Here is an alert that our analysts at the CDC receive.
SQL Server Tags on SELECT, UPDATE, INSERT, DELETE
Webservers often draw active content from a datastore that is usually a SQL database, and these are quite hard to protect and harden. Hence why SQL databases are likely to be exploited by SQL injection attacks.
With our SQL tags, alerts are triggered to our CDC when any one of these commands are executed on the SQL database. This adds an additional layer of security to the Customer’s databases. The next step is to copy the SQL snippet and run in your SQL Server database.
Here is an alert that our analysts at the CDC receive.
Best Practices:
Windows Directory Browsing Tags
Our CDC gets notified whenever an attacker opens or browses a Windows directory in Explorer. It works with network shares and doesn’t require any additional software.
Additional interesting file tags are added which you think would be a risk if it falls into the wrong hands.
Best Practices:
Our CDC gets notified whenever an attacker has cloned your webpage.
Place this JavaScript on the page you wish to protect. When an attacker clones your site, they’ll include the JavaScript. When the JavaScript is run, it checks whether the domain is expected. If not, it fires the tag and the CDC will receive an alert.
Here is an example of a Cloned Website tag that we deploy for our Customer’s.
if (document.domain != “example.com”)
{var l = location.href;
var r = document.referrer;
var m = new Image();
m.src = “http://lmntrixtags.us/”+
“8oedbi0nvs408y049i47f3ubo.jpg?l=”+
encodeURI(l) + “&r=” + encodeURI(r);
}
Here is an alert that our analysts at the CDC receive
Best Practices
Our CDC gets notified whenever an attacker clones the SVN repo. Don’t forget to run “svn commit “after you’ve added the tag.
Here is an example of a SVN tag that we deploy for our Customer’s.
svn propset svn:externals “extras http://wv3c56dkki3yo27e8zhbc7n88.lmntrixtags.us” .
Here is an alert that our analysts at the CDC receive
Our CDC gets notified whenever an attacker uses this credential pair to access AWS programmatically (through the API). The key is hyper unique. i.e. There is 0 chance of somebody having guessed these credentials. If this tag fires, it is a clear indication that this set of keys has “leaked”.
Here is an example of an AWS tag that we deploy for our Customer’s.
[Default]Access key Id: AKIAIQ7YPSXLN3BH2CKQ
Secret Access Key: 0QHPJnXl1dwqUsjrh2voTOLMMLH2V8ft98iFiVoM
Here is an alert that our analysts at the CDC receive
Best Practices
The tag is like the Web tag, however, when the link is loaded the view will be immediately redirected to the specified redirect URL.
Here is an example of an Fast Redirect tag that we deploy for our Customer’s.
http://lmntrixtags.us/articles/feedback/xqmtoyuxa0vs0to66p5fofu6h/post.jsp
Best Practices
The tag is like the Fast Redirect tag, however, when the link is loaded the user’s browser / browser plugin information is captured.
Here is an example of an Slow Redirect tag that we deploy for our Customer’s.
http://lmntrixtags.us/images/uuadczrsng7apwu468df28jf1/submit.aspx
Best Practices
We provide the clients with the geographical location associated with the hosting device. This varies depending on the type of tags that the attacker use.
Personas are unique accounts and profiles created across the Customer systems, applications and social media channels. Whenever contact is made with one of them via email, we know that an adversary has stolen or is targeting the respective data.
LMNTRIX simply guides the Customer through the process of creating Personas. It’s the Customer that creates all of the Personas across their systems as they’re the only one who has access to them.
Following provides examples of identities clients generally deploy:
You must take great amount of effort to ensure that all social media decoys are realistic. For example, the following should be your approach for LinkedIn:
The LMNTRIX Deceive Starter Pack is required to be completed by the customer prior to service establishment.
Note: Please choose a Decoy name such that it suits each Decoy Personality.
Example: The customer can create a web bug http://xyzcompany.com/images/4y26grc4sx168ts7fh9zh84k0/contact.php and point it to http://lmntrixtags.us/images/4y26grc4sx168ts7fh9zh84k0/contact.php in their DNS
Breadcrumbs Remote operation method
By default, Breadcrumbs are deployed on hosts from the LMNTRIX XDR using the Sysinternals Deployment Tool (psexec). If your environment does not support this default configuration, you can select to run the Breadcrumbs setup tool on each host manually or deploy Breadcrumbs using a third-party remote-management tool that requires some configuration on the tool’s server (i.e. SCCM/Tanium/PatchLink/BigFix).
Note: You can select only one deployment method.
Configuring Integrated Operational Methods
The LMNTRIX remote-operation method handles Windows policy deployment and forensics collection.
The below tool can be configured to run LMNTRIX operations via the LMNTRIX’s Cloud.
The Windows Sysinternals Suite is a Microsoft freeware tool that enables host management. For details, see the Sysinternals Utilities Index.
By default, the Sysinternals deployment tool runs LMNTRIX operations
External Operational Method
We can configure policy-deployment to be managed by a third-party tool directly. Windows hosts can be managed via tools such as Microsoft SCCM while Linux hosts can be handled by any external tool, such as Ansible.
Mid-tier financial services firm turns the tables on the hackers and gains context to improve security decision-making while enhancing security protection in every business system
and that means XDR
The choice is yours: see LMNTRIX in an on demand demo or set up a customized demo or request a quote.