The use of deception in network and system compromise is a way to get an early alert for when your defenses fail.

Boom. That’s it. Once the file is opened, it will send an automated email to the account you entered in step 3. If you want to tweak the document and add fake usernames and pass, have at it.

Additional types of Canarytokens include tokens for alerts…