Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 483

Honeyfile

What is Honeyfile?

HoneyfileA decoy document planted in storage to trigger an alert if an attacker or insider reads, copies, or exfiltrates it.


A honeyfile is a fake but believable document — for example a file named passwords.xlsx, contracts-2026.docx, or aws-keys.txt — placed in directories where curious attackers or rogue insiders are likely to browse. The file contains no real value but is instrumented so that any access generates an immediate, high-fidelity alert. Honeyfiles are cheap, generate very few false positives, and are effective for detecting lateral movement, ransomware reconnaissance, and data theft. They are typically deployed on file shares, endpoints, and cloud storage buckets alongside endpoint detection and data-loss prevention tools as part of a broader deception strategy.

Examples

  1. 01

    A fake passwords.xlsx on a shared drive that pages the SOC when opened.

  2. 02

    A canary AWS credentials file that fires when used against the IAM API.

Frequently asked questions

What is Honeyfile?

A decoy document planted in storage to trigger an alert if an attacker or insider reads, copies, or exfiltrates it. It belongs to the Defense & Operations category of cybersecurity.

What does Honeyfile mean?

A decoy document planted in storage to trigger an alert if an attacker or insider reads, copies, or exfiltrates it.

How does Honeyfile work?

A honeyfile is a fake but believable document — for example a file named passwords.xlsx, contracts-2026.docx, or aws-keys.txt — placed in directories where curious attackers or rogue insiders are likely to browse. The file contains no real value but is instrumented so that any access generates an immediate, high-fidelity alert. Honeyfiles are cheap, generate very few false positives, and are effective for detecting lateral movement, ransomware reconnaissance, and data theft. They are typically deployed on file shares, endpoints, and cloud storage buckets alongside endpoint detection and data-loss prevention tools as part of a broader deception strategy.

How do you defend against Honeyfile?

Defences for Honeyfile typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for Honeyfile?

Common alternative names include: Decoy file, Canary file.

Related terms