The severity of any infection will get multiplied when it employs spreading technique. Ransomware which has been one of the critical threat for quite some time have been able to increase its effect by spreading to the mapped and unmapped drive. In the recent past threat actors have made use of remote code execution (such asB WannCry), harvesting credentials from memory (such asB PetyaB ,Shamoon), harvesting email addresses from the address book to spread inside the network.
Traditional defenses are aimed to detect and stop an attack.B Deception-centric architectureB differs from the traditional architecture; it is not only used to identify an ongoing threat, but also to divert the threat to an engagement platform to gather every malicious indicator of a multistage of attack. Once every malicious indicator of attack is captured then it can be used for many purposes such as to attribute a multi-stage attack to a threat actor, quarantine the infected computers, protect against theB variation of an attack.

In future, we expect to see more and more threats which will be multistage and will make of spreading techniques. Deception centric architecture is a powerful architecture to not only detect an attack but also gather every malicious indicator of an attack. Identification of every malicious indicator of attack will then aid to identify the threat actors, and the IoCb s can be used to quarantine the infected machines.
Download technical white paper here: Spreading Techniques and Deception-based Detection – Acalvio Technical White Paper.
References:
[1] Shamoon,B https://securelist.com/from-shamoon-to-stonedrill/77725/
[2] WannaCry,B https://www.symantec.com/content/dam/symantec/docs/security-center/white-papers/istr-ransomware-2017-en.pdf
[3] Recent Resurgence in Shamoon,https://community.rsa.com/community/products/netwitness/blog/2017/02/08/recent-resurgence-in-shamoon
[4]B New ransomware, old techniques: Petya adds worm capabilities,
https://blogs.technet.microsoft.com/mmpc/2017/06/27/new-ransomware-old-techniques-petya-adds-worm-capabilities/
[5]B Google says the fake Google Doc worm that went viral affected fewer than 0.1% of Gmail users,
http://www.businessinsider.com/google-doc-phishing-worm-affected-fewer-than-01-of-gmail-users-2017-5
