Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Security Cloud Microsoft

Microsoft's Honeypots Lure Phishers at Scale - to Spy on Them and Waste Their Time (bleepingcomputer.com) 14

A principal security software engineer at Microsoft described how they use their Azure cloud platform "to hunt phishers at scale," in a talk at the information security conference BSides Exeter.

Calling himself Microsoft's "Head of Deception." Ross Bevington described how they'd created a "hybrid high interaction honeypot" on the now retired code.microsoft.com "to collect threat intelligence on actors ranging from both less skilled cybercriminals to nation state groups targeting Microsoft infrastructure," according to a report by BleepingComputer: With the collected data, Microsoft can map malicious infrastructure, gain a deeper understanding of sophisticated phishing operations, disrupt campaigns at scale, identify cybercriminals, and significantly slow down their activity... Bevington and his team fight phishing by leveraging deception techniques using entire Microsoft tenant environments as honeypots with custom domain names, thousands of user accounts, and activity like internal communications and file-sharing...

In his BSides Exeter presentation, the researcher says that the active approach consists in visiting active phishing sites identified by Defender and typing in the credentials from the honeypot tenants. Since the credentials are not protected by two-factor authentication and the tenants are populated with realistic-looking information, attackers have an easy way in and start wasting time looking for signs of a trap. Microsoft says it monitors roughly 25,000 phishing sites every day, feeding about 20% of them with the honeypot credentials; the rest are blocked by CAPTCHA or other anti-bot mechanisms.

Once the attackers log into the fake tenants, which happens in 5% of the cases, it turns on detailed logging to track every action they take, thus learning the threat actors' tactics, techniques, and procedures. Intelligence collected includes IP addresses, browsers, location, behavioral patterns, whether they use VPNs or VPSs, and what phishing kits they rely on... The deception technology currently wastes an attacker 30 days before they realize they breached a fake environment. All along, Microsoft collects actionable data that can be used by other security teams to create more complex profiles and better defenses.

Microsoft's Honeypots Lure Phishers at Scale - to Spy on Them and Waste Their Time

Comments Filter:
  • to Spy on Them and Waste Their Time

    Microsoft must think I'm a phisher. Holy shit . . . am I actually one and never realized it?

  • Hmm, This seems like the sort of thing that would be standard practice for any company of their size. Microsoft, are you just trying to put out PR that makes it look like you care about security after the whole CrowdStrike debacle and the State Department email hack?
    • by gweihir ( 88907 )

      It has been standard practice for at least a decade. It has been done for something like 40 years. Seems like Microsoft is late to the game. As usual.

      As to their recent hilariously bad screw-ups, add the losing of security audit logs.

  • by dicobalt ( 1536225 ) on Sunday October 20, 2024 @07:38PM (#64879931)
    there's some hilarious people out there who talk to phone tech support scammers and jerk them around by playing a goofy character. By the time theyre done the scammer is begging them to stop calling. Hoax Hotel is one of the bigger channels that does this.
  • by 93 Escort Wagon ( 326346 ) on Sunday October 20, 2024 @07:39PM (#64879939)

    They do have a lot of expertise when it comes to filling up people's time with non-productive activities (broken Windows activation, viruses, etc.).

  • by jenningsthecat ( 1525947 ) on Sunday October 20, 2024 @08:16PM (#64880005)

    "Head of Deception" indeed. Microsoft has spent many years deceiving and spying on their users. At last they're putting the skills they've acquired to good use by going after actual criminals. Too bad they probably won't stop abusing their customers though.

  • I thought Cloudflare already had cornered the market on this with endless, useless CAPTCHA shit whenever I use a VPN, wasting everyone's time and breaking everything under the sun.

Your own mileage may vary.

Working...