Through sophisticated honeypots that lure attackers into realistic IT environments, Microsoft aims to gather intelligence on phishing attempts and disrupt malicious activities.
Experts have recreated complete Microsoft customer environments, including Azure access and user accounts, to lure hackers, allowing them to map and understand the tactics behind advanced phishing campaigns.
The tactics for deploying honeypots have evolved; rather than waiting for hackers, Microsoft security experts proactively enter known phishing sites, using fake credentials to attract and slow down attackers.
Monitoring around 25,000 phishing sites daily, Microsoft utilizes active honeypot strategies, finding that roughly 5 percent of hackers attempt to use the fake login credentials provided.
Collection
[
|
...
]