Customer Success: How Mine2 Caught an Insider Stealing Confidential Files
Mine2 Team5 min read

Customer Success: How Mine2 Caught an Insider Stealing Confidential Files

A 450-employee IT services company discovered an insider selling confidential proposals and salary data to competitors. Mine2's honeytokens provided irrefutable proof of theft, enabling legal action and preventing ongoing losses.

Share:

When a mid-sized IT services company in Bangalore discovered their confidential proposals were appearing in competitor pitches, they faced every organization's nightmare: an insider threat they couldn't identify.

The Problem: Data Leaking to Competitors

The company's leadership received alarming news from a partner—a competitor had submitted a proposal to a potential client that was suspiciously similar to their confidential bid. The pricing structure, technical approach, and even specific terminology matched their internal documents almost word-for-word.

Over the following weeks, more red flags emerged:

  • A client mentioned seeing their "upcoming product features" in a competitor's pitch deck
  • Salary information for senior roles appeared on industry forums
  • Proprietary project methodologies showed up in a competitor's marketing material

The evidence was clear: Someone inside the company was leaking sensitive files to the market.

Why Traditional Security Failed

The leadership team faced a critical challenge:

Challenge Why It Failed
Access logs Hundreds of employees accessed shared folders daily—impossible to distinguish legitimate work from theft
Surveillance Installing invasive monitoring would damage trust and potentially violate privacy laws
Legal action Without concrete evidence, they couldn't pursue the culprit

The Solution: Mine2 Cyber Deception

The company engaged Mine2 to deploy a strategic deception approach using honeytoken files—realistic-looking fake documents that would alert security teams when accessed.

Strategic Honeytoken Deployment

Using Mine2Mate, the team deployed honeytokens across 15 file servers and 30 workstations within 48 hours:

Word Document Honeytokens:

  • Q3_2024_Client_Proposals_CONFIDENTIAL.docx — Fake client proposals
  • Executive_Compensation_Package_2024.docx — Fake salary structures
  • Merger_Acquisition_Target_Analysis.docx — Fake M&A documents

Excel Document Honeytokens:

  • Client_Database_Master_2024.xlsx — Fake customer contact lists
  • Product_Pricing_Strategy_Confidential.xlsx — Fake pricing sheets

Binary File Honeytokens:

  • ProjectAlpha_SourceCode_v2.4.zip — Fake source code archive
  • Partnership_Agreement_Draft_NDA.pdf — Fake PDF documents

The files were placed in strategic locations: shared network drives, executive assistant workstations, project management folders, and HR file servers.


The Detection: Catching the Insider

Four weeks after deployment, Mine2 detected suspicious activity.

Week 4: The Alerts Begin

Timeline File Accessed Time Action
Monday Q3_2024_Client_Proposals_CONFIDENTIAL.docx 6:47 PM Opened and copied to USB drive
Wednesday Executive_Compensation_Package_2024.docx 11:34 PM Copied from HR server
Following week Pricing spreadsheet Various Uploaded to personal Gmail
Following week Source code archive Various Copied to external hard drive

All alerts traced back to a single workstation: a senior sales manager with 5 years at the company.

The Investigation

Further investigation revealed a systematic pattern:

  • Network logs: Systematic browsing of folders marked "Confidential" or "Executive Only"
  • USB device logs: Multiple external storage devices connected
  • Email forensics: Encrypted communications with external contacts
  • Financial investigation: Unexplained deposits of ₹8-10 lakhs

Why Honeytokens Provided Irrefutable Proof

Evidence Point Implication
No legitimate business need A sales manager has no reason to access HR compensation files or executive M&A documents
Off-hours access Accessing files at 11:34 PM indicated covert activity
Exfiltration behavior Copying to USB drives and personal email proved intent to steal
Multiple honeytokens triggered Systematic hunting for valuable documents—not accidental access

The Resolution

Confronted with concrete evidence, the employee admitted to selling confidential files to competitors. He had stolen and sold over 40 legitimate files before triggering the honeytokens, earning approximately ₹12-15 lakhs.

Actions Taken:

  • Employment terminated immediately for cause
  • Criminal complaint filed under IT Act 2000 Section 43
  • Civil lawsuit initiated for breach of confidentiality
  • Legal notices sent to competitors who received stolen files

Results at a Glance

Metric Value
Detection Time 35 days from deployment to confirmed insider
Investigation Time 2 days from first alert to identification
False Positives Zero
Prevented Future Loss ₹10+ crore annually
Evidence Quality Sufficient for legal prosecution

Why Honeytokens Worked

The success came down to four factors:

  1. Realistic naming — Files sounded valuable, exactly what a thief would target
  2. Strategic placement — Honeytokens blended naturally with real sensitive files
  3. Multiple file types — Covered all types of documents an insider might steal
  4. Comprehensive tracking — Mine2 tracked opens, copies, USB transfers, and email uploads

Key Lessons Learned

File access logs alone don't prove intent. Hundreds of employees access shared folders daily. Honeytokens prove malicious intent when someone accesses files they have no legitimate reason to touch.

Insiders know how to avoid traditional security. The employee carefully avoided DLP alerts by using USB drives and personal email. Honeytokens caught him anyway because the files themselves were traps.

Deception works because greed is predictable. A file named Executive_Compensation_Package_2024.docx is irresistible to someone selling secrets.

Legal prosecution requires concrete proof. Access logs are circumstantial. Honeytoken interactions are definitive proof of unauthorized access and theft.


Expanded Protection

Following the incident, the company expanded their Mine2 deployment significantly:

Solution Purpose
MineField Fake file servers that trigger alerts on any access
Cloud Mines Decoy AWS S3 buckets and IAM credentials
Fortify Regular scans for exposed credentials and misconfigurations

Current Status: Zero file theft incidents since expanded deployment.


The cost of Mine2's solution was approximately ₹8-10 lakhs annually—less than the revenue lost from a single stolen proposal. More importantly, it provided the legal evidence needed to prosecute the perpetrator and deter future insider threats.


About Mine2: Mine2 provides comprehensive cyber deception solutions including honeytokens, Mine2Mate deployment tools, MineField decoy systems, Cloud Mines for AWS environments, and Fortify system hardening. Our solutions help organizations detect insider threats and external attacks before they cause damage.

M2

Mine2 Team

The MINE2 team consists of cybersecurity experts, researchers, and engineers dedicated to advancing threat detection and cyber deception technologies.

Share this article

Secure Your Network Today

Ready to implement advanced cyber deception in your organization? See how MINE2 can transform your threat detection capabilities.