In May 2025, Coinbase discovered that a group of its own support agents had been bribed by external attackers to exfiltrate customer data. The insiders used their legitimate access privileges — the very access they needed to do their jobs — to steal data from 69,461 users. The attackers demanded a $20 million ransom. Coinbase refused, but the damage was done: bribed employees, stolen data, and a massive reputational hit for one of the world's largest cryptocurrency exchanges.
Two months earlier, a trading desk analyst at a global investment bank exfiltrated proprietary trading algorithms valued at $120 million. In January 2025, a senior engineer at a semiconductor company transferred next-generation processor designs worth $1.5 billion in R&D investment to a competitor before resigning. At Intel, departing employee Jinfeng Luo downloaded approximately 18,000 sensitive files — and when DLP blocked one attempt, he simply used a different device.
These aren't edge cases. They're the new normal. The DTEX/Ponemon 2026 report found that the average organization spent $19.5 million on insider risk in 2025 — up from $17.4 million the year before. Flashpoint observed 91,321 instances of insider recruiting, advertising, and threat actor discussions on underground forums in 2025 alone, averaging over 1,100 posts per month. And 93% of security professionals now say insider attacks are as difficult or more difficult to detect than external breaches.
The insider threat isn't hypothetical. It's a $19.5 million annual problem that your current security stack was never designed to solve.
The Three Faces of Insider Threat — And Why Each One Evades Detection
The old stereotype of the disgruntled employee stealing files on their last day is dangerously narrow. Modern insider risk comes in three forms, and traditional detection tools struggle with all of them.
The Negligent Insider (55% of incidents). This is the employee who clicks the phishing link, misconfigures the S3 bucket, shares credentials over Slack, or uses shadow IT tools that bypass your DLP. Non-malicious insiders accounted for 75% of all incidents in Ponemon's 2025 study, with negligent employees causing 55% of events. Each organization experienced an average of 13.5 negligent insider incidents per year. Fortinet's 2025 report found that 72% of organizations lack visibility into how users handle sensitive data, and 77% faced insider-driven data loss in the past 18 months.
The Malicious Insider (25% of incidents). This is the departing engineer who downloads IP before their last day, the bribed support agent, or the employee selling access on Telegram. Malicious insider incidents carry the highest per-breach cost at $4.92 million — exceeding the $4.44 million global average for all breaches. Verizon's 2025 DBIR found that 89% of privilege misuse cases are financially motivated. And 70% of IP theft occurs within 90 days of an employee's resignation announcement — a predictable window that most organizations still fail to monitor effectively.
The Compromised Insider (20% of incidents). This is the employee whose credentials have been stolen through phishing or infostealer malware, allowing an external attacker to operate under their identity. These incidents are the costliest on a per-event basis at $779,797, because the attacker inherits all of the employee's legitimate access. Once inside with valid credentials, they blend into normal activity for months. IBM's breach research found combined lifecycles for credential-based and malicious insider activity averaging 292 days.
What all three categories share is a fundamental detection challenge: the insider is using authorized access. They have the credentials. They have the permissions. They're accessing systems they're supposed to access. The difference between legitimate work and data theft often comes down to intent — and no security tool can read minds.
Why DLP, UEBA, and SIEM Keep Failing Against Insiders
The security industry has thrown billions at insider threat detection. Yet only 25% of organizations report having a fully mature insider risk program, and the average detection and containment time for insider incidents is still 81 days. Here's why the dominant tools keep underperforming.
DLP blocks known patterns, not unknown intent. Data Loss Prevention tools are designed to prevent specific data types from leaving through specific channels. When Intel's DLP blocked Jinfeng Luo's first exfiltration attempt, he simply used a different device. DLP can't anticipate every exfiltration method, and sophisticated insiders know how to work around rules. Fortinet's research confirms that legacy DLP tools designed for data in motion are no longer sufficient against insider-driven exposures.
UEBA drowns in false positives. User and Entity Behavior Analytics establish behavioral baselines and flag deviations. The problem? Normal employee behavior is wildly variable. A legitimate late-night deadline looks like anomalous after-hours access. A valid project handoff looks like unusual data transfer. When 90% of security professionals say insider attacks are harder to detect than external attacks, it's because UEBA baselines are too noisy to distinguish legitimate work from malicious intent. The signal-to-noise ratio makes UEBA alerts impractical to investigate at scale.
SIEM correlation is too slow. SIEM rules can detect known attack patterns, but insider data theft rarely follows a recognizable signature. A malicious insider accessing files they're authorized to view, downloading them through approved channels, and exfiltrating them via personal devices generates no SIEM alerts. By the time correlation rules identify suspicious aggregate patterns, 81 days of undetected data access have already occurred.
The fundamental problem is authorized access. DLP, UEBA, and SIEM all assume a distinction between authorized and unauthorized activity. Insiders operate entirely within the authorized zone. They have the permissions. They have the access. They're using the same tools and workflows as every other employee. When the threat uses your own access model against you, detection tools built on that same access model can't help.
How Honeytokens Catch Insiders When Everything Else Fails
Honeytokens solve the insider threat problem by bypassing the authorization question entirely. Instead of trying to determine whether authorized access is being used with malicious intent — an inherently subjective judgment that drives false positives — honeytokens plant decoy assets that no one, regardless of their access level, should ever touch.
A honeytoken file in a shared drive that says "Executive_Compensation_2026.xlsx" has no business being opened by a departing engineer in the marketing department. A honeytoken database record that looks like a VIP customer account has no business being queried by a support agent who was just bribed. A honeytoken API key in a code repository has no business being tested by a developer who's planning to leave for a competitor.
Any interaction — any access, any download, any query — is definitively unauthorized. Zero false positives. Immediate, high-confidence signal that someone is accessing data they shouldn't be, regardless of whether their credentials technically permit it.
Honeytoken Documents Catch Data Staging and IP Theft
The most common insider data theft pattern is bulk downloading before departure — 70% of IP theft occurs within 90 days of resignation. Mine2 honeytokens planted as enticing-looking documents in shared drives, document management systems, and collaboration platforms act as tripwires. Fake board presentations, decoy product roadmaps, bogus financial models, and honeytoken customer lists scattered across file shares detect the moment someone begins systematically accessing sensitive-looking documents across organizational boundaries.
When a departing employee starts downloading everything they can find, the honeytoken document they inevitably open triggers an alert — with their identity, the timestamp, and the access vector, days or weeks before their last day.
Honeytoken Database Records Detect Unauthorized Queries
The Coinbase breach succeeded because bribed support agents used their legitimate query access to exfiltrate customer data. Traditional monitoring couldn't distinguish between agents doing their jobs and agents stealing data.
Mine2 honeeytoken records planted within production databases — fake customer accounts, decoy transaction records, bogus PII entries — fire when queried. If a support agent queries a honeytoken customer record, the alert is immediate and unambiguous. No behavioral baseline needed. No subjective judgment about whether the query was work-related. The record is fake — any access is definitively unauthorized.
Honeytoken Credentials Catch Compromised Insiders
For the compromised insider — the employee whose credentials have been stolen by an external attacker — honeytokens planted in credential stores, browser caches, and config files act as canaries. When infostealers harvest credentials from a compromised endpoint, they sweep up honeytokens alongside real credentials. The moment the attacker attempts to use a honeytoken credential, the alert fires — revealing that the employee's identity has been compromised before the attacker can do damage with real credentials.
MineField Decoy Services Detect Internal Reconnaissance
Before an insider can steal high-value data, they need to find it. The reconnaissance phase — scanning internal networks, probing databases, testing access to systems outside their normal scope — is where MineField catches insiders. Decoy services deployed on network segments that the insider's role doesn't normally touch trigger the moment an unauthorized scan or connection attempt occurs.
Cloud Mines Detect Cloud Data Exfiltration
As data increasingly lives in cloud environments, insiders exfiltrate through cloud channels: copying data to personal cloud storage, cloning repositories, downloading from SaaS platforms. Mine2's Cloud Mines — honeytoken cloud resources that monitor for unauthorized access — detect when insiders interact with decoy cloud assets, catching cloud-based data theft that DLP and CASB tools often miss.
Practical Playbook: Honeytokens for Insider Threat Programs
1. Map Your Crown Jewels, Then Plant Honeytokens Alongside Them
Identify your most valuable data assets — IP, customer data, financial records, strategic plans. For each category, create corresponding honeytokens and plant them in the same systems, shares, and databases where real assets live. The insider who's targeting your real crown jewels will inevitably encounter the fakes.
2. Deploy Honeytoken Documents in Every File Share
Create realistic-looking honeytoken documents — "Board_Strategy_2026.pptx", "M&A_Targets_Confidential.pdf", "Employee_Salary_Database.xlsx" — and place them in shared drives, SharePoint sites, and document management systems. These honeytokens are especially effective during the 90-day resignation risk window.
3. Seed Honeytoken Records in Production Databases
Work with database administrators to insert honeytoken records that look like real data but are flagged for monitoring. In CRM databases, create fake high-value customer accounts. In HR systems, create decoy employee records. In financial systems, create bogus transaction entries. Any query touching these records is an insider indicator.
4. Plant Honeytoken Credentials on High-Risk Endpoints
For employees in sensitive roles (finance, engineering, support), plant honeytoken credentials on their workstations. If the endpoint is compromised by an infostealer, the honeytoken credential is harvested and eventually used — revealing the compromise before real credentials are exploited.
5. Focus MineField Decoys on Cross-Boundary Access
Deploy MineField decoy services on network segments that separate organizational boundaries — engineering from finance, R&D from sales, production from development. An insider crossing these boundaries to access data outside their normal scope triggers a MineField alert.
6. Harden with Fortify and Layer Deception on Top
Use Mine2's Fortify to enforce least privilege, disable dormant accounts, restrict broad data access, and identify privilege creep. Then layer honeytokens on top of hardened access controls — so that even if an insider has more access than they should, the next thing they touch might be a trap.
The Bottom Line
The insider threat costs organizations $19.5 million annually, takes 81 days to detect, and is considered harder to identify than external attacks by 93% of security professionals. Traditional tools — DLP, UEBA, SIEM — struggle because insiders operate with authorized access, making malicious activity indistinguishable from legitimate work.
Honeytokens bypass this fundamental limitation. They don't try to determine intent. They don't establish behavioral baselines. They don't generate false positives. They plant assets that no one should ever touch — and fire the moment anyone does, regardless of their role, permissions, or access level.
In a threat landscape where external attackers are recruiting insiders on Telegram at a rate of 1,100 posts per month, where 70% of IP theft happens in the resignation window that most organizations fail to monitor, and where bribed support agents can exfiltrate data from tens of thousands of customers using the access they were given to do their jobs — the detection method that doesn't depend on distinguishing legitimate from malicious access is the one that actually works.
Ready to catch insiders before they walk out the door with your data? See how Mine2's honeytokens detect insider threats with zero false positives →
mine2 team
The MINE2 team consists of cybersecurity experts, researchers, and engineers dedicated to advancing threat detection and cyber deception technologies.
Recent Articles
When Your PAM Becomes the Attack Vector: How BeyondTrust's Exploitation Exposed Every Privileged Credential
Your EDR Is Dead — Now What? Why Deception Is the Detection Layer That Survives EDR Killers
Your API Keys Don't Have MFA: Why Non-Human Identities Are the Biggest Blind Spot in Enterprise Security
Need Security Help?
Protect your organization with MINE2's cyber deception platform.
