It is like the Honeypots with a distinguished difference which is no need to the computer. A honeytoken can be a credit card number, Excel spreadsheet, PowerPoint presentation, a database entry, or even a bogus login.
The concept of honeytokens is not new. In Cliff Stoll's book "The Cuckoo's Egg," he explains how he traps the German attacker. A honeytoken is just like a honeypot, you put it out there and no one should interact with it. Any interaction with a honeytoken most likely represents unauthorized or malicious activity.
How do you detect the unauthorized access to a database when that database has thousands of records, with hundreds of authorized users? Maintaining who is authorized to what can be complex, with false positives becoming a huge problem. Honeytokens can be used to solve and simplify this problem.
By simply you insert bogus information like credit card number in your Database for example and monitor if some one access this number which he shouldn’t it gives you indication that you have an intruder and more attention should be taken.
It is advisable to be used with the current existing Information Security tools. Also, it could good tools to catch misbehavior from the internal employees. For example, we could plant honeytokens in senior management's email. The plan being, an internal employee may be reading management's email to gain access to privileged information. To track such unauthorized activity we create a bogus email, or honeytoken, and plant that in management's email. The email could look like this:
To: Chief Financial Officer
From: Security help desk
Subject: Access to financial database
Sir,
We have updated your access to the company's financial records. Your new login and password to the system can be found below. If you need any help or assistance, do not hesitate to contact us.
https://finances.ourcompany.com
login:ayman.galal
password: AyMaN@GaLaL
Security Help Desk
If an attacker is cruising through emails and comes across this, he most likely will attempt to access the financial server thinking he could retrieve highly confidential information. The web site of ‘finances.ourcompany.com’ is really a honeypot watching the network for unauthorized activity. The moment someone try to access this site he actually accessing your honeypot server. Once he starts to use the login in the email you have just sent. You know you have someone reading senior management's email. The moment such a connection happens; you immediately initiate a trace back to identify the attacker’s computer.
Reference: Security Focus