Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Trapped in Resecurity’s Honeypot During Targeted Attack on Employee Network

Hackers Trapped in Resecurity’s Honeypot During Targeted Attack on Employee Network

Posted on January 5, 2026January 5, 2026 By CWS

Resecurity deploys artificial knowledge honeypots to outsmart menace actors, turning reconnaissance into actionable intelligence. A latest operation not solely trapped an Egyptian-linked hacker but additionally duped the ShinyHunters group into false breach claims.​

Resecurity has refined deception applied sciences for counterintelligence, mimicking enterprise environments to lure menace actors into managed traps.

These construct on conventional honeypots, misconfigured providers, or dummy assets that passively log intruders, now powered by AI-generated artificial knowledge that resemble real-world patterns with out exposing proprietary info. Beforehand breached knowledge from darkish internet sources enhances realism, fooling even superior actors who validate targets.​

On November 21, 2025, Resecurity’s DFIR group noticed a menace actor scanning public-facing providers after concentrating on a low-privilege worker. Indicators included IPs like 156.193.212.244 and 102.41.112.148 (Egypt), plus VPNs 45.129.56.148 (Mullvad) and 185.253.118.70.

Responders deployed a honeytrap in an emulated app with artificial datasets: 28,000 client data (usernames, emails, faux PII from combo lists) and 190,000 Stripe-like fee transactions generated by way of instruments like SDV, MOSTLY AI, and Faker. A bait account, “Mark Kelly,” was planted on Russian Market to attract attackers.​

data from Honeypot

The actor logged into the honeytrap, prompting over 188,000 requests from December 12-24 to scrape knowledge by way of customized automation and residential proxies.

This yielded “abuse knowledge” on techniques, infrastructure, and OPSEC slips, actual IPs leaked throughout proxy failures. Resecurity blocked proxies, forcing the reuse of identified hosts, and shared findings with regulation enforcement, culminating in a international subpoena.

Remoted decoys like Workplace 365, VPNs, and a decommissioned Mattermost occasion with 2023 faux chatter (six teams, AI-generated by way of OpenAI) proved excellent for high-value mimicry with out danger.​

ShinyHunters Caught in Replace

A January 3, 2026, replace revealed ShinyHunters beforehand profiled by Resecurity fell into the identical entice, boasting Telegram “full entry” to “[honeytrap].b.idp.resecurity.com” and faux techniques.

Telegram group replace

Screenshots confirmed dummy Mattermost for “Mark Kelly,” non-existent domains like “resecure.com,” bcrypt-hashed API tokens from duplicate tester accounts, and ineffective outdated logs.

The group acknowledged disruptions brought on by Resecurity’s techniques; social engineering recognized hyperlinks to jwh*****[email protected], a US telephone quantity, and a Yahoo account registered throughout the exercise.​

This validates cyber deception’s energy for menace searching and investigations, producing IOCs/IOAs from managed engagements. Compliance with privateness legal guidelines stays key.

Resecurity’s logs and prior ShinyHunters exposés recommend retaliation backfired into self-incrimination. Enterprises can replicate by way of monitored decoys in non-production environments, enhancing proactive protection towards financially motivated menace actors.​

Comply with us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Attack, Employee, Hackers, Honeypot, Network, Resecuritys, Targeted, Trapped

Post navigation

Previous Post: President Trump Orders Divestment in $2.9 Million Chips Deal to Protect US Security Interests
Next Post: Multiple Vulnerabilities in QNAP Tools Let Attackers Obtain Secret Data

Related Posts

CISA Warns of Apple WebKit Vulnerability 0-Day Vulnerability Exploited in Attacks CISA Warns of Apple WebKit Vulnerability 0-Day Vulnerability Exploited in Attacks Cyber Security News
ZnDoor Malware Exploiting React2Shell Vulnerability to Compromise Network Devices ZnDoor Malware Exploiting React2Shell Vulnerability to Compromise Network Devices Cyber Security News
175 Malicious npm Packages With 26,000 Downloads Attacking Technology, and Energy Companies Worldwide 175 Malicious npm Packages With 26,000 Downloads Attacking Technology, and Energy Companies Worldwide Cyber Security News
Hackers Expose All User Records from Popular Dark Web Forum Hackers Expose All User Records from Popular Dark Web Forum Cyber Security News
WhatsApp Desktop Users At Risk of Code Execution Attacks with Python on Windows PCs WhatsApp Desktop Users At Risk of Code Execution Attacks with Python on Windows PCs Cyber Security News
10 Best AI penetration Testing Companies in 2025 10 Best AI penetration Testing Companies in 2025 Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News