Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Trapped in Resecurity’s Honeypot During Targeted Attack on Employee Network

Hackers Trapped in Resecurity’s Honeypot During Targeted Attack on Employee Network

Posted on January 5, 2026January 5, 2026 By CWS

Resecurity deploys artificial knowledge honeypots to outsmart menace actors, turning reconnaissance into actionable intelligence. A latest operation not solely trapped an Egyptian-linked hacker but additionally duped the ShinyHunters group into false breach claims.​

Resecurity has refined deception applied sciences for counterintelligence, mimicking enterprise environments to lure menace actors into managed traps.

These construct on conventional honeypots, misconfigured providers, or dummy assets that passively log intruders, now powered by AI-generated artificial knowledge that resemble real-world patterns with out exposing proprietary info. Beforehand breached knowledge from darkish internet sources enhances realism, fooling even superior actors who validate targets.​

On November 21, 2025, Resecurity’s DFIR group noticed a menace actor scanning public-facing providers after concentrating on a low-privilege worker. Indicators included IPs like 156.193.212.244 and 102.41.112.148 (Egypt), plus VPNs 45.129.56.148 (Mullvad) and 185.253.118.70.

Responders deployed a honeytrap in an emulated app with artificial datasets: 28,000 client data (usernames, emails, faux PII from combo lists) and 190,000 Stripe-like fee transactions generated by way of instruments like SDV, MOSTLY AI, and Faker. A bait account, “Mark Kelly,” was planted on Russian Market to attract attackers.​

data from Honeypot

The actor logged into the honeytrap, prompting over 188,000 requests from December 12-24 to scrape knowledge by way of customized automation and residential proxies.

This yielded “abuse knowledge” on techniques, infrastructure, and OPSEC slips, actual IPs leaked throughout proxy failures. Resecurity blocked proxies, forcing the reuse of identified hosts, and shared findings with regulation enforcement, culminating in a international subpoena.

Remoted decoys like Workplace 365, VPNs, and a decommissioned Mattermost occasion with 2023 faux chatter (six teams, AI-generated by way of OpenAI) proved excellent for high-value mimicry with out danger.​

ShinyHunters Caught in Replace

A January 3, 2026, replace revealed ShinyHunters beforehand profiled by Resecurity fell into the identical entice, boasting Telegram “full entry” to “[honeytrap].b.idp.resecurity.com” and faux techniques.

Telegram group replace

Screenshots confirmed dummy Mattermost for “Mark Kelly,” non-existent domains like “resecure.com,” bcrypt-hashed API tokens from duplicate tester accounts, and ineffective outdated logs.

The group acknowledged disruptions brought on by Resecurity’s techniques; social engineering recognized hyperlinks to jwh*****[email protected], a US telephone quantity, and a Yahoo account registered throughout the exercise.​

This validates cyber deception’s energy for menace searching and investigations, producing IOCs/IOAs from managed engagements. Compliance with privateness legal guidelines stays key.

Resecurity’s logs and prior ShinyHunters exposés recommend retaliation backfired into self-incrimination. Enterprises can replicate by way of monitored decoys in non-production environments, enhancing proactive protection towards financially motivated menace actors.​

Comply with us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Attack, Employee, Hackers, Honeypot, Network, Resecuritys, Targeted, Trapped

Post navigation

Previous Post: President Trump Orders Divestment in $2.9 Million Chips Deal to Protect US Security Interests
Next Post: Multiple Vulnerabilities in QNAP Tools Let Attackers Obtain Secret Data

Related Posts

First-Ever Malicious MCP Server Found in the Wild Steals Emails via AI Agents First-Ever Malicious MCP Server Found in the Wild Steals Emails via AI Agents Cyber Security News
Windows Server 2025 Golden dMSA Attack Enables Authentication Bypass and Password Generation Windows Server 2025 Golden dMSA Attack Enables Authentication Bypass and Password Generation Cyber Security News
10 Malicious npm Packages with Auto-Run Feature on Install Deploys Multi-Stage Credential Harvester 10 Malicious npm Packages with Auto-Run Feature on Install Deploys Multi-Stage Credential Harvester Cyber Security News
Google to Add New Layer of Developer Verification to Distribute Apps on Play Store Google to Add New Layer of Developer Verification to Distribute Apps on Play Store Cyber Security News
New Kerberos Relay Attack Uses DNS CNAME to Bypass Mitigations New Kerberos Relay Attack Uses DNS CNAME to Bypass Mitigations Cyber Security News
Malicious Chrome Extensions Compromise VKontakte Users Malicious Chrome Extensions Compromise VKontakte Users Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required
  • Iranian Hackers Compromise FBI Director’s Email, Attack Stryker
  • Stocks in Cybersecurity Dip as Anthropic Tests Cutting-Edge AI

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required
  • Iranian Hackers Compromise FBI Director’s Email, Attack Stryker
  • Stocks in Cybersecurity Dip as Anthropic Tests Cutting-Edge AI

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark