On January 3, 2026, a threat group calling itself Scattered Lapsus$ Hunters (SLH), with alleged ties to ShinyHunters and Lapsus$, claimed to have successfully breached the cybersecurity firm Resecurity. The group posted screenshots on Telegram as proof, alleging access to internal chats, employee data, and client intelligence. In a swift and public rebuttal, Resecurity denied any compromise of its production systems. The firm stated that the attackers were, in fact, lured into and contained within a pre-existing, high-interaction honeypot. According to Resecurity, all data and systems the attackers accessed were synthetic and part of a cyber deception environment designed to study their methods. The incident highlights the growing use of deception technology as a proactive defense and intelligence gathering tool.
The incident involves a public clash between a threat actor group and a cybersecurity vendor. The group, Scattered Lapsus$ Hunters, attempted to gain notoriety by claiming a high-profile victim. Their TTPs appear to align with groups like Lapsus$, focusing on credential theft, social engineering, and data exfiltration for public shaming or extortion. The group claimed the attack was in retaliation for Resecurity allegedly attempting to socially engineer them, suggesting a tit-for-tat engagement.
Resecurity's defense was not passive; it was an active, offensive defense strategy. By their account, they successfully turned the attackers' efforts into a live intelligence-gathering exercise. They leveraged a honeypot—a decoy computer system intended to trap and analyze attackers—to observe the group's tools, techniques, and procedures in a safe, isolated environment. The firm had even published a blog post on December 24, 2025, detailing their use of synthetic data in cyber deception, lending credibility to their claims.
Based on Resecurity's account, the attack unfolded within their deception environment.
This incident serves as a masterclass in leveraging M1056 - Pre-compromise mitigations, specifically using decoy environments. The goal of a honeypot is not just to be a tar pit but to provide high-fidelity telemetry on attacker behavior that can be used to strengthen real defenses.
| Type | Value | Description | Context | Confidence |
|---|---|---|---|---|
| user_account_pattern | test_user, dev_admin |
Use of decoy user accounts that have no access to production systems. | Authentication Logs | high |
| file_name | client_data_Q4_2025.docx |
Planting decoy files with tempting names in honeypot environments. When accessed, these files can trigger alerts. | File Integrity Monitoring, EDR | high |
| api_endpoint | api.honeypot.resecurity.com |
Interaction with API endpoints that are part of the deception environment, not the production service. | Web Logs, API Gateway Logs | high |
Utilize deception technology, including honeypots and honey-tokens, to detect, analyze, and misdirect attackers.
Organizations, particularly high-value targets like Resecurity, should strategically deploy high-interaction decoy environments (honeypots) that mimic their real production systems. In this case, Resecurity likely created a virtual network with servers, user accounts, and a Mattermost instance that looked and felt real to the SLH attackers. The key is fidelity; the decoy environment must be convincing enough to keep attackers engaged. This allows the security team to observe their TTPs in a safe, instrumented sandbox. All activity within this environment is, by definition, malicious, eliminating the noise of false positives. The intelligence gathered—such as tools used, commands run, and C2 infrastructure contacted—is invaluable for building proactive defenses for the real network.
Complementing full decoy environments, organizations should seed their real production networks with decoy objects, or honey-tokens. For Resecurity, this could have been fake AWS API keys left in a code repository, a file named client_passwords.xlsx on a file share, or a database entry for a user named John Doe. These objects are digital tripwires. They should never be accessed during normal operations. Therefore, any interaction with them—a file open, an API call, a database query—is a high-fidelity, undeniable indicator of a breach. This technique is excellent for early breach detection, alerting defenders that an attacker is in the discovery phase of an attack long before they reach their objective.
The Resecurity case is a perfect example of turning an attack into a threat intelligence opportunity. The data collected from the honeypot—the attackers' IP addresses, malware samples, and observed TTPs—is extremely valuable. This intelligence should be formalized and integrated into the organization's security stack. For example, the observed IPs can be added to firewall blocklists, malware hashes can be added to EDR blocklists, and the specific commands used can be turned into custom detection rules in the SIEM. This creates a feedback loop where every attack, successful or not, makes the organization stronger and more resilient to future attacks from the same or similar actors.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats