Categories: Cyber Security News

Hackers Trapped in Resecurity Honeypot After Targeted Attack on Employee Network

Cybersecurity firm Resecurity successfully lured threat actors using deception technology after hackers targeted its systems in November 2025.

The operation exposed the attacker’s infrastructure and prompted law enforcement involvement, demonstrating the effectiveness of synthetic data honeypots against financially motivated cybercriminals.

Initial Attack and Honeytrap Deployment

The incident began on November 21, 2025, when Resecurity’s DFIR team detected a threat actor probing publicly facing services and targeting an employee with limited access.

Investigators documented initial connections from Egyptian IP addresses (156.193.212.244 and 102.41.112.148) alongside VPN services.

Rather than blocking the intrusion, security teams deployed a honeytrap account containing synthetic data to monitor attacker behavior.

Honeypot record

The trap used more than 28,000 fake consumer records and 190,000 fabricated payment transactions, built from publicly available data.

This realistic-looking but worthless information included dummy Stripe payment records and generated email addresses from combo lists.

Resecurity also created a decommissioned Mattermost messaging environment with outdated 2023 logs to complete the deception. The threat actor took the bait.

Between December 12 and December 24, attackers made more than 188,000 automated requests to steal synthetic data using residential IP proxies.

During this period of intense activity, connection failures resulted in multiple operational security issues, exposing the attacker’s actual IP addresses.

Resecurity documented these errors and shared abuse data with law enforcement and Internet Service Providers (ISPs) to track the threat actors.

The honeypot successfully captured extensive evidence of the attack methodology, tools used, and infrastructure employed by the cybercriminals.

Telegram group

This intelligence proved invaluable for understanding the attackers’ capabilities and techniques.

Following publication of the operation, the notorious ShinyHunters cybercrime group falsely claimed they had “compromised” Resecurity systems.

The group unknowingly accessed the honeytrap environment at “honeytrap.b.idp.resecurity.com” under the planted “Mark Kelly” account.

The screenshots they shared as proof actually confirmed they had fallen directly into the trap. Resecurity investigators linked the activity to a US-based Gmail account through social engineering techniques.

They recovered phone numbers via password reset functions, strengthening the evidence chain.

All collected intelligence has been provided to law enforcement agencies for further investigation and potential prosecution.

The case demonstrates how honeypots and synthetic data create powerful defensive mechanisms against cybercriminals, turning attackers’ own greed against them while exposing their operational infrastructure and real identities.

Follow us on Google News , LinkedIn and X to Get More Instant UpdatesSet Cyber Press as a Preferred Source in Google.

The post Hackers Trapped in Resecurity Honeypot After Targeted Attack on Employee Network appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

The classic Apple Macintosh mouse inspired Spigen’s retro AirPods case

If you've already given your iPhone 17 Pro and Pro Max a retro '80s facelift…

14 minutes ago

‘Rude AF’: KPop Demon Hunters Fans Erupt in Anger After Composer’s Original Song Academy Award Speech Is Awkwardly Cut Off

KPop Demon Hunters fans have blasted the "rude" decision by the Oscars to cut off…

23 minutes ago

NAB Show: Shotoku To Unveil Aura Robotic Control System For PTZ Cameras

The post NAB Show: Shotoku To Unveil Aura Robotic Control System For PTZ Cameras appeared…

33 minutes ago

Accessible Themeable Pure CSS Framework – µCSS

µCSS is a lightweight, themeable CSS framework that styles semantic HTML elements directly from a…

59 minutes ago

Android 17 Launches Advanced Protection Mode to Stop Malicious Service Exploits

Android 17 is turning Advanced Protection Mode into a far more aggressive defense layer by…

1 hour ago

This website uses cookies.