Threat actors associated with Scattered Lapsus$ Hunters (SLH) claimed to have breached cybersecurity firm Resecurity and stolen internal data. Instead, they’d fallen into a deliberately deployed honeypot—and the intelligence gathered from monitoring their activity led to a law enforcement subpoena identifying one of the attackers.

Incident overview

AttributeDetails
Claimed victimResecurity (cybersecurity firm)
Actual outcomeHoneypot trap successful
Threat actorScattered Lapsus$ Hunters (SLH)
Synthetic consumer records28,000+
Synthetic payment records190,000+
Automated requests logged188,000+
Law enforcement actionForeign subpoena issued
Production data compromisedNone confirmed

Timeline

DateEvent
November 21, 2025Resecurity detects threat actor probing public-facing systems
November 2025Hunter DFIR team deploys honeypot environment with “Mark Kelly” account
December 12-24, 2025Attackers make 188,000+ automated requests to honeypot
December 24, 2025Resecurity publishes report confirming synthetic data access
January 3, 2026SLH posts breach claims to Telegram
January 4, 2026Claims removed from Telegram after honeypot revealed
January 2026Telegram channel suspended for policy violations
January 2026Resecurity offers “congratulations” to attackers for falling into trap

The claim

The group posted screenshots on Telegram claiming “full access to Resecurity systems” and theft of:

Claimed dataAttacker assertion
Employee dataNames, contacts, roles
Internal communicationsChat logs, discussions
Threat intelligence reportsCustomer-facing research
Management filesInternal documents
Client informationCustomer list and details

What actually happened

When Resecurity detected probing activity in November 2025, their Hunter DFIR team didn’t just block the attacker—they deployed a honeypot account within an isolated environment. The attacker was allowed to log in and interact with systems containing synthetic data while being monitored.

Honeypot architecture

ComponentPurpose
”Mark Kelly” accountHoneypot user identity
Mattermost instanceFake internal communications
Synthetic consumer records28,000+ realistic-looking entries
Synthetic payment transactions190,000+ records in Stripe API format
Fabricated internal messagesBelievable but traceable content
Complete isolationNo paths to production systems
Comprehensive loggingFull activity capture

The data was structured to closely resemble real business data while remaining completely isolated from production systems. The payment records were generated using the official Stripe API format for maximum realism.

Synthetic data design

ElementRealism factor
Consumer recordsNames, addresses, contact info following real patterns
Payment dataStripe API format, realistic transaction patterns
Internal commsBelievable business discussions
File structureMimicked real organizational layout
TimestampsRecent activity to appear current

Attacker activity

Between December 12 and December 24, 2025, Resecurity recorded detailed telemetry:

MetricValue
Automated requests188,000+
Primary proxy locationResidential IPs from Egypt
Secondary proxyMullvad VPN
Tools usedAutomated scraping/exfiltration
Session duration12+ days
Data exfiltratedSynthetic records only

The attackers’ automation and persistence provided extensive behavioral data for attribution.

OPSEC mistakes

Processing the fake data “led to several OPSEC mistakes” by Scattered Lapsus$ Hunters:

MistakeImpact
Revealed automation serversInfrastructure identified
Consistent proxy patternsAttribution possible
Gmail account linkageConnected to US phone number
Yahoo account linkageSecondary identity exposed
Residential proxy usage patternsBehavioral fingerprinting
Time zone indicatorsGeographic narrowing
Tool signaturesTechnical capabilities revealed

Attribution and “The Com”

Resecurity identified the attackers as Scattered Lapsus$ Hunters (SLH), a group claiming affiliation with ShinyHunters, Lapsus$, and Scattered Spider.

Group naming origin

ComponentSource
”Scattered”Scattered Spider affiliation
”Lapsus$“Lapsus$ group connection
”Hunters”ShinyHunters association

The Com ecosystem

These groups are linked to “The Com”, a predominantly English-speaking cybercriminal ecosystem:

CharacteristicDetails
DemographicsPrimarily teenage actors
LanguageEnglish-speaking
OrganizationLoosely organized, shifting allegiances
OverlapLapsus$, ShinyHunters, Scattered Spider
CommunicationTelegram, Discord
TargetsHigh-profile tech companies, crypto
TacticsSocial engineering, SIM swapping

Security researchers describe it as a “cybercrime youth movement”—a loosely organized network with constantly shifting membership and allegiances.

GroupNotable activities
Lapsus$Microsoft, Nvidia, Okta breaches
ShinyHuntersMultiple data breach operations
Scattered SpiderCasino and hospitality attacks
SLHCombination of above tactics

ShinyHunters denial

After the story broke, a ShinyHunters spokesperson told BleepingComputer they were not involved in this specific action:

“There is a misunderstanding… I want to make it clear that the TG channel is specifically associated with Scattered LAPSUS$ Hunters, not ShinyHunters.”

Law enforcement action

The intelligence gathered from the honeypot had real consequences:

ActionDetails
Network telemetry sharedTimestamps and connection data to law enforcement
Subpoena issuedForeign law enforcement partner
Gmail identifiedLinked to US-based phone number
Yahoo accountSecondary identity confirmed
Attribution chainEstablished through residential proxy patterns
Ongoing investigationAdditional actions expected

Resecurity offered “congratulations” to the attackers for falling into the trap.

Independent verification

Security researcher Dissent Doe reviewed available evidence:

“In sum, DataBreaches found no evidence that SLH acquired any data from any of Resecurity’s real clients.”

Verification findingStatus
Customer data stolenNo evidence
Production compromiseNo evidence
Synthetic data accessedConfirmed
Honeypot effectivenessValidated

Aftermath

On January 4, 2026—one day after publicizing their claims—the group removed all Telegram posts about the alleged breach. They acknowledged that Resecurity’s efforts “disrupted their operations.”

Aftermath eventDetails
Telegram posts removedJanuary 4, 2026
Channel suspendedTelegram policy violation
Operations disruptedGroup acknowledgment
Reputation damageCredibility among peers affected

Lessons for defenders

Deception technology benefits

BenefitHow it works
Early detectionAttackers interact with decoys before reaching real assets
Intelligence gatheringBehavioral data supports attribution and prosecution
Attacker resource wasteTime spent on fake data is time not spent on real targets
Legal evidenceDocumented intrusion supports prosecution
Psychological impactAttackers unsure what data is real
DeterrenceRisk of honeypots deters future attacks

Implementation requirements

FactorConsideration
RealismSynthetic data must be believable enough to engage attackers
IsolationComplete separation from production—no paths to real systems
MonitoringComprehensive logging to capture attribution data
Response planInclude law enforcement coordination
MaintenanceHoneypots need updates to remain convincing
Legal reviewEnsure compliance with applicable laws

Honeypot design principles

PrincipleApplication
Attractive targetAppears valuable to attackers
AccessibleAttackers can find and access it
RealisticContent matches expected patterns
InstrumentedEvery action is logged
IsolatedCannot lead to real systems
SustainableCan be maintained long-term

When to deploy honeypots

ScenarioValue
Initial reconnaissance detectedHigh—can monitor escalation
Targeting by known groupsHigh—intelligence gathering
High-value organizationMedium—defense in depth
Limited security resourcesLow—maintenance burden
Security vendorHigh—expected target

Recommendations for security teams

PriorityAction
HighDevelop deception technology capability
HighEstablish law enforcement coordination channels before incidents
HighCreate realistic honeypot environments for high-risk scenarios
MediumTrain DFIR teams on honeypot deployment
MediumIntegrate honeypots with threat intelligence
OngoingMonitor for reconnaissance activity as deployment trigger

Honeypot success factors

FactorImportance
Rapid deployment capabilityCritical
Realistic data generationCritical
Comprehensive monitoringCritical
Law enforcement relationshipsHigh
Attribution capabilityHigh
Legal preparationHigh

Context

The Resecurity incident demonstrates that cybersecurity firms aren’t just targets—they’re also capable of turning attacks into intelligence operations. For threat actors targeting security companies, the risk of encountering sophisticated deception technology is significantly higher than with typical corporate victims.

For defenders considering deception technology, this case provides a template: detect early, deploy realistic decoys, monitor comprehensively, and coordinate with law enforcement for maximum impact.

The incident also highlights the evolving nature of threat actor ecosystems. The overlapping membership between Lapsus$, ShinyHunters, and Scattered Spider—all connected through “The Com”—creates attribution challenges but also opportunities when attackers make OPSEC mistakes. Young, inexperienced actors in these groups may have technical skills but often lack the operational discipline to avoid identification.

The subpoena resulting from this honeypot operation demonstrates that active defense can have real consequences for attackers, potentially deterring future operations against both Resecurity and other security-conscious targets.