Resecurity Caught ShinyHunters in Honeypot
嗯,用户让我帮忙总结一下这篇文章的内容,控制在一百个字以内,而且不需要用“文章内容总结”或者“这篇文章”这样的开头,直接写描述就行。好的,首先我需要仔细阅读文章,抓住主要信息。 文章标题是Resecurity Caught ShinyHunters in Honeypot。看起来Resecurity抓到了一个叫做ShinyHunters的威胁组织。他们使用了诱饵账户,也就是honeypot技术。时间是在2025年9月,攻击对象包括航空公司、电信公司和执法机构。 接下来,文章详细说明Resecurity是如何设置这个陷阱的。他们创建了一个 decoy account,里面填充了来自暗网的数据和OpenAI生成的内容,看起来非常真实。ShinyHunters在Telegram上声称已经攻破了Resecurity,但实际上掉进了陷阱里。 Resecurity随后发布了一份报告,里面记录了攻击者的IP地址和 residential proxies,并指出他们犯了一些OPSEC错误,暴露了真实来源。 所以总结起来,关键点是:Resecurity利用honeypot捕获ShinyHunters;攻击发生在2025年9月;目标是航空、电信和执法机构;ShinyHunters误以为攻破系统;报告揭示了攻击者的IP和错误。 现在要把这些信息浓缩到100字以内。要确保涵盖主要事件、时间、目标、结果以及报告内容。 可能的结构:Resecurity通过设置诱饵账户捕获ShinyHunters,在2025年9月攻击航空、电信和执法机构。该组织误以为攻破系统,实际进入陷阱。Resecurity发布报告揭示攻击者IP和错误。 检查字数是否在限制内,并确保语句通顺。 </think> Resecurity通过设置诱饵账户捕获威胁组织ShinyHunters(SLH),该组织于2025年9月对航空、电信及执法机构发动攻击。ShinyHunters误以为攻破系统,实则落入陷阱。Resecurity发布报告揭示攻击者IP地址及操作失误。 2026-1-4 18:6:43 Author: securityaffairs.com(查看原文) 阅读量:5 收藏

Resecurity Caught ShinyHunters in Honeypot

Resecurity caught ShinyHunters (SLH) using decoy accounts; the group attacked airlines, telecoms, and law enforcement in Sept 2025.

In an interesting development, Resecurity has caught actors known as “ShinyHunters” or “Scattered Lapsus$ Hunters” (SLH) leveraging honeypot (decoy) accounts. The company was one of the first to release a public report detailing the group’s activities in September 2025, when the threat actors conducted several major attacks against airlines, telecommunication companies, and law enforcement agencies.

Following this reporting, Resecurity identified malicious targeting against one of their employees and created a decoy account to simulate a realistic environment containing inactionable and useless data. To do this, they leveraged readily available datasets from the Dark Web (such as HITB) as well as outputs generated by OpenAI. In the context of threat hunting, previously breached data can be highly effective for designing deception models that appear extremely realistic and attract threat actors.

In Telegram, the group claims to have “compromised” Resecurity, not realizing they have fallen into a honeypot prepared for them. The group stated that they “gained full access to Resecurity systems,” which is a clear overstatement, as the honeypot environment was designed without any sensitive information. Deception and honeytraps accounts are

Previously, similar malicious targeting has been conducted against Mandiant (now part of Google) and CrowdStrike.

Resecurity published a report containing logged IP addresses and residential proxies used by the actors, along with several OPSEC mistakes that revealed their true sources of connection

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, ShinyHunters).




文章来源: https://securityaffairs.com/186528/security/resecurity-caught-shinyhunters-in-honeypot.html
如有侵权请联系:admin#unsafe.sh