top of page

Scattered Spider Meets Honeypot: When the Hunters Become the Hunted

  • Writer: Patrick Duggan
    Patrick Duggan
  • Jan 8
  • 3 min read


The Setup


After detecting reconnaissance activity targeting their externally exposed services, Resecurity didn't just block the traffic. They steered it.


They built a honeypot. Not a simple one—a convincing one.


  • 28,000+ synthetic consumer records (impersonated individuals)

  • 190,000+ fake payment transactions

  • Generated messages within collaboration systems

  • Already-breached data from the dark web to add authenticity

They used real breach data to make fake systems look lived-in. That's tradecraft.





The Sting


The threat actors—claiming to be ShinyHunters, a faction of the Scattered Lapsus$ Hunters (SLH) alliance—took the bait.


They accessed the emulated applications. They exfiltrated the synthetic data. They posted screenshots as proof, claiming "full access" to Resecurity's systems.


Then Resecurity dropped the reveal.


The "compromised" systems were isolated honeypots. The "stolen" data was fabricated. The screenshots proved nothing except that the attackers fell for a trap.





The Denial


After the reveal, someone claiming to represent "the actual ShinyHunters" denied involvement. Classic.


  1. It wasn't them (and someone used their name)

  2. It was them (and they're embarrassed)

  3. The group is fragmented enough that different factions operate independently

Option 3 is most likely. "Scattered Spider" isn't a monolithic organization—it's a loose alliance of actors using similar techniques. Some hit ESA. Some got honeypotted.





The Counter-Intel Playbook


What Resecurity did is textbook counter-intelligence:



┌─────────────────────────────────────────────────────────────────┐
│                    ACTIVE DEFENSE PLAYBOOK                       │
├─────────────────────────────────────────────────────────────────┤
│                                                                  │
│  1. DETECT RECONNAISSANCE                                        │
│     └── Monitor for scanning, enumeration, probing               │
│     └── Don't just block—observe and categorize                  │
│                                                                  │
│  2. PREPARE THE TRAP                                             │
│     └── Build isolated honeypot environment                      │
│     └── Populate with convincing synthetic data                  │
│     └── Use real breach data for authenticity                    │
│                                                                  │
│  3. STEER THE ADVERSARY                                          │
│     └── Make honeypot more attractive than production            │
│     └── Allow "successful" access                                │
│     └── Let them exfiltrate fake data                            │
│                                                                  │
│  4. COLLECT INTELLIGENCE                                         │
│     └── Log TTPs, tools, infrastructure                          │
│     └── Attribute activity to known groups                       │
│     └── Build defensive signatures                               │
│                                                                  │
│  5. BURN THE OPERATION                                           │
│     └── Public reveal damages attacker credibility               │
│     └── "Full access" claims become embarrassment                │
│     └── Other targets become more skeptical of extortion         │
│                                                                  │
└─────────────────────────────────────────────────────────────────┘


This isn't passive defense. This is hunting.





Why This Matters


For defenders: You can do more than block. You can deceive. You can waste attacker resources. You can burn their operations publicly.


For the threat landscape: Scattered Spider's credibility takes a hit. When they claim to have breached the next target, there's now precedent for it being a trap. That uncertainty has value.


For attribution: The "real ShinyHunters" denial reveals fragmentation. These groups aren't unified commands—they're loose affiliations. Different cells, different targets, different outcomes.





The Contrast



Date

Target

Outcome

January 2026

ESA

500GB exfiltrated, ongoing access claimed

January 2026

Resecurity

Honeypotted, fake data, public embarrassment


Same week. Same group (allegedly). Wildly different results.


The difference? Resecurity was watching for them. ESA apparently wasn't.





Recommendations


  1. Don't just block—consider why they're interested

  2. Evaluate whether a honeypot makes sense for your threat model

  3. Document everything for attribution and intelligence sharing

  1. Isolate honeypots completely from production

  2. Make fake data convincing (Resecurity used real breach data)

  3. Have a disclosure plan—the reveal is part of the operation

  1. Verify before paying or panicking

  2. Ask for proof that isn't publicly available

  3. Consider that you might be looking at honeypot data




The Larger Pattern


We've now written three posts about Scattered Spider in the last 24 hours:


  1. **Scattered Spider Goes to Space** - ESA breach, 500GB spacecraft data

  2. This post - Resecurity honeypot, fake data, burned operation

  3. (Ongoing) - The OAuth arc continues

The group isn't slowing down. But neither are defenders. Some get owned. Some do the owning.





Sources




About DugganUSA: We publish free threat intelligence for the 99% who can't afford enterprise security. Our STIX 2.1 feed tracks 2,200+ blocked IPs with MITRE ATT&CK attribution. Sometimes the hunters become the hunted.





Her name is Renee Nicole Good.


Comments

Rated 0 out of 5 stars.
No ratings yet

Add a rating
bottom of page