#resecurity

Dissent Doe :cupofcoffee:PogoWasRight@infosec.exchange
2026-01-03

Remember the good old days when ShinyHunters proclaimed that they were all one group with Scattered Spider and Lapsus Hunters and would hereafter be known as SLSH or SLH?

Today, they contacted me to tell me they had nothing to do with the attack on Resecurity and that was the work of SLH.

So much for all one group.....

#honeypot #Resecurity

2026-01-03

It's been a bit quiet over the last 24 hours, but we've got one interesting story about a high-profile hacking group and a cybersecurity firm playing cat and mouse. Let's dive in:

ShinyHunters vs. Resecurity: Honeypot or Hack? 🎣

- The prominent ShinyHunters hacking group (also known as "Scattered Lapsus$ Hunters") claims to have breached cybersecurity firm Resecurity, alleging the theft of employee data, internal communications, threat intelligence, and client lists.
- Resecurity vehemently denies the breach, asserting that the systems accessed by ShinyHunters were a deliberately deployed honeypot filled with synthetic data, designed to attract and monitor the threat actors.
- The firm detailed how it observed the attackers' tactics, techniques, and infrastructure, collecting telemetry and even identifying attacker IP addresses, which it subsequently shared with law enforcement, leading to a subpoena request.

🤖 Bleeping Computer | bleepingcomputer.com/news/secu

#CyberSecurity #ThreatIntelligence #Honeypot #ShinyHunters #Resecurity #InfoSec #CyberAttack #IncidentResponse #ThreatActor

Dissent Doe :cupofcoffee:PogoWasRight@infosec.exchange
2026-01-03

On its Telegram channel, ShinyHunters claims to have compromised @Resecurity, but it looks like they fell for a carefully crafted honeypot.

databreaches.net/2026/01/03/sh

#honeypot #ShinyHunters #Resecurity #infosecurity

@campuscodi @GossiTheDog

2026-01-03

ShinyHunters claimed they hacked Resecurity and stole internal data. But Resecurity says the hackers only accessed a fake environment set up as a honeypot, with no real data or systems breached.

Full story: hackread.com/resecurity-shinyh

#Cybersecurity #ShinyHunters #Resecurity #DataBreach

2026-01-03

Just In: ShinyHunters claim to have breached US cybersecurity firm Resecurity, leaking screenshots showing internal systems and employee data.

Read: hackread.com/shinyhunters-brea

#Cybersecurity #ShinyHunters #Resecurity #DataBreach #CyberAttack

emt Technology Distributionemttech
2025-04-30

🕷️ Are you breached? 🕷️ with @RESecurity

Enter your domain at our booth at GISEC and let Resecurity find out how much of your sensitive info is already exposed on the dark web.

Get ready to be shocked by what you discover...

🔒 Cybersecurity starts with Awareness.
📍 Stand B145, Hall 6, Dubai World Trade Centre.

@Resecurity | @emt Distribution META | @emt Distribution META

2025-03-30

📬 BlackLock im Visier: Leak-Schwachstelle offenbart Interna der Ransomware-Gruppe
#DarkCommerce #ITSicherheit #BlackLock #Cybercrime #LeakSeite #LFISchwachstelle #Ransomware #Resecurity sc.tarnkappe.info/e06d78

Dissent Doe :cupofcoffee:PogoWasRight@infosec.exchange
2025-03-27

Ah, it seems that #Resecurity wished #BlackLock aka #ElDorado a belated Merry Xmas and season's greetings by intruding into their infrastructure.

It's an interesting read.

resecurity.com/blog/article/bl

#disruption #OffensiveCyber #infosecurity #ransomware

Dissent Doe :cupofcoffee:PogoWasRight@infosec.exchange
2025-02-22

Cyberespionage groups or cybercriminals? UAV and C-UAV vendors and buyers are increasingly targeted.

#Resecurity had an interesting post on the topic.

As an example: about 1 GB of compressed #FortemTechnologies internal files wound up in the hands of an adversary, but Fortem denies there was any breach, claiming (wait for it):

" There was no breach. The files in question were attached to emails that had been shared outside of our network."

Shared intentionally with an adversary or cybercriminal? I tend to doubt that....

databreaches.net/2025/02/19/cy

#cyberespionage #cyberwar #cybercrime #UAV #UAS

2024-06-05
2024-04-08

Resecurity has identified a new version of JSOutProx, a sophisticated attack framework that targets financial institutions in the APAC (Asia-Pacific) and MENA (Middle East and North Africa)regions. This malware, which uses JavaScript and .NET, was first spotted in 2019 and has been linked to phishing campaigns by SOLAR SPIDER. It exploits .NET (de)serialization to interact with a core JavaScript module on the victim's machine, allowing it to load malicious plugins for further attacks.

Before this new campaign, JSOutProx was used in targeted attacks against Indian Cooperative Banks and Finance Companies, with notable incidents in April 2020 involving Indian government establishments and banks. The attackers used malicious archive file attachments containing JavaScript and Java-based backdoors, which were linked to the JSOutProx RAT.

A significant spike in activity was observed around February 8, 2024, when a major system integrator in Saudi Arabia reported an incident targeting customers of one of their banks. The attackers used impersonation tactics, including fake SWIFT payment notifications and Moneygram templates, to trick victims into executing malicious code. Most of the identified payloads were hosted on GitHub repositories, with some being disguised as PDF files.

In March 2024, Resecurity noticed a shift in the attackers' tactics, with the use of GitLab instead of GitHub in a multi-stage infection chain. The attackers registered multiple accounts on GitLab and used them to deploy repositories containing malicious payloads. Once the malicious code was delivered, the actor removed the repository and created a new one, likely to manage multiple payloads and differentiate targets.

The increasing abuse of public cloud and web 3.0 services by threat actors to distribute malicious code is highlighted by the discovery of the new version of JSOutProx and its exploitation of platforms like GitHub and GitLab. This underscores the continuous evolution of cybercriminals' strategies and the relentless efforts of these actors to escalate global malicious campaigns. As these threats become more complex and widespread, Resecurity remains vigilant in tracking JSOutProx and protecting financial institutions and their customers globally from such activities.

resecurity.com/blog/article/th

#cybersecurity #github #gitlab #JSOutProx #malware #payload #javascript #swift #moneygram #resecurity

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst