A group of threat actors identifying as part of Scattered Lapsus$ Hunters (SLH) publicly claimed to have breached the internal systems of cybersecurity firm Resecurity in an alleged act of retaliation for the firm's social engineering attempts. In response, the company denied the hack and stated the attackers had hit an elaborate honeypot.
In a Telegram post, the attackers alleged they exfiltrated multiple sets of data and, as proof, published screenshots purporting to show internal collaboration channels. The reportedly stolen information includes:
The post also said the attack was conducted with the help of the Devman Ransomware group. The ShinyHunters group stated it was not involved in this activity, even though it always claimed to be part of SLH.
Resecurity has refuted these Resecurity hack claims, stating that the attackers were intentionally lured into a pre-prepared honeypot and never accessed legitimate production systems or real customer data.Â
According to Resecurity, it detected the threat actor's reconnaissance activities in November 2025. The firm claims this monitoring led to the identification of the attackers' infrastructure, which was subsequently reported to law enforcement.
In their post, the attackers said the purported data breach was a retaliatory act for what they perceived as Resecurity's social engineering attempts to gather intelligence on their operations, alleging that the company pretended to be a buyer in the ShinyHunters Vietnam data sale.
While the hackers identifying as Scattered Lapsus$ Hunters group promise to release more information, the current evidence remains contested.Â
Last month, BreachForums (operated by ShinyHunters) reemerged as an admin. apologized for the honeypot confusion and claimed responsibility for the attack that the French government announced, which impacted over 16 million individuals.