Switzerland · Deception platform

Catch the intruder.

You scatter realistic looking decoys across your network. A document called Salaries 2025, a fake VPN shortcut, a tracking pixel inside an outgoing email. Nobody on your team has any reason to touch them. The moment one is opened, an alert lands with the IP, the location, and the device that did it.

Swiss company No agents · No software · Five minutes to deploy
How a trap fires 01 · 02 · 03
01 / Plant

You generate a decoy and place it where an attacker would look.

Pick a document, a tracking pixel, a fake login page, a Windows shortcut, a QR code, or another lure type. Drop it on the file share, in an outgoing email, on the company wiki, or on a desktop. No agents to install.

02 / Open

Someone who should not be there opens the lure.

The file opens normally and looks like an ordinary document. There is no popup, no warning, no visible indicator. A silent callback fires from the lure to Hacked the moment it is rendered.

03 / Alert

The alert lands within the minute.

Each alert carries the IP, the country and city, the ASN, the operating system, the device fingerprint, and a VPN or proxy flag. Delivery by email, Slack, Microsoft Teams, or a webhook to your SIEM.

What Hacked catches Real scenarios · Real alerts
01 / Someone touched the trap

A salary spreadsheet on the HR file share was opened.

The alert names the IP that opened the file, the operating system, and the version of Office in use. Whether the IP belongs to a former employee, a contractor, or an attacker who came in through a stolen credential, you now know within the minute.

02 / An account opened a file it had no reason to

A credentials spreadsheet was opened from a workstation that should never read HR files.

The decoy was labelled for the build team. It was opened from a finance laptop running an Outlook session that started ten minutes before the alert. That combination is a signal worth a phone call, and the alert tells you which device to pick up first.

03 / Off hours access

A board minutes file was opened at 2am from a device that has never seen the network before.

The alert tells you which file, which IP, which operating system, and the geolocation in one line. The combination of off hours timing and an unfamiliar device deserves a phone call before the morning.

04 / Stolen file resurfaces somewhere new

A client export labelled clients-2025-export.xlsx was opened on a residential network.

The decoy lived on a shared drive and the bait copy is now on a laptop outside the company. The alert names the country, the ASN, and the device fingerprint, so you know where the file went and what to assume is gone with it. The lure does not stop the exfiltration, it tells you what was taken and where it surfaced.

Lures Ten lure types · Available today
.docx

Word document

OOXML template injection. Fires a silent callback the moment the file is opened in Word on any platform.

.xlsx

Excel spreadsheet

The same mechanism applied to spreadsheets. The file opens normally and looks like a real document.

.pdf

PDF document

A small PDF that fires when opened in Adobe Acrobat or Foxit Reader. Browser PDF viewers do not load the callback.

.url

Windows URL shortcut

A .url Internet Shortcut. Double clicking it in Explorer opens the tracker, logs the visit, then redirects to a realistic decoy destination you pick.

.svg

SVG image

A small SVG with an external image reference. Fires when rendered in a browser, embedded in an Office document, previewed by a wiki, or unfurled by a link bot.

PIXEL

Email tracking pixel

A 1x1 transparent image plus an HTML snippet for an outgoing email. Fires when the message is read in a client that loads remote images.

IMAGE

Web image embed

A tracked image URL for SharePoint, Confluence, Notion, OneNote, Teams, or Slack. Fires on render, including by link unfurl bots.

LOGIN

Cloned login page

A hosted fake login page on hacked.endolum.io. Fires on page load and again on credential submission. Useful for catching phishing prep against your brand.

REDIRECT

Slow redirect link

A tracker link you paste into emails, chat messages, or documents. The click is logged and then 302 redirects to a destination URL you pick.

QR

QR code

A printable PNG QR code that encodes a tracker URL. Use it on invoice footers, door posters, or paper documents. Scanning logs the event and can redirect to a landing page you pick.

All ten types are live in the dashboard today. The free tier accepts the standard preset filenames. The Business plan accepts any custom filename, your own uploaded templates, and your own redirect destinations.

Plans Free · Business
Questions Common

Is using deception lures legal?

You place files and trackers on your own systems and you monitor access to them. The technique is standard practice for security teams worldwide and is fully legal under Swiss and EU law.

Can the intruder tell that the file is a trap?

Each lure renders as the genuine thing. A document opens like a real document, a login page looks like the real login page, a QR code resolves to a plausible destination. The tracking fires silently in the background. No popup, no warning, no visible indicator.

Do I need to install anything?

You generate a lure in the dashboard, download it or copy the tracker URL, and place it where it belongs. There are no agents, no software to install, and no configuration to push to endpoints.

What if my own employees trigger false alerts?

Use deployment zones to label sanctioned access. Every alert ships with the source IP, ASN, and device fingerprint, so triage takes seconds. The Business plan also flags VPN and proxy traffic separately.

What about remote workers and VPN users?

VPN, proxy, and Tor exit detection are built into every Business alert. The dashboard shows the original IP and the ASN and labels traffic from known commercial VPN providers. False positives from legitimate remote work are cut down without losing real signals.

Where is the data stored?

The platform runs in Frankfurt on encrypted volumes. Swiss jurisdiction applies. Free tier alert data retains for 30 days. Business plan alert data retains for one year.

Can I export alerts to my SIEM or my SOC tool?

Business plan ships with a REST API using `eh_` prefix keys, plus webhook delivery to Slack, Microsoft Teams, and any custom endpoint that accepts JSON. CSV and JSON export are available for offline analysis.

Deploy your first trap before the intruder finds the real file.