Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Google Uncovered Significant Expansion in ShinyHunters Threat Activity with New Tactics

Google Uncovered Significant Expansion in ShinyHunters Threat Activity with New Tactics

Posted on February 2, 2026February 2, 2026 By CWS

The ShinyHunters risk group has expanded its extortion operations with subtle assault strategies focusing on cloud-based techniques throughout a number of organizations.

These cybercriminals use voice phishing and pretend credential harvesting web sites to steal login data from workers.

As soon as they acquire entry, they extract delicate knowledge from cloud software program functions and use this data to demand ransom funds from sufferer firms.

The risk group creates realistic-looking phishing web sites that mimic firm login pages to seize single sign-on credentials and multi-factor authentication codes from unsuspecting workers.

The attackers usually name workers whereas pretending to be IT employees members and declare the corporate is updating safety settings. They then direct staff to fraudulent web sites designed to steal their login credentials.

This method has confirmed efficient as a result of it combines human manipulation with technical deception.

Google Cloud analysts recognized that the risk exercise is being tracked beneath three separate risk clusters named UNC6661, UNC6671, and UNC6240.

The researchers found that these teams have expanded the quantity and forms of cloud platforms they aim, searching for extra helpful knowledge for his or her extortion schemes.

Current incidents present the attackers are utilizing aggressive techniques together with harassment of sufferer workers and launching denial-of-service assaults towards firm web sites.

Assault path diagram (Supply – Google Cloud)

The assaults don’t exploit safety vulnerabilities in software program merchandise or infrastructure. As a substitute, they succeed via social engineering methods that trick folks into offering their credentials voluntarily.

Safety consultants emphasize that organizations ought to undertake phishing-resistant authentication strategies similar to FIDO2 safety keys or passkeys, which can’t be bypassed via social engineering techniques like conventional SMS or push-based authentication techniques.

Assault Mechanism and Information Theft Operations

The risk actors register faux domains that impersonate reputable company portals utilizing patterns like companynamesso.com or companynameinternal.com to make their phishing websites seem genuine.

After acquiring worker credentials, the attackers register their very own authentication units to keep up persistent entry to sufferer accounts.

They then systematically transfer via company cloud environments to steal knowledge from platforms together with SharePoint, Salesforce, DocuSign, and Slack.

Ransom observe (Supply – Google Cloud)

The cybercriminals search particularly for paperwork containing phrases like “confidential,” “inner,” “proposal,” and “vpn” inside cloud functions.

In some instances, they enabled particular instruments like ToogleBox Recall inside Google Workspace accounts to completely delete safety notification emails, stopping workers from discovering that unauthorized units have been accessing their accounts.

After stealing knowledge, the attackers ship extortion emails demanding Bitcoin funds inside 72 hours and supply samples of stolen data hosted on file-sharing platforms to show their claims.

Comply with us on Google Information, LinkedIn, and X to Get Extra On the spot Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Activity, Expansion, Google, ShinyHunters, Significant, Tactics, Threat, Uncovered

Post navigation

Previous Post: Windows 11 New Security Feature Denies Unauthorized Access to System Files
Next Post: Notepad++ Official Update Mechanism Hijacked to Deliver Malware to Select Users

Related Posts

CISA Warns of Trend Micro Apex One OS Command Injection Vulnerability Exploited in Attacks CISA Warns of Trend Micro Apex One OS Command Injection Vulnerability Exploited in Attacks Cyber Security News
Malicious npm Packages as Utilities Let Attackers Destroy Production Systems Malicious npm Packages as Utilities Let Attackers Destroy Production Systems Cyber Security News
ChatGPT Agent Bypasses Cloudflare “I am not a robot” Verification Checks ChatGPT Agent Bypasses Cloudflare “I am not a robot” Verification Checks Cyber Security News
Critical Apache ActiveMQ Flaw Exploited for Ransomware Attack Critical Apache ActiveMQ Flaw Exploited for Ransomware Attack Cyber Security News
SquidLoader Using Sophisticated Malware With Near-Zero Detection to Swim Under Radar SquidLoader Using Sophisticated Malware With Near-Zero Detection to Swim Under Radar Cyber Security News
New ModSecurity WAF Vulnerability Let Attackers Crash the System New ModSecurity WAF Vulnerability Let Attackers Crash the System Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark