Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Cybercrime Groups Exploit Vishing for SaaS Attacks

Cybercrime Groups Exploit Vishing for SaaS Attacks

Posted on May 1, 2026 By CWS

Two cybercrime groups, Cordial Spider and Snarky Spider, are drawing attention from cybersecurity experts for their accelerated and high-impact attacks within Software-as-a-Service (SaaS) environments. Operating almost invisibly, these groups have been active since at least October 2025, with Snarky Spider linked to the well-known e-crime ecosystem, The Com. Their activities involve rapid data theft and extortion, marked by a striking similarity in their operational methods.

Vishing and SSO Exploitation

Using voice phishing, or ‘vishing’, these groups trick targeted users into navigating to malicious pages designed to resemble Single Sign-On (SSO) systems. This tactic allows them to capture authentication credentials and infiltrate SSO-integrated SaaS platforms. According to a CrowdStrike report, the groups’ reliance on trusted SaaS environments significantly reduces their operational footprint, creating significant challenges for detection and defense.

Mandiant’s January 2026 report highlights the expansion of such threat activities, linking them to tactics used by the ShinyHunters group. These include impersonating IT staff to deceive victims into divulging credentials and multi-factor authentication (MFA) codes, leveraging phishing pages to accomplish this.

Techniques and Targets

Recent assessments by Palo Alto Networks Unit 42 and the Retail & Hospitality Information Sharing and Analysis Center (RH-ISAC) suggest that Cordial Spider has been targeting the retail and hospitality sectors since February 2026. They employ living-off-the-land (LotL) tactics and residential proxies to obscure their locations and evade basic security measures.

These groups often register new devices to bypass MFA protections, remove previous devices, and suppress email notifications regarding unauthorized device registrations. They achieve this by setting inbox rules to automatically delete such messages, thereby maintaining stealth during their operations.

Impact on SaaS Ecosystems

After securing access, attackers focus on high-privileged accounts through further social engineering, exploiting internal employee directories. This access allows them to infiltrate SaaS environments such as Google Workspace, Microsoft SharePoint, HubSpot, and Salesforce, seeking valuable files and reports. They then exfiltrate sensitive data to their controlled infrastructure.

As noted by CrowdStrike, the stolen credentials often provide access to an organization’s identity provider (IdP), enabling attackers to move laterally across multiple SaaS applications with a single authenticated session. This exploitation of trust relationships between IdPs and connected services eliminates the need to compromise individual SaaS apps, enhancing the efficiency and impact of these cyber threats.

Understanding and mitigating these sophisticated tactics are crucial for organizations to protect their SaaS ecosystems from such aggressive cybercrime activities.

The Hacker News Tags:Cordial Spider, CrowdStrike, Cybercrime, Cybersecurity, data theft, Extortion, IT deception, MFA, Phishing, SaaS, Security, Snarky Spider, SSO, SSO abuse, Vishing

Post navigation

Previous Post: New Android Spyware Platform Enables Rebranding and Resale
Next Post: Major Cybersecurity Updates: Arrests, Vulnerabilities, and Policy Shifts

Related Posts

Why It Needs a Modern Approach Why It Needs a Modern Approach The Hacker News
Gainsight Expands Impacted Customer List Following Salesforce Security Alert Gainsight Expands Impacted Customer List Following Salesforce Security Alert The Hacker News
Apple Warns French Users of Fourth Spyware Campaign in 2025, CERT-FR Confirms Apple Warns French Users of Fourth Spyware Campaign in 2025, CERT-FR Confirms The Hacker News
Oracle Rushes Patch for CVE-2025-61882 After Cl0p Exploited It in Data Theft Attacks Oracle Rushes Patch for CVE-2025-61882 After Cl0p Exploited It in Data Theft Attacks The Hacker News
Fortinet SSL VPNs Hit by Global Brute-Force Wave Before Attackers Shift to FortiManager Fortinet SSL VPNs Hit by Global Brute-Force Wave Before Attackers Shift to FortiManager The Hacker News
Second Sha1-Hulud Wave Affects 25,000+ Repositories via npm Preinstall Credential Theft Second Sha1-Hulud Wave Affects 25,000+ Repositories via npm Preinstall Credential Theft The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Malware Campaign Exploits SEO to Target IT Professionals
  • China-Linked Cyber Attacks Target Asian Nations and Journalists
  • Cybercriminals Exploit CAPTCHA for New Phishing Tactics
  • Major Cybersecurity Updates: Arrests, Vulnerabilities, and Policy Shifts
  • Cybercrime Groups Exploit Vishing for SaaS Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Malware Campaign Exploits SEO to Target IT Professionals
  • China-Linked Cyber Attacks Target Asian Nations and Journalists
  • Cybercriminals Exploit CAPTCHA for New Phishing Tactics
  • Major Cybersecurity Updates: Arrests, Vulnerabilities, and Policy Shifts
  • Cybercrime Groups Exploit Vishing for SaaS Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark