Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Scattered Lapsus$ Hunters Launched a New Leak Site to Release Data Stolen from Salesforce Instances

Posted on October 8, 2025October 8, 2025 By CWS

The infamous cybercriminal collective often called Scattered Lapsus$ Hunters has escalated their extortion marketing campaign by launching a devoted leak website to threaten organizations with the publicity of stolen Salesforce knowledge.

This supergroup, comprised of established risk actors together with ShinyHunters, Scattered Spider, and Lapsus$, represents a classy evolution in ransomware-as-a-service operations that targets one of many world’s most generally used buyer relationship administration platforms.

The group’s emergence signifies a harmful consolidation of cybercriminal experience, combining the technical capabilities and operational information of a number of established risk actors.

Their coordinated strategy demonstrates how fashionable cybercriminal organizations have gotten more and more organized and specialised, specializing in high-value targets that may yield substantial ransom funds.

The collective’s choice to particularly goal Salesforce cases displays their understanding of the platform’s crucial enterprise worth and the delicate buyer knowledge it incorporates.

Working via the TOR Onion community, their extortionware portal lists compromised Salesforce clients alongside claims of how a lot knowledge the group has allegedly exfiltrated throughout their assaults.

UpGuard analysts famous that the web site threatens affected organizations with public knowledge publicity until fee calls for are met, with an preliminary deadline set for October tenth, 2025.

The location’s existence marks a troubling milestone within the commercialization of information theft, remodeling stolen data into leverage for systematic extortion operations.

The assault marketing campaign demonstrates subtle technical execution throughout a number of vectors, starting with social engineering assaults that exploited human vulnerabilities fairly than technical flaws.

The risk actors employed vishing strategies, impersonating IT assist personnel to govern licensed customers into putting in malicious Salesforce integrations, offering the attackers with API-level entry to focus on methods.

OAuth Token Exploitation and Persistence Mechanisms

The group’s most subtle assault vector concerned compromising Salesloft’s GitHub repositories and leveraging legitimate OAuth integration tokens to take care of persistent entry to linked Salesforce environments.

After gaining preliminary entry to Salesloft’s company GitHub account via suspected social engineering, the attackers methodically downloaded repository contents, created unauthorized person accounts inside the group, and established customized workflows to facilitate ongoing entry.

The assault development adopted a calculated strategy the place the risk actors found embedded AWS credentials inside the compromised repositories, enabling them to entry Salesloft Drift’s cloud infrastructure.

Inside this atmosphere, they efficiently recognized and exfiltrated OAuth tokens belonging to Salesloft Drift shoppers, successfully remodeling authentic integration credentials into weapons for widespread knowledge theft.

This system demonstrates how attackers can leverage the interconnected nature of recent SaaS platforms to realize lateral motion throughout a number of organizations via a single compromised integration supplier.

The persistence mechanism relied closely on the authentic OAuth authorization framework, making detection significantly difficult for safety groups who may not instantly acknowledge malicious exercise disguised as licensed API calls.

By using legitimate integration tokens, the attackers might keep entry even when preliminary entry factors have been found and remediated, highlighting the crucial significance of complete token administration and monitoring inside enterprise environments.

Comply with us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Data, Hunters, Instances, LAPSUS, Launched, Leak, Release, Salesforce, Scattered, Site, Stolen

Post navigation

Previous Post: Mustang Panda Using New DLL Side-Loading Technique to Deliver Malware
Next Post: Hackers Actively Compromising Databases Using Legitimate Commands

Related Posts

Microsoft Patch Tuesday July 2025: 130 Vulnerabilities Fixed Including 41 RCE Cyber Security News
Windows Common Log File System Driver Vulnerability Let Attackers Escalate Privileges Cyber Security News
Biggest Ever GreedyBear Attack With 650 Hacking Tools Stolen $1 Million from Victims Cyber Security News
Authorities Seized Thousands of Servers from Rogue Hosting Company Used to Fuel Cyberattacks Cyber Security News
Apache HTTP Server 2.4.64 Released With Patch for 8 Vulnerabilities Cyber Security News
Threat Actors Claiming Breach of Airpay Payment Gateway Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details
  • Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention
  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • 800+ npm Packages and Thousands of GitHub Repos Compromised

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details
  • Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention
  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • 800+ npm Packages and Thousands of GitHub Repos Compromised

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark