Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Scattered Lapsus$ Hunters Registered 40+ Domains Mimicking Zendesk Environments

Posted on November 28, 2025November 28, 2025 By CWS

A complicated, advanced new cyber offensive has emerged from the “Scattered Lapsus$ Hunters,” a risk collective that has aggressively shifted towards exploiting supply-chain vulnerabilities.

This newest marketing campaign targets Zendesk, a vital buyer assist platform, successfully turning a trusted enterprise device right into a launchpad for company spying.

The attackers have efficiently registered over 40 typosquatted domains, together with misleading examples like znedesk[.]com and vpn-zendesk[.]com.

These websites are meticulously designed to imitate official login environments, internet hosting fraudulent Single Signal-On (SSO) portals that seize credentials from unsuspecting customers.

The marketing campaign’s infrastructure reveals a coordinated effort to bypass customary detection protocols. The domains had been constantly registered via NiceNic and use Cloudflare-masked nameservers to cover their true internet hosting origins.

By utilizing these hiding methods, the actors guarantee their phishing pages stay lively lengthy sufficient to reap vital volumes of high-privilege credentials earlier than defenders can react.

This demonstrates a transparent, strategic evolution of their capabilities, permitting them to keep up operational secrecy whereas concentrating on widespread platforms utilized by world enterprises.

The impression of this focused method extends far past easy credential theft. Reliaquest safety analysts recognized the malware and famous that the marketing campaign shares distinct area registry traits with the group’s earlier assaults on Salesforce in August 2025.

As soon as attackers bypass the preliminary authentication layer, they set up a persistent foothold that facilitates lateral motion throughout the company community.

This entry permits them to steal extremely delicate buyer information, together with billing data and authorities IDs, mirroring the huge information theft seen of their September 2025 breach of Discord.

Weaponizing Help Tickets

The group’s most harmful tactic entails the direct weaponization of official assist tickets to bypass conventional perimeter defenses.

As a substitute of relying solely on exterior phishing emails, they submit fraudulent tickets immediately into a corporation’s Zendesk portal.

These tickets sometimes masquerade as pressing system administration requests or password reset inquiries, making a fabricated sense of urgency that compels assist brokers to behave with out verification.

Embedded inside these tickets are hyperlinks to the typosquatted domains or malicious payloads designed to compromise the endpoint.

When a help-desk worker interacts with the ticket, they by chance set off the obtain of Distant Entry Trojans (RATs).

This grants the attackers persistent distant management, permitting them to execute instructions and monitor exercise.

Scattered Lapsus$ Hunters Telegram submit (Supply – Reliaquest)

The group has openly boasted about these advanced operations, particularly warning incident response groups to look at their logs carefully as they put together to gather important buyer databases via the upcoming 2026 vacation season.

Comply with us on Google Information, LinkedIn, and X to Get Extra On the spot Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Domains, Environments, Hunters, LAPSUS, Mimicking, Registered, Scattered, Zendesk

Post navigation

Previous Post: Vulnerable Codes in Legacy Python Packages Enables Attacks on Python Package Index Via Domain Compromise
Next Post: Shai Hulud 2.0 Compromises 1,200+ Organizations, Exposing Critical Runtime Secrets

Related Posts

Silicon Valley Engineer Pleads Guilty to Stealing Missile Detection Data for China Cyber Security News
Iran-Nexus Hackers Abuses Omani Mailbox to Target Global Governments Cyber Security News
New RatOn Takes Control Over Bank Account and Initiates Automated Money Transfers Cyber Security News
Cl0P Ransomware Group Allegedly Claims Breach of Entrust in Oracle 0-Day EBS Hack Cyber Security News
Auditing Data Access Controls for Privacy Regulation Adherence Cyber Security News
HPE OneView Software Vulnerability Let Attackers Execute Remote Code Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Threat Actors Leverage Real Enterprise Email Threads to Deliver Phishing Links
  • TP-Link Archer Vulnerability Let Attackers Take Control Over the Router
  • Russian ELECTRUM Tied to December 2025 Cyber Attack on Polish Power Grid
  • Cyber Insights 2026: Offensive Security; Where It is and Where Its Going
  • Mesh Security Raises $12 Million for CSMA Platform

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Threat Actors Leverage Real Enterprise Email Threads to Deliver Phishing Links
  • TP-Link Archer Vulnerability Let Attackers Take Control Over the Router
  • Russian ELECTRUM Tied to December 2025 Cyber Attack on Polish Power Grid
  • Cyber Insights 2026: Offensive Security; Where It is and Where Its Going
  • Mesh Security Raises $12 Million for CSMA Platform

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark