Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Canva, Atlassian, Epic Games Among the 100+ Enterprises Targeted by ShinyHunters Group

Posted on January 27, 2026January 27, 2026 By CWS

A serious identity-theft operation is now concentrating on over 100 high-value organizations throughout a number of industries.

The risk comes from SLSH, a harmful alliance combining the techniques of Scattered Spider, LAPSUS$, and ShinyHunters.

In contrast to typical automated assaults, this marketing campaign makes use of actual individuals calling your staff whereas concurrently working pretend login pages that look precisely like your organization’s system.

The attackers purpose to steal credentials and safety tokens from Okta and different single sign-on companies, which act like grasp keys to entry each utility inside a corporation.

The marketing campaign primarily makes use of a software known as a “dwell phishing panel.” This infrastructure permits attackers to intercept login info and safety codes in real-time, even bypassing multi-factor authentication protections.

Main targets embody Canva, Atlassian, Epic Video games, HubSpot, and dozens of economic establishments, healthcare suppliers, and actual property firms.

Silentpush analysts recognized the surge in malicious infrastructure deployment and acknowledged the assault patterns matching SLSH’s identified operations from “The Com” ecosystem.

Silentpush analysts famous this wasn’t a random scanning assault however reasonably a rigorously deliberate concentrating on of enterprises with substantial digital property.

The risk actors use voice phishing, or “vishing,” the place they name firm assist desks and staff impersonating IT employees requesting password resets or system entry.

As they make these calls, they manipulate a pretend login web page matching precisely what seems on the sufferer’s display, making a convincing social engineering state of affairs.

How the Reside Phishing Panel Works

The an infection mechanism depends on human-led orchestration reasonably than automated malware deployment.

As soon as attackers achieve preliminary entry by way of vishing and credential theft, they use the stolen single sign-on session as a basis for deeper intrusion.

This single compromised session turns into what attackers name a “skeleton key” giving them potential entry to each linked utility throughout the goal group.

The attackers then transfer laterally into inner communication techniques like Slack or Groups, the place they impersonate official staff to trick directors into granting increased privileges.

Following the LAPSUS$ playbook, the marketing campaign progresses by way of knowledge theft and extortion. Attackers quickly obtain delicate info after which demand ransom, threatening to publish stolen knowledge publicly.

In some instances, they encrypt enterprise techniques to extend strain for fee.

Organizations on the vital goal record detected by Silentpush ought to deal with this risk as an emergency, warning all staff about ongoing vishing makes an attempt and auditing their single sign-on logs instantly for suspicious gadget enrollments or unfamiliar login places.

Observe us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Among, Atlassian, Canva, Enterprises, Epic, Games, Group, ShinyHunters, Targeted

Post navigation

Previous Post: Hackers Using Teams to Deliver Malicious Content Posing as Microsoft Services
Next Post: G_Wagon npm Package Attacking Users to Exfiltrates Browser Credentials using Obfuscated Payload

Related Posts

Apple Font Parser Vulnerability Enables Malicious Fonts to Crash or Corrupt Process Memory Cyber Security News
Microsoft Fixes Windows 11 24H2 Audio Issue that Stops Bluetooth Headsets and Speakers Working Cyber Security News
Women’s Dating App Tea Exposes Selfie Images of 13,000 Users Cyber Security News
Konfety Android Malware on Google Play Uses ZIP Manipulation to Imitate Legitimate Apps Cyber Security News
Hackers Can Bypass EDR by Downloading Malicious File as In-Memory PE Loader Cyber Security News
Federal IT contractor Agrees to Pay $14.75M Over False Cybersecurity Services Claim Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical Vulnerability in VM2 Sandbox Library for Node.js Let Attackers run Untrusted Code
  • Attackers Hijacking Official GitHub Desktop Repository to Distribute Malware as Official Installer
  • Instagram, Facebook, and WhatsApp to Test New Premium Subscriptions
  • WhatsApp Rolls Out Lockdown-Style Security Mode to Protect Targeted Users From Spyware
  • Experts Detect Pakistan-Linked Cyber Campaigns Aimed at Indian Government Entities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical Vulnerability in VM2 Sandbox Library for Node.js Let Attackers run Untrusted Code
  • Attackers Hijacking Official GitHub Desktop Repository to Distribute Malware as Official Installer
  • Instagram, Facebook, and WhatsApp to Test New Premium Subscriptions
  • WhatsApp Rolls Out Lockdown-Style Security Mode to Protect Targeted Users From Spyware
  • Experts Detect Pakistan-Linked Cyber Campaigns Aimed at Indian Government Entities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark