Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

ShinyHunters Possibly Collaborates With Scattered Spider in Salesforce Attack Campaigns

Posted on August 14, 2025August 14, 2025 By CWS

The infamous ShinyHunters cybercriminal group has emerged from a year-long hiatus with a complicated new wave of assaults focusing on Salesforce platforms throughout main organizations, together with high-profile victims like Google.

This resurgence marks a major tactical evolution for the financially motivated risk actors, who’ve historically targeted on database exploitation and credential theft reasonably than the complicated social engineering schemes now being employed.

What makes this marketing campaign notably alarming is its putting resemblance to operations usually attributed to the Scattered Spider hacking collective.

The convergence of ways suggests a possible collaboration between these two formidable risk teams, elevating issues about an escalating panorama of coordinated cybercriminal exercise.

The assaults have particularly focused organizations throughout retail, aviation, and insurance coverage sectors, with victims spanning luxurious manufacturers and expertise service suppliers.

ShinyHunters first gained notoriety by promoting 91 million Tokopedia person information on the market on “Empire Market” in 2020 (Supply – Reliaquest)

ReliaQuest analysts recognized compelling proof supporting this collaboration idea by means of complete area evaluation and infrastructure investigation.

The analysis revealed coordinated ticket-themed phishing domains and Salesforce credential harvesting pages, indicating a scientific strategy to sufferer focusing on.

Most notably, investigators found the emergence of a BreachForums person with the alias “Sp1d3rhunters”—a intelligent mixture of each group names—who was linked to earlier ShinyHunters breaches and appeared to leak Ticketmaster information in July 2024.

The technical sophistication of those assaults represents a major departure from ShinyHunters’ historic strategies.

The group has adopted Scattered Spider‘s signature methods, together with extremely focused vishing campaigns the place attackers impersonate IT assist employees to control victims into authorizing malicious “linked apps.”

These functions masquerade as respectable Salesforce instruments whereas enabling large-scale information exfiltration.

Superior Infrastructure and Evasion Strategies

The marketing campaign’s infrastructure reveals meticulous planning and superior evasion capabilities.

Investigators uncovered a number of malicious domains registered between June 20-30, 2025, following constant naming patterns similar to ticket-lvmh.com, ticket-dior.com, and ticket-louisvuitton.com.

These domains shared frequent registry traits, together with registration by means of GMO Web utilizing momentary e-mail addresses like [email protected] and Cloudflare-masked nameservers for added obfuscation.

Okta phishing web page hosted at ticket-dior[.]com in June 2025 (Supply – Reliaquest)

The attackers deployed subtle phishing kits internet hosting single sign-on (SSO) login pages, with domains like dashboard-salesforce.com actively serving Okta-branded credential harvesting interfaces.

Phishing web page hosted at dashboard-salesforce[.]com (Supply – Reliaquest)

The malicious infrastructure leveraged VPN obfuscation by means of Mullvad VPN providers to carry out information exfiltration from compromised Salesforce cases.

Notably regarding is the rebranding of respectable Salesforce “Information Loader” functions as “My Ticket Portal” throughout vishing campaigns, demonstrating the group’s capacity to weaponize acquainted enterprise instruments towards unsuspecting staff.

This tactical evolution, mixed with the synchronized focusing on patterns noticed throughout each ShinyHunters and Scattered Spider operations, means that monetary providers and expertise suppliers ought to put together for intensified assaults within the coming months.

Enhance your SOC and assist your group defend your online business with free top-notch risk intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Attack, Campaigns, Collaborates, Possibly, Salesforce, Scattered, ShinyHunters, Spider

Post navigation

Previous Post: “AI-Induced Destruction” – Helpful Tools Become Accidental Weapons
Next Post: Critical WordPress Plugin Vulnerability Exposes 70,000+ Sites to RCE Attacks

Related Posts

Web-to-App Funnels: Pros And Cons Cyber Security News
SparkKitty Attacks iOS and Android Devices in Wild Via App Store and Google Play Cyber Security News
Critical Convoy Vulnerability Let Attackers Execute Remote Code on Affected Servers Cyber Security News
Hundreds of GitHub Malware Repos Targeting Novice Cybercriminals Linked to Single User Cyber Security News
PoC Exploit Released for Fortinet 0-Day Vulnerability that Allows Remote Code Execution Cyber Security News
UNC3886 Actors Know for Exploiting 0-Days Attacking Singapore’s Critical Infrastructure Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Using Dedicated Phishlet to Launch FIDO Authentication Downgrade Attacks
  • Have You Turned Off Your Virtual Oven?
  • ‘MadeYouReset’ HTTP2 Vulnerability Enables Massive DDoS Attacks
  • Simple Steps for Attack Surface Reduction
  • Passkey Login Bypassed via WebAuthn Process Manipulation

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Using Dedicated Phishlet to Launch FIDO Authentication Downgrade Attacks
  • Have You Turned Off Your Virtual Oven?
  • ‘MadeYouReset’ HTTP2 Vulnerability Enables Massive DDoS Attacks
  • Simple Steps for Attack Surface Reduction
  • Passkey Login Bypassed via WebAuthn Process Manipulation

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News