Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Scattered Lapsus$ Hunters Launched a New Leak Site to Release Data Stolen from Salesforce Instances

Posted on October 8, 2025October 8, 2025 By CWS

The infamous cybercriminal collective often called Scattered Lapsus$ Hunters has escalated their extortion marketing campaign by launching a devoted leak website to threaten organizations with the publicity of stolen Salesforce knowledge.

This supergroup, comprised of established risk actors together with ShinyHunters, Scattered Spider, and Lapsus$, represents a classy evolution in ransomware-as-a-service operations that targets one of many world’s most generally used buyer relationship administration platforms.

The group’s emergence signifies a harmful consolidation of cybercriminal experience, combining the technical capabilities and operational information of a number of established risk actors.

Their coordinated strategy demonstrates how fashionable cybercriminal organizations have gotten more and more organized and specialised, specializing in high-value targets that may yield substantial ransom funds.

The collective’s choice to particularly goal Salesforce cases displays their understanding of the platform’s crucial enterprise worth and the delicate buyer knowledge it incorporates.

Working via the TOR Onion community, their extortionware portal lists compromised Salesforce clients alongside claims of how a lot knowledge the group has allegedly exfiltrated throughout their assaults.

UpGuard analysts famous that the web site threatens affected organizations with public knowledge publicity until fee calls for are met, with an preliminary deadline set for October tenth, 2025.

The location’s existence marks a troubling milestone within the commercialization of information theft, remodeling stolen data into leverage for systematic extortion operations.

The assault marketing campaign demonstrates subtle technical execution throughout a number of vectors, starting with social engineering assaults that exploited human vulnerabilities fairly than technical flaws.

The risk actors employed vishing strategies, impersonating IT assist personnel to govern licensed customers into putting in malicious Salesforce integrations, offering the attackers with API-level entry to focus on methods.

OAuth Token Exploitation and Persistence Mechanisms

The group’s most subtle assault vector concerned compromising Salesloft’s GitHub repositories and leveraging legitimate OAuth integration tokens to take care of persistent entry to linked Salesforce environments.

After gaining preliminary entry to Salesloft’s company GitHub account via suspected social engineering, the attackers methodically downloaded repository contents, created unauthorized person accounts inside the group, and established customized workflows to facilitate ongoing entry.

The assault development adopted a calculated strategy the place the risk actors found embedded AWS credentials inside the compromised repositories, enabling them to entry Salesloft Drift’s cloud infrastructure.

Inside this atmosphere, they efficiently recognized and exfiltrated OAuth tokens belonging to Salesloft Drift shoppers, successfully remodeling authentic integration credentials into weapons for widespread knowledge theft.

This system demonstrates how attackers can leverage the interconnected nature of recent SaaS platforms to realize lateral motion throughout a number of organizations via a single compromised integration supplier.

The persistence mechanism relied closely on the authentic OAuth authorization framework, making detection significantly difficult for safety groups who may not instantly acknowledge malicious exercise disguised as licensed API calls.

By using legitimate integration tokens, the attackers might keep entry even when preliminary entry factors have been found and remediated, highlighting the crucial significance of complete token administration and monitoring inside enterprise environments.

Comply with us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Data, Hunters, Instances, LAPSUS, Launched, Leak, Release, Salesforce, Scattered, Site, Stolen

Post navigation

Previous Post: Mustang Panda Using New DLL Side-Loading Technique to Deliver Malware
Next Post: Hackers Actively Compromising Databases Using Legitimate Commands

Related Posts

CISA Warns of Hackers Actively Exploiting Windows Server Update Services RCE Vulnerability in the Wild Cyber Security News
Russian and North Korean Hackers Form Alliances to Attack Organizations Worldwide Cyber Security News
BlackSuit Ransomware Servers Attacking U.S. Critical Infrastructure Seized by Law Enforcement Seizes Cyber Security News
Yurei Ransomware Leverages SMB Shares and Removable Drives to Encrypt Files Cyber Security News
AI Tools Like GPT Direct Users to Phishing Sites Instead of Legitimate Ones Cyber Security News
Threat Actors Using Multilingual ZIP File to Attack Financial and Goverment Organizations Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • In Other News: 8,000 Ransomware Attacks, China Hacked US Gov Emails, IDHS Breach Impacts 700k
  • Threat Actors Attacking Systems with 240+ Exploits Before Ransomware Deployment
  • Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations
  • Tim Kosiba Named NSA Deputy Director
  • Cyber Threats Targeting Australia and New Zealand Fueled by Initial Access Sales, and Ransomware Campaigns

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • In Other News: 8,000 Ransomware Attacks, China Hacked US Gov Emails, IDHS Breach Impacts 700k
  • Threat Actors Attacking Systems with 240+ Exploits Before Ransomware Deployment
  • Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations
  • Tim Kosiba Named NSA Deputy Director
  • Cyber Threats Targeting Australia and New Zealand Fueled by Initial Access Sales, and Ransomware Campaigns

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark