Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

ShinyHunters-Branded Extortion Activity Expands, Escalates

Posted on February 2, 2026February 2, 2026 By CWS

ShinyHunters-branded extortion assaults are increasing and escalating, counting on efficient social engineering ways to compromise cloud environments, Mandiant cautions.

The warning comes solely days after stories that the ShinyHunters group has arrange infrastructure to focus on greater than 100 organizations throughout a number of sectors, together with Atlassian, Adyen, Canva, Epic Video games, HubSpot, Moderna, ZoomInfo, GameStop, WeWork, Halliburton, Sonos, and Telstra.

A recognized extortion group, ShinyHunters was seen registering pretend domains to focus on these corporations, utilizing specialised phishing kits for credential harvesting.

ShinyHunters-linked actors have been seen utilizing vishing to focus on single sign-on (SSO) authentication and compromise enterprises’ cloud-based software-as-a-service (SaaS) environments, and Mandiant’s alert reinforces the remark.

“These campaigns leverage developed voice phishing (vishing) and victim-branded credential harvesting to efficiently compromise single sign-on (SSO) credentials and enroll unauthorized gadgets into sufferer multi-factor authentication (MFA) options,” the Google-owned cybersecurity agency notes.

Okta lately warned of such assaults, by which the hackers intercepted credentials and tricked their victims into aiding them bypass MFA, deploying scripts to manage authentication flows within the victims’ browsers in actual time.Commercial. Scroll to proceed studying.

As soon as an intrusion is detected, organizations ought to prioritize fast containment to dam the attackers’ entry and forestall additional information exfiltration, Mandiant says.

“As a result of these campaigns depend on legitimate credentials relatively than malware, containment should prioritize the revocation of session tokens and the restriction of id and entry administration operations,” the corporate notes.

Recommendation for organizations

Organizations are suggested to determine and disable compromised accounts, revoke lively session tokens and OAuth authorizations, disable or closely limit public self-service password reset portals, and briefly disable MFA registration.

Moreover, they need to limit or briefly disable VPNs, digital desktop infrastructure (VDI) and comparable distant entry factors, limit entry to id supplier and SaaS functions, and undertake handbook, high-assurance verification protocols for account-related requests.

“When acceptable, organizations must also talk with end-users, HR companions, and different enterprise items to remain on high-alert throughout the preliminary containment part. At all times report suspicious exercise to inside IT and Safety for additional investigation,” Mandiant notes.

A hardened verification course of ought to embody high-assurance paths similar to stay video calls, out-of-band approvals from customers’ managers, and calls to customers’ recognized good numbers.

Helpdesk staff mustn’t present entry or data throughout inbound calls and may independently contact the corporate’s designated account supervisor for specific verification of entry requests.

Organizations must also educate their customers on figuring out vishing and phishing makes an attempt, on being cautious of requests to vary their passwords, particularly throughout off-business hours, and on not sharing passwords.

“Organizations ought to implement a layered collection of controls to guard all forms of identities. Entry to cloud id suppliers (IdPs), cloud consoles, SaaS functions, doc and code repositories ought to be restricted since these platforms usually grow to be the management aircraft for privilege escalation, information entry, and long-term persistence,” Mandiant notes.

Associated: Researchers Lure Scattered Lapsus$ Hunters in Honeypot

Associated: In Different Information: 600k Hit by Healthcare Breaches, Main ShinyHunters Hacks, DeepSeek’s Coding Bias

Associated: Safety Trade Skeptical of Scattered Spider-ShinyHunters Retirement Claims

Associated: Scattered Spider Suspect Arrested in US

Security Week News Tags:Activity, Escalates, Expands, Extortion, ShinyHuntersBranded

Post navigation

Previous Post: New Punishing Owl Hacker Group Targeting Networks of Russian Government Security Agency
Next Post: Microsoft Begins NTLM Phase-Out With Three-Stage Plan to Move Windows to Kerberos

Related Posts

Rethinking Security for Agentic AI Security Week News
Chrome to Turn HTTPS on by Default for Public Sites Security Week News
MIND Raises $30 Million for Data Loss Prevention Security Week News
Cybersecurity M&A Roundup: 41 Deals Announced in June 2025 Security Week News
Oracle E-Business Suite Zero-Day Exploited in Cl0p Attacks Security Week News
MacSync macOS Malware Distributed via Signed Swift Application Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Begins NTLM Phase-Out With Three-Stage Plan to Move Windows to Kerberos
  • ShinyHunters-Branded Extortion Activity Expands, Escalates
  • New Punishing Owl Hacker Group Targeting Networks of Russian Government Security Agency
  • Pulsar RAT Attacking Windows Systems via Per-user Run Registry Key and Exfiltrates Sensitive Details
  • Open VSX Publisher Account Hijacked in Fresh GlassWorm Attack

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Begins NTLM Phase-Out With Three-Stage Plan to Move Windows to Kerberos
  • ShinyHunters-Branded Extortion Activity Expands, Escalates
  • New Punishing Owl Hacker Group Targeting Networks of Russian Government Security Agency
  • Pulsar RAT Attacking Windows Systems via Per-user Run Registry Key and Exfiltrates Sensitive Details
  • Open VSX Publisher Account Hijacked in Fresh GlassWorm Attack

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark