Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

A Cybercrime Merger Like No Other — Scattered Spider, LAPSUS$, and ShinyHunters Join Forces

Posted on November 4, 2025November 4, 2025 By CWS

The nascent collective that mixes three distinguished cybercrime teams, Scattered Spider, LAPSUS$, and ShinyHunters, has created a minimum of 16 Telegram channels since August 8, 2025.
“Since its debut, the group’s Telegram channels have been eliminated and recreated no less than 16 occasions underneath various iterations of the unique identify – a recurring cycle reflecting platform moderation and the operators’ willpower to maintain this particular sort of public presence regardless of disruption,” Trustwave SpiderLabs, a LevelBlue firm, mentioned in a report shared with The Hacker Information.
Scattered LAPSUS$ Hunters (SLH) emerged in early August, launching information extortion assaults in opposition to organizations, together with these utilizing Salesforce in current months. Chief amongst its choices is an extortion-as-a-service (EaaS) that different associates can be a part of to demand a fee from targets in trade for utilizing the “model” and notoriety of the consolidated entity.
All three teams are assessed to be affiliated with a loose-knit and federated cybercriminal enterprise known as The Com that is marked by “fluid collaboration and brand-sharing.” The risk actors have since exhibited their associations with different adjoining clusters tracked as CryptoChameleon and Crimson Collective.

Telegram, in accordance with the cybersecurity vendor, continues to be the central place for its members to coordinate and convey visibility to the group’s operations, embracing a mode akin to hacktivist teams. This serves a fold goal: turning its channels right into a megaphone for the risk actors to disseminate their messaging, in addition to market their companies.

“As exercise matured, administrative posts started to incorporate signatures referencing the ‘SLH/SLSH Operations Centre,’ a self-applied label carrying symbolic weight that projected the picture of an organized command construction that lent bureaucratic legitimacy to in any other case fragmented communications,” Trustwave famous.
Noticed Telegram channels and exercise durations
Members of the group have additionally used Telegram to accuse Chinese language state actors of exploiting vulnerabilities allegedly focused by them, whereas concurrently taking goal at U.S. and U.Ok. legislation enforcement companies. Moreover, they’ve been discovered to ask channel subscribers to take part in strain campaigns by discovering the e-mail addresses of C-suite executives and relentlessly emailing them in return for a minimal fee of $100.
A few of the identified risk clusters a part of the crew are listed beneath, highlighting a cohesive alliance that brings collectively a number of semi-autonomous teams inside The Com community and their technical capabilities underneath one umbrella –

Shinycorp (aka sp1d3rhunters), who acts as a coordinator and manages model notion
UNC5537 (linked to Snowflake extortion marketing campaign)
UNC3944 (related to Scattered Spider)
UNC6040 (linked to current Salesforce vishing marketing campaign)

Additionally a part of the group are identities like Rey and SLSHsupport, who’re chargeable for sustaining engagement, together with yuka (aka Yukari or Cvsp), who has a historical past of growing exploits and presents themselves as an preliminary entry dealer (IAB).
Consolidated administrative and affiliated personas
Whereas information theft and extortion proceed to be Scattered LAPSUS$ Hunters’ mainstay, the risk actors have hinted at a customized ransomware household named Sh1nySp1d3r (aka ShinySp1d3r) to rival LockBit and DragonForce, suggesting doable ransomware operations sooner or later.
Trustwave has characterised the risk actors as positioned someplace within the spectrum of financially motivated cybercrime and attention-driven hacktivism, commingling financial incentives and social validation to gas their actions.
“Via theatrical branding, reputational recycling, cross-platform amplification, and layered identification administration, the actors behind SLH have proven a mature grasp of how notion and legitimacy might be weaponized inside the cybercriminal ecosystem,” it added.
“Taken collectively, these behaviors illustrate an operational construction that mixes social engineering, exploit improvement, and narrative warfare – a mix extra attribute of established underground actors than opportunistic newcomers.”
Cartelization of One other Form
The disclosure comes as Acronis revealed that the risk actors behind DragonForce have unleashed a brand new malware variant that makes use of weak drivers reminiscent of truesight.sys and rentdrv2.sys (a part of BadRentdrv2) to disable safety software program and terminate protected processes as a part of a carry your individual weak driver (BYOVD) assault.

DragonForce, which launched a ransomware cartel earlier this 12 months, has since additionally partnered with Qilin and LockBit in an try to “facilitate the sharing of methods, assets, and infrastructure” and bolster their very own particular person capabilities.

“Associates can deploy their very own malware whereas utilizing DragonForce’s infrastructure and working underneath their very own model,” Acronis researchers mentioned. “This lowers the technical barrier and permits each established teams and new actors to run operations with out constructing a full ransomware ecosystem.”
The ransomware group, per the Singapore headquartered firm, is aligned with Scattered Spider, with the latter functioning as an affiliate to interrupt into targets of curiosity by subtle social engineering methods like spear-phishing and vishing, adopted by deploying distant entry instruments like ScreenConnect, AnyDesk, TeamViewer, and Splashtop to conduct intensive reconnaissance previous to dropping DragonForce.
“DragonForce used the Conti leaked supply code to forge a darkish successor crafted to hold its personal mark,” it mentioned. “Whereas different teams made some modifications to the code to provide it a special spin, DragonForce stored all performance unchanged, solely including an encrypted configuration within the executable to do away with command-line arguments that have been used within the authentic Conti code.”

The Hacker News Tags:Cybercrime, Forces, Join, LAPSUS, Merger, Scattered, ShinyHunters, Spider

Post navigation

Previous Post: Critical RCE Vulnerability in Popular React Native NPM Package Exposes Developers to Attacks

Related Posts

New Linux Flaws Enable Full Root Access via PAM and Udisks Across Major Distributions The Hacker News
The CTEM Conversation We All Need The Hacker News
CISA Flags Adobe AEM Flaw with Perfect 10.0 Score — Already Under Active Attack The Hacker News
Hackers Deploy Stealth Backdoor in WordPress Mu-Plugins to Maintain Admin Access The Hacker News
Chinese Hackers RedNovember Target Global Governments Using Pantegana and Cobalt Strike The Hacker News
SaaS Breaches Start with Tokens The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • A Cybercrime Merger Like No Other — Scattered Spider, LAPSUS$, and ShinyHunters Join Forces
  • Critical RCE Vulnerability in Popular React Native NPM Package Exposes Developers to Attacks
  • Critical Flaw in Popular React Native NPM Package Exposes Developers to Attacks
  • Europol and Eurojust Dismantle €600 Million Crypto Fraud Network in Global Sweep
  • Bob Flores, Former CTO of the CIA, Joins Brinker

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • A Cybercrime Merger Like No Other — Scattered Spider, LAPSUS$, and ShinyHunters Join Forces
  • Critical RCE Vulnerability in Popular React Native NPM Package Exposes Developers to Attacks
  • Critical Flaw in Popular React Native NPM Package Exposes Developers to Attacks
  • Europol and Eurojust Dismantle €600 Million Crypto Fraud Network in Global Sweep
  • Bob Flores, Former CTO of the CIA, Joins Brinker

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News