Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
AiTM Phishing Attacks Target SaaS Platforms

AiTM Phishing Attacks Target SaaS Platforms

Posted on May 2, 2026 By CWS

Recent cybersecurity investigations reveal a shift towards high-speed, software-as-a-service (SaaS) centric attacks by threat actors, bypassing traditional endpoint defenses. Two groups, labeled CORDIAL SPIDER and SNARKY SPIDER, have been actively involved in these data theft operations since October 2025.

Exploitation of SaaS Environments

Operating primarily within trusted SaaS platforms like SharePoint, HubSpot, and Google Workspace, these groups leverage single sign-on (SSO) integrations. This strategy reduces their visibility, complicating detection efforts for enterprise security teams.

Initial Access Through Vishing

The attackers begin their campaigns using voice phishing (vishing) techniques. By posing as IT support, they create a false urgency to lure employees to fake login pages that mimic legitimate corporate portals. Once credentials are entered, attackers capture authentication data and session tokens without victims’ knowledge.

These stolen credentials allow access to the organization’s identity provider, enabling lateral movement across multiple connected SaaS applications. Attackers further secure their foothold by altering multifactor authentication (MFA) settings, often registering their own devices.

Executing Rapid Data Exfiltration

Once access is established, threat actors conduct targeted searches within SaaS platforms for valuable information. SNARKY SPIDER is known to begin data exfiltration within an hour, targeting critical documents and credentials.

To avoid detection, these groups use VPNs and proxy networks to obscure their locations. Providers like Mullvad and NetNut assign residential IP addresses, making malicious traffic appear legitimate. CrowdStrike Falcon Shield employs advanced detection techniques to identify such anonymization efforts and protect against these high-speed threats.

Ensuring robust SaaS security posture management and implementing advanced anomaly detection are crucial for defending against these sophisticated attacks.

Cyber Security News Tags:AiTM phishing, CrowdStrike, cyber threats, Cybersecurity, data theft, Google Workspace, HubSpot, MFA, network security, proxy networks, SaaS security, SharePoint, SSO, Vishing, VPN

Post navigation

Previous Post: Trellix Reports Source Code Breach Incident
Next Post: Cybercriminals Exploit Google Services in Facebook Phishing

Related Posts

APT Hackers Attacking Indian Government Using GOGITTER tool and GITSHELLPAD Malware APT Hackers Attacking Indian Government Using GOGITTER tool and GITSHELLPAD Malware Cyber Security News
Fired Techie Admits Hacking Employer’s Network in Retaliation for Termination Fired Techie Admits Hacking Employer’s Network in Retaliation for Termination Cyber Security News
Gootloader with Low Detection Rate Bypasses Most Security Tools Gootloader with Low Detection Rate Bypasses Most Security Tools Cyber Security News
Building a Cyber-Resilient Organization CISOs Roadmap Building a Cyber-Resilient Organization CISOs Roadmap Cyber Security News
VoidLink Malware Targets Kubernetes and Cloud Systems VoidLink Malware Targets Kubernetes and Cloud Systems Cyber Security News
Critical UXSS Vulnerability Patched in DuckDuckGo Android Browser Critical UXSS Vulnerability Patched in DuckDuckGo Android Browser Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Cybercriminals Exploit Google Services in Facebook Phishing
  • AiTM Phishing Attacks Target SaaS Platforms
  • Trellix Reports Source Code Breach Incident
  • Critical cPanel Vulnerability Exploited, Thousands at Risk
  • Engineering’s Role in AI Development

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Cybercriminals Exploit Google Services in Facebook Phishing
  • AiTM Phishing Attacks Target SaaS Platforms
  • Trellix Reports Source Code Breach Incident
  • Critical cPanel Vulnerability Exploited, Thousands at Risk
  • Engineering’s Role in AI Development

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark