Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Canva, Atlassian, Epic Games Among the 100+ Enterprises Targeted by ShinyHunters Group

Canva, Atlassian, Epic Games Among the 100+ Enterprises Targeted by ShinyHunters Group

Posted on January 27, 2026January 27, 2026 By CWS

A serious identity-theft operation is now concentrating on over 100 high-value organizations throughout a number of industries.

The risk comes from SLSH, a harmful alliance combining the techniques of Scattered Spider, LAPSUS$, and ShinyHunters.

In contrast to typical automated assaults, this marketing campaign makes use of actual individuals calling your staff whereas concurrently working pretend login pages that look precisely like your organization’s system.

The attackers purpose to steal credentials and safety tokens from Okta and different single sign-on companies, which act like grasp keys to entry each utility inside a corporation.

The marketing campaign primarily makes use of a software known as a “dwell phishing panel.” This infrastructure permits attackers to intercept login info and safety codes in real-time, even bypassing multi-factor authentication protections.

Main targets embody Canva, Atlassian, Epic Video games, HubSpot, and dozens of economic establishments, healthcare suppliers, and actual property firms.

Silentpush analysts recognized the surge in malicious infrastructure deployment and acknowledged the assault patterns matching SLSH’s identified operations from “The Com” ecosystem.

Silentpush analysts famous this wasn’t a random scanning assault however reasonably a rigorously deliberate concentrating on of enterprises with substantial digital property.

The risk actors use voice phishing, or “vishing,” the place they name firm assist desks and staff impersonating IT employees requesting password resets or system entry.

As they make these calls, they manipulate a pretend login web page matching precisely what seems on the sufferer’s display, making a convincing social engineering state of affairs.

How the Reside Phishing Panel Works

The an infection mechanism depends on human-led orchestration reasonably than automated malware deployment.

As soon as attackers achieve preliminary entry by way of vishing and credential theft, they use the stolen single sign-on session as a basis for deeper intrusion.

This single compromised session turns into what attackers name a “skeleton key” giving them potential entry to each linked utility throughout the goal group.

The attackers then transfer laterally into inner communication techniques like Slack or Groups, the place they impersonate official staff to trick directors into granting increased privileges.

Following the LAPSUS$ playbook, the marketing campaign progresses by way of knowledge theft and extortion. Attackers quickly obtain delicate info after which demand ransom, threatening to publish stolen knowledge publicly.

In some instances, they encrypt enterprise techniques to extend strain for fee.

Organizations on the vital goal record detected by Silentpush ought to deal with this risk as an emergency, warning all staff about ongoing vishing makes an attempt and auditing their single sign-on logs instantly for suspicious gadget enrollments or unfamiliar login places.

Observe us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Among, Atlassian, Canva, Enterprises, Epic, Games, Group, ShinyHunters, Targeted

Post navigation

Previous Post: Hackers Using Teams to Deliver Malicious Content Posing as Microsoft Services
Next Post: G_Wagon npm Package Attacking Users to Exfiltrates Browser Credentials using Obfuscated Payload

Related Posts

Multiple Gitlab Security Vulnerabilities Let Attackers Trigger DoS Condition Multiple Gitlab Security Vulnerabilities Let Attackers Trigger DoS Condition Cyber Security News
Hundreds of GitHub Malware Repos Targeting Novice Cybercriminals Linked to Single User Hundreds of GitHub Malware Repos Targeting Novice Cybercriminals Linked to Single User Cyber Security News
Inside the Leaks that Exposed the Hidden Infrastructure Behind a Ransomware Operation Inside the Leaks that Exposed the Hidden Infrastructure Behind a Ransomware Operation Cyber Security News
ScriptCase Vulnerabilities Let Attackers Execute Remote Code and Gain Server Access ScriptCase Vulnerabilities Let Attackers Execute Remote Code and Gain Server Access Cyber Security News
Critical Chrome Update Fixes High-Severity Vulnerabilities Critical Chrome Update Fixes High-Severity Vulnerabilities Cyber Security News
2025-8088 – WinRAR 0-Day Path Traversal Vulnerability Exploited to Execute Malware 2025-8088 – WinRAR 0-Day Path Traversal Vulnerability Exploited to Execute Malware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News