Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Canva, Atlassian, Epic Games Among the 100+ Enterprises Targeted by ShinyHunters Group

Canva, Atlassian, Epic Games Among the 100+ Enterprises Targeted by ShinyHunters Group

Posted on January 27, 2026January 27, 2026 By CWS

A serious identity-theft operation is now concentrating on over 100 high-value organizations throughout a number of industries.

The risk comes from SLSH, a harmful alliance combining the techniques of Scattered Spider, LAPSUS$, and ShinyHunters.

In contrast to typical automated assaults, this marketing campaign makes use of actual individuals calling your staff whereas concurrently working pretend login pages that look precisely like your organization’s system.

The attackers purpose to steal credentials and safety tokens from Okta and different single sign-on companies, which act like grasp keys to entry each utility inside a corporation.

The marketing campaign primarily makes use of a software known as a “dwell phishing panel.” This infrastructure permits attackers to intercept login info and safety codes in real-time, even bypassing multi-factor authentication protections.

Main targets embody Canva, Atlassian, Epic Video games, HubSpot, and dozens of economic establishments, healthcare suppliers, and actual property firms.

Silentpush analysts recognized the surge in malicious infrastructure deployment and acknowledged the assault patterns matching SLSH’s identified operations from “The Com” ecosystem.

Silentpush analysts famous this wasn’t a random scanning assault however reasonably a rigorously deliberate concentrating on of enterprises with substantial digital property.

The risk actors use voice phishing, or “vishing,” the place they name firm assist desks and staff impersonating IT employees requesting password resets or system entry.

As they make these calls, they manipulate a pretend login web page matching precisely what seems on the sufferer’s display, making a convincing social engineering state of affairs.

How the Reside Phishing Panel Works

The an infection mechanism depends on human-led orchestration reasonably than automated malware deployment.

As soon as attackers achieve preliminary entry by way of vishing and credential theft, they use the stolen single sign-on session as a basis for deeper intrusion.

This single compromised session turns into what attackers name a “skeleton key” giving them potential entry to each linked utility throughout the goal group.

The attackers then transfer laterally into inner communication techniques like Slack or Groups, the place they impersonate official staff to trick directors into granting increased privileges.

Following the LAPSUS$ playbook, the marketing campaign progresses by way of knowledge theft and extortion. Attackers quickly obtain delicate info after which demand ransom, threatening to publish stolen knowledge publicly.

In some instances, they encrypt enterprise techniques to extend strain for fee.

Organizations on the vital goal record detected by Silentpush ought to deal with this risk as an emergency, warning all staff about ongoing vishing makes an attempt and auditing their single sign-on logs instantly for suspicious gadget enrollments or unfamiliar login places.

Observe us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Among, Atlassian, Canva, Enterprises, Epic, Games, Group, ShinyHunters, Targeted

Post navigation

Previous Post: Hackers Using Teams to Deliver Malicious Content Posing as Microsoft Services
Next Post: G_Wagon npm Package Attacking Users to Exfiltrates Browser Credentials using Obfuscated Payload

Related Posts

CISA Shares New Threat Detections for Actively Exploited WSUS Vulnerability CISA Shares New Threat Detections for Actively Exploited WSUS Vulnerability Cyber Security News
CISA Warns of Android 0-Day Use-After-Free Vulnerability Exploited in Attacks CISA Warns of Android 0-Day Use-After-Free Vulnerability Exploited in Attacks Cyber Security News
WhatsApp New Strict Account Settings Option to Protect Your Account from Hackers WhatsApp New Strict Account Settings Option to Protect Your Account from Hackers Cyber Security News
Critical UXSS Vulnerability Patched in DuckDuckGo Android Browser Critical UXSS Vulnerability Patched in DuckDuckGo Android Browser Cyber Security News
Trigona Ransomware Group Crafts Custom Data Theft Tool Trigona Ransomware Group Crafts Custom Data Theft Tool Cyber Security News
Global Authorities Share IoCs and TTPs of Scattered Spider Behind Major ESXi Ransomware Attacks Global Authorities Share IoCs and TTPs of Scattered Spider Behind Major ESXi Ransomware Attacks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark