Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
ShinyHunters-Branded Extortion Activity Expands, Escalates

ShinyHunters-Branded Extortion Activity Expands, Escalates

Posted on February 2, 2026February 2, 2026 By CWS

ShinyHunters-branded extortion assaults are increasing and escalating, counting on efficient social engineering ways to compromise cloud environments, Mandiant cautions.

The warning comes solely days after stories that the ShinyHunters group has arrange infrastructure to focus on greater than 100 organizations throughout a number of sectors, together with Atlassian, Adyen, Canva, Epic Video games, HubSpot, Moderna, ZoomInfo, GameStop, WeWork, Halliburton, Sonos, and Telstra.

A recognized extortion group, ShinyHunters was seen registering pretend domains to focus on these corporations, utilizing specialised phishing kits for credential harvesting.

ShinyHunters-linked actors have been seen utilizing vishing to focus on single sign-on (SSO) authentication and compromise enterprises’ cloud-based software-as-a-service (SaaS) environments, and Mandiant’s alert reinforces the remark.

“These campaigns leverage developed voice phishing (vishing) and victim-branded credential harvesting to efficiently compromise single sign-on (SSO) credentials and enroll unauthorized gadgets into sufferer multi-factor authentication (MFA) options,” the Google-owned cybersecurity agency notes.

Okta lately warned of such assaults, by which the hackers intercepted credentials and tricked their victims into aiding them bypass MFA, deploying scripts to manage authentication flows within the victims’ browsers in actual time.Commercial. Scroll to proceed studying.

As soon as an intrusion is detected, organizations ought to prioritize fast containment to dam the attackers’ entry and forestall additional information exfiltration, Mandiant says.

“As a result of these campaigns depend on legitimate credentials relatively than malware, containment should prioritize the revocation of session tokens and the restriction of id and entry administration operations,” the corporate notes.

Recommendation for organizations

Organizations are suggested to determine and disable compromised accounts, revoke lively session tokens and OAuth authorizations, disable or closely limit public self-service password reset portals, and briefly disable MFA registration.

Moreover, they need to limit or briefly disable VPNs, digital desktop infrastructure (VDI) and comparable distant entry factors, limit entry to id supplier and SaaS functions, and undertake handbook, high-assurance verification protocols for account-related requests.

“When acceptable, organizations must also talk with end-users, HR companions, and different enterprise items to remain on high-alert throughout the preliminary containment part. At all times report suspicious exercise to inside IT and Safety for additional investigation,” Mandiant notes.

A hardened verification course of ought to embody high-assurance paths similar to stay video calls, out-of-band approvals from customers’ managers, and calls to customers’ recognized good numbers.

Helpdesk staff mustn’t present entry or data throughout inbound calls and may independently contact the corporate’s designated account supervisor for specific verification of entry requests.

Organizations must also educate their customers on figuring out vishing and phishing makes an attempt, on being cautious of requests to vary their passwords, particularly throughout off-business hours, and on not sharing passwords.

“Organizations ought to implement a layered collection of controls to guard all forms of identities. Entry to cloud id suppliers (IdPs), cloud consoles, SaaS functions, doc and code repositories ought to be restricted since these platforms usually grow to be the management aircraft for privilege escalation, information entry, and long-term persistence,” Mandiant notes.

Associated: Researchers Lure Scattered Lapsus$ Hunters in Honeypot

Associated: In Different Information: 600k Hit by Healthcare Breaches, Main ShinyHunters Hacks, DeepSeek’s Coding Bias

Associated: Safety Trade Skeptical of Scattered Spider-ShinyHunters Retirement Claims

Associated: Scattered Spider Suspect Arrested in US

Security Week News Tags:Activity, Escalates, Expands, Extortion, ShinyHuntersBranded

Post navigation

Previous Post: New Punishing Owl Hacker Group Targeting Networks of Russian Government Security Agency
Next Post: Microsoft Begins NTLM Phase-Out With Three-Stage Plan to Move Windows to Kerberos

Related Posts

CISA Warns of Spyware Targeting Messaging App Users CISA Warns of Spyware Targeting Messaging App Users Security Week News
Hackers Agree to Erase Data Stolen From Canvas Platform Hackers Agree to Erase Data Stolen From Canvas Platform Security Week News
Cisco, Fortinet, Palo Alto Networks Devices Targeted in Coordinated Campaign Cisco, Fortinet, Palo Alto Networks Devices Targeted in Coordinated Campaign Security Week News
Ramnit Malware Infections Spike in OT as Evidence Suggests ICS Shift Ramnit Malware Infections Spike in OT as Evidence Suggests ICS Shift Security Week News
Hacker Conversations: Alex Hall, One-time Fraudster Hacker Conversations: Alex Hall, One-time Fraudster Security Week News
Nova Scotia Power Confirms Ransomware Attack, 280k Notified of Data Breach Nova Scotia Power Confirms Ransomware Attack, 280k Notified of Data Breach Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft
  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft
  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark