Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Cybercrime Groups Exploit Vishing for SaaS Attacks

Cybercrime Groups Exploit Vishing for SaaS Attacks

Posted on May 1, 2026 By CWS

Two cybercrime groups, Cordial Spider and Snarky Spider, are drawing attention from cybersecurity experts for their accelerated and high-impact attacks within Software-as-a-Service (SaaS) environments. Operating almost invisibly, these groups have been active since at least October 2025, with Snarky Spider linked to the well-known e-crime ecosystem, The Com. Their activities involve rapid data theft and extortion, marked by a striking similarity in their operational methods.

Vishing and SSO Exploitation

Using voice phishing, or ‘vishing’, these groups trick targeted users into navigating to malicious pages designed to resemble Single Sign-On (SSO) systems. This tactic allows them to capture authentication credentials and infiltrate SSO-integrated SaaS platforms. According to a CrowdStrike report, the groups’ reliance on trusted SaaS environments significantly reduces their operational footprint, creating significant challenges for detection and defense.

Mandiant’s January 2026 report highlights the expansion of such threat activities, linking them to tactics used by the ShinyHunters group. These include impersonating IT staff to deceive victims into divulging credentials and multi-factor authentication (MFA) codes, leveraging phishing pages to accomplish this.

Techniques and Targets

Recent assessments by Palo Alto Networks Unit 42 and the Retail & Hospitality Information Sharing and Analysis Center (RH-ISAC) suggest that Cordial Spider has been targeting the retail and hospitality sectors since February 2026. They employ living-off-the-land (LotL) tactics and residential proxies to obscure their locations and evade basic security measures.

These groups often register new devices to bypass MFA protections, remove previous devices, and suppress email notifications regarding unauthorized device registrations. They achieve this by setting inbox rules to automatically delete such messages, thereby maintaining stealth during their operations.

Impact on SaaS Ecosystems

After securing access, attackers focus on high-privileged accounts through further social engineering, exploiting internal employee directories. This access allows them to infiltrate SaaS environments such as Google Workspace, Microsoft SharePoint, HubSpot, and Salesforce, seeking valuable files and reports. They then exfiltrate sensitive data to their controlled infrastructure.

As noted by CrowdStrike, the stolen credentials often provide access to an organization’s identity provider (IdP), enabling attackers to move laterally across multiple SaaS applications with a single authenticated session. This exploitation of trust relationships between IdPs and connected services eliminates the need to compromise individual SaaS apps, enhancing the efficiency and impact of these cyber threats.

Understanding and mitigating these sophisticated tactics are crucial for organizations to protect their SaaS ecosystems from such aggressive cybercrime activities.

The Hacker News Tags:Cordial Spider, CrowdStrike, Cybercrime, Cybersecurity, data theft, Extortion, IT deception, MFA, Phishing, SaaS, Security, Snarky Spider, SSO, SSO abuse, Vishing

Post navigation

Previous Post: New Android Spyware Platform Enables Rebranding and Resale
Next Post: Major Cybersecurity Updates: Arrests, Vulnerabilities, and Policy Shifts

Related Posts

FIRESTARTER Backdoor Threatens Cisco Devices Despite Patches FIRESTARTER Backdoor Threatens Cisco Devices Despite Patches The Hacker News
ShadowRay 2.0 Exploits Unpatched Ray Flaw to Build Self-Spreading GPU Cryptomining Botnet ShadowRay 2.0 Exploits Unpatched Ray Flaw to Build Self-Spreading GPU Cryptomining Botnet The Hacker News
Google Gemini Prompt Injection Flaw Exposed Private Calendar Data via Malicious Invites Google Gemini Prompt Injection Flaw Exposed Private Calendar Data via Malicious Invites The Hacker News
AI Enhances Security Testing in Dynamic Environments AI Enhances Security Testing in Dynamic Environments The Hacker News
Cellebrite Technology Utilized on Kenyan Activist’s Phone Cellebrite Technology Utilized on Kenyan Activist’s Phone The Hacker News
Eurojust Arrests 5 in €100M Cryptocurrency Investment Fraud Spanning 23 Countries Eurojust Arrests 5 in €100M Cryptocurrency Investment Fraud Spanning 23 Countries The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • China-Linked Cyber Attacks Target Asian Nations and Journalists
  • Cybercriminals Exploit CAPTCHA for New Phishing Tactics
  • Major Cybersecurity Updates: Arrests, Vulnerabilities, and Policy Shifts
  • Cybercrime Groups Exploit Vishing for SaaS Attacks
  • New Android Spyware Platform Enables Rebranding and Resale

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • China-Linked Cyber Attacks Target Asian Nations and Journalists
  • Cybercriminals Exploit CAPTCHA for New Phishing Tactics
  • Major Cybersecurity Updates: Arrests, Vulnerabilities, and Policy Shifts
  • Cybercrime Groups Exploit Vishing for SaaS Attacks
  • New Android Spyware Platform Enables Rebranding and Resale

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark