Essential Insights
- Two threat groups, Cordial Spider and Snarky Spider, affiliated with The Com, are actively targeting U.S.-based organizations across critical sectors for data theft and extortion using voice-phishing and social engineering techniques.
- They exploit identity platforms and SaaS environments by deploying phishing attacks via calls, texts, and emails, capturing credentials to gain system access, remove multi-factor authentication, and conceal malicious activity.
- While their tactics share similarities, each subgroup displays distinct techniques and operational patterns, with extortion demands typically in the seven-figure range; victims refusing payment face additional harassment like DDoS attacks and swatting.
- These groups heavily use residential proxy networks to evade detection, and although less technically advanced than Scattered Spider, they replicate many of its methods, representing a new generation of cybercriminal activity.
The Issue
According to CrowdStrike, two persistent threat groups, Cordial Spider and Snarky Spider, are actively targeting organizations across various critical infrastructure sectors for rapid data theft and extortion. These groups, which are linked to the larger threat entity known as The Com, primarily focus on U.S.-based entities in fields like finance, healthcare, and technology. They employ social engineering techniques, such as voice calls, emails, and texts, to lure employees into phishing traps mimicking legitimate login pages. Once inside, they steal credentials, disable multi-factor authentication, and erase alerts, enabling widespread access to the victims’ SaaS ecosystems. Despite their less advanced technical skills compared to Scattered Spider, these groups adopt similar tactics, including use of residential proxy networks to evade detection, and have engaged in aggressive harassment, like DDoS attacks and swatting, especially when extortion demands are unmet.
CrowdStrike reports that these campaigns began at least in October 2025 and have caused substantial concern among cybersecurity professionals. The groups’ motivations are primarily financial, with extortion demands reaching into the seven-figure range. The targeting appears strategic, aimed at exploiting identity systems to access and manipulate extensive data repositories. While their exact operational scope remains uncertain—due in part to the difficulty in tracking all affected victims—these threat actors demonstrate a rapid evolution of techniques reminiscent of Scattered Spider’s playbook, signaling a new wave of cybercrime that blends traditional phishing with sophisticated evasion strategies. This warning aligns with recent research from Palo Alto Networks and industry sharing groups, illustrating the growing threat posed by these emerging cybercriminal entities.
Potential Risks
The rise of two new extortion crews mimicking the Scattered Spider playbook poses a real threat to businesses today. These groups use quick, aggressive tactics to target companies, demanding large ransoms to avoid cyberattacks. As a result, your business could face significant financial losses, operational disruptions, and damage to reputation. Moreover, they often exploit vulnerabilities that many organizations underestimate, making it easier for them to succeed. Consequently, without proper cybersecurity measures, your business becomes an easy target. Therefore, it is critical to strengthen security protocols now, or risk falling victim to these highly organized, fast-moving criminal groups.
Possible Remediation Steps
In the rapidly evolving landscape of cybersecurity threats, timely remediation is critical to prevent widespread damage, especially when malicious actors like extortion crews expedite their attack strategies by adopting aggressive playbooks such as that of Scattered Spider. Swift action can significantly reduce the impact on organizational assets, data integrity, and public trust.
Detection and Assessment
- Conduct continuous monitoring for unusual activity.
- Identify indicators of compromise related to extortion tactics.
Containment
- Isolate affected systems promptly to prevent lateral movement.
- Disable compromised accounts immediately.
Eradication
- Remove malicious tools or scripts from infected systems.
- Patch vulnerabilities exploited by attackers.
Recovery
- Restore systems from clean backups.
- Validate the integrity of restored systems before returning to production.
Communication
- Notify appropriate stakeholders and authorities.
- Maintain transparent communication with impacted parties.
Prevention
- Implement strong, multi-factor authentication.
- Conduct regular employee training on social engineering and phishing.
- Keep systems and software up to date with the latest security patches.
- Develop and test incident response and recovery plans regularly.
Advance Your Cyber Knowledge
Discover cutting-edge developments in Emerging Tech and industry Insights.
Understand foundational security frameworks via NIST CSF on Wikipedia.
Disclaimer: The information provided may not always be accurate or up to date. Please do your own research, as the cybersecurity landscape evolves rapidly. Intended for secondary references purposes only.
Cyberattacks-V1
