Close Menu
The CISO Brief
  • Home
  • Cyberattacks
    • Ransomware
    • Cybercrime
    • Data Breach
  • Emerging Tech
  • Threat Intelligence
    • Vulnerabilities
    • Cyber Risk
  • Expert Insights
  • Careers and Learning
  • Compliance

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

CISA Adds Two N-able N-central Flaws to Known Exploited Vulnerabilities Catalog

August 14, 2025

Zero-Day Attacks Target N-able N-central Flaws, CISA Alerts!

August 14, 2025

Netwrix Opens Kraków Hub to Boost European Cyber Op

August 14, 2025
Facebook X (Twitter) Instagram
The CISO Brief
  • Home
  • Cyberattacks
    • Ransomware
    • Cybercrime
    • Data Breach
  • Emerging Tech
  • Threat Intelligence
    • Vulnerabilities
    • Cyber Risk
  • Expert Insights
  • Careers and Learning
  • Compliance
The CISO Brief
Home » ShinyHunters and Scattered Spider Unite: New Wave of Business Extortion
Cyberattacks

ShinyHunters and Scattered Spider Unite: New Wave of Business Extortion

Staff WriterBy Staff WriterAugust 12, 2025No Comments4 Mins Read0 Views
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest WhatsApp Email

Top Highlights

Here are the key points from the article:

  1. Emerging Threats: The data extortion campaign by ShinyHunters is shifting focus, now targeting Salesforce customers along with potential new victims in the financial services and technology sectors, employing advanced vishing and social engineering tactics.

  2. Criminal Collaborations: ShinyHunters appears to be collaborating with Scattered Spider and LAPSUS$, as indicated by the emergence of a new Telegram channel aimed at developing a ransomware-as-a-service solution, potentially called ShinySp1d3r.

  3. Increased Targeting of Financial Services: Phishing attacks associated with ShinyHunters and Scattered Spider have surged, with a 12% increase in domain registrations targeting financial companies since July 2025, while tech sector attacks have decreased.

  4. Historical Ties and Coordination: There are indications of long-standing connections between the two groups, as shown by shared targets and overlapping domain registrations, suggesting a coordinated effort that may have been ongoing for over a year.

The Core Issue

On August 12, 2025, Ravie Lakshmanan reported on a concerning escalation in cybercrime practices involving two notorious hacker groups, ShinyHunters and Scattered Spider, who are intensifying their focus on Salesforce customers and plan to pivot towards financial services and technology firms. Recent assessments from ReliaQuest reveal that these groups are adopting advanced tactics, such as voice phishing and social engineering attacks, to exploit vulnerabilities and harvest credentials via deceptive applications, all while utilizing data obfuscation strategies for stealthy data extraction. While ShinyHunters has been active since 2020, orchestrating data breaches that they later monetize on illicit forums, their collaboration with Scattered Spider suggests a strategic shift aimed at maximizing their operational effectiveness.

Notably, the situation has been exacerbated by the arrests of four individuals tied to BreachForums, including alleged members of ShinyHunters, though the group’s representatives have contested the validity of the charges. Compounding this threat landscape is the emergence of a new Telegram channel named “scattered lapsu$ hunters,” which claimed a developing ransomware project. Supporting the theory of collaboration between the groups, researchers from ReliaQuest identified overlapping target sectors and similar phishing domain registrations, particularly indicating a marked 12% increase in registrations aimed at financial entities. This convergence of tactics and objectives raises significant concerns about the future of cybersecurity, particularly for high-profile industries already beset by cyber threats.

Risk Summary

The evolving cyber-extortion campaign orchestrated by ShinyHunters and Scattered Spider poses significant risks not only to Salesforce customers but also to a wide array of businesses engaged in financial and technological services. This coordinated assault leverages sophisticated social engineering tactics, such as vishing and phishing via impersonated platforms, thereby creating vulnerabilities that can spread across interconnected ecosystems. If these malicious actors extend their focus to financial institutions, the potential fallout could include severe data breaches, financial loss, and reputational damage for numerous companies within the sector. Such incidents may precipitate a crisis of consumer trust, leading to reduced client engagement and a reluctance among users to share sensitive information. Consequently, organizations, regardless of their immediate involvement in this campaign, must bolster their cybersecurity measures, as the contagion of cyber threats transcends individual entities and can have a domino effect throughout entire industries.

Possible Actions

The rapidly evolving landscape of cybercrime necessitates prompt and effective remediation strategies, especially in the face of collaborative threats like those posed by ShinyHunters and Scattered Spider, who have united to launch extortion attacks on businesses.

Mitigation Steps:

  • Incident Response Plan: Develop a robust plan.
  • Regular Software Updates: Ensure all systems are fortified.
  • Employee Training: Educate staff on cybersecurity awareness.
  • Threat Intelligence Sharing: Collaborate with industry peers.
  • Multi-Factor Authentication: Implement to enhance security.
  • Data Encryption: Protect sensitive information.
  • Network Segmentation: Limit access and contain breaches.
  • Monitoring Systems: Utilize advanced detection tools.
  • Legal Consultation: Seek advice on compliance and liability.

NIST Guidance: The NIST Cybersecurity Framework (CSF) underscores the significance of proactive risk management. Organizations should primarily refer to NIST SP 800-53, which provides a comprehensive catalog of security controls necessary to safeguard against cyber threats, including those posed by organized crime groups.

Explore More Security Insights

Discover cutting-edge developments in Emerging Tech and industry Insights.

Access world-class cyber research and guidance from IEEE.

Disclaimer: The information provided may not always be accurate or up to date. Please do your own research, as the cybersecurity landscape evolves rapidly. Intended for secondary references purposes only.

Cyberattacks-V1

CISO Update computer security cyber attacks cyber news cyber security news cyber security news today cyber security updates cyber updates Cybersecurity data breach hacker news hacking news how to hack information security MX1 network security ransomware malware software vulnerability the hacker news
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleSevere OT Events Could Cost Over $300B
Next Article Financial Forces Fueling ToolShell Exploitation
Avatar photo
Staff Writer
  • Website

John Marcelli is a staff writer for the CISO Brief, with a passion for exploring and writing about the ever-evolving world of technology. From emerging trends to in-depth reviews of the latest gadgets, John stays at the forefront of innovation, delivering engaging content that informs and inspires readers. When he's not writing, he enjoys experimenting with new tech tools and diving into the digital landscape.

Related Posts

CISA Adds Two N-able N-central Flaws to Known Exploited Vulnerabilities Catalog

August 14, 2025

Zero-Day Attacks Target N-able N-central Flaws, CISA Alerts!

August 14, 2025

Zoom and Xerox Release Critical Security Updates Fixing Privilege Escalation and RCE Flaws

August 13, 2025

Comments are closed.

Latest Posts

CISA Adds Two N-able N-central Flaws to Known Exploited Vulnerabilities Catalog

August 14, 20250 Views

Zero-Day Attacks Target N-able N-central Flaws, CISA Alerts!

August 14, 20250 Views

Zoom and Xerox Release Critical Security Updates Fixing Privilege Escalation and RCE Flaws

August 13, 20250 Views

Urgent Warning: Active Exploit of FortiSIEM RCE Flaw Detected

August 13, 20250 Views
Don't Miss

Big Risks for Malicious Code, Vulns

By Staff WriterFebruary 14, 2025

Attackers are finding more and more ways to post malicious projects to Hugging Face and…

North Korea’s Kimsuky Attacks Rivals’ Trusted Platforms

February 19, 2025

Deepwatch Acquires Dassana to Boost Cyber Resilience With AI

February 18, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to The CISO Brief, your trusted source for the latest news, expert insights, and developments in the cybersecurity world.

In today’s rapidly evolving digital landscape, staying informed about cyber threats, innovations, and industry trends is critical for professionals and organizations alike. At The CISO Brief, we are committed to providing timely, accurate, and insightful content that helps security leaders navigate the complexities of cybersecurity.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

CISA Adds Two N-able N-central Flaws to Known Exploited Vulnerabilities Catalog

August 14, 2025

Zero-Day Attacks Target N-able N-central Flaws, CISA Alerts!

August 14, 2025

Netwrix Opens Kraków Hub to Boost European Cyber Op

August 14, 2025
Most Popular

Designing and Building Defenses for the Future

February 13, 202516 Views

United Natural Foods Faces Cyberattack Disruption

June 10, 20257 Views

VanHelsing Ransomware Builder Leaked: New Threat Emerges!

May 20, 20255 Views
© 2025 thecisobrief. Designed by thecisobrief.
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions

Type above and press Enter to search. Press Esc to cancel.