Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Cybercrime Groups Using Vishing and SSO Abuse in Rapid SaaS Extortion Attacks
    Cybersecurity

    Cybercrime Groups Using Vishing and SSO Abuse in Rapid SaaS Extortion Attacks

    adminBy adminMay 1, 2026No Comments3 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Cybercrime Groups Using Vishing and SSO Abuse in Rapid SaaS Extortion Attacks
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Ravie LakshmananMay 01, 2026

    Cybersecurity researchers are warning of two cybercrime groups that are carrying out “rapid, high-impact attacks” operating almost within the confines of SaaS environments, while leaving minimal traces of their actions.

    The clusters, Cordial Spider (aka BlackFile, CL-CRI-1116, O-UNC-045, and UNC6671) and Snarky Spider (aka O-UNC-025 and UNC6661), have been attributed to high-speed data theft and extortion campaigns that share a remarkable degree of operational similarities. Both hacking groups are assessed to be active since at least October 2025, with the latter a native English-speaking crew sharing ties to the e-crime ecosystem known as The Com.

    “In most cases, these adversaries use voice phishing (vishing) to direct targeted users to malicious, SSO-themed adversary-in-the-middle (AiTM) pages, where they capture authentication data and pivot directly into SSO-integrated SaaS applications,” CrowdStrike’s Counter Adversary Operations said in a report.

    “By operating almost exclusively within trusted SaaS environments, they minimize their footprint while accelerating time to impact. The combination of speed, precision, and SaaS-only activity creates significant detection and visibility challenges for defenders.”

    In a report published back in January 2026, Google-owned Mandiant revealed that the two clusters represent an expansion in threat activity that employs tactics consistent with extortion-themed attacks carried out by the ShinyHunters group. This involves impersonating IT staff in calls to deceive victims and obtain their credentials and multi-factor authentication (MFA) codes by directing them to phishing pages.

    Snarky Spider begins exfiltration in under an hour

    As recently as last week, Palo Alto Networks Unit 42 and Retail & Hospitality Information Sharing and Analysis Center (RH-ISAC) assessed with moderate confidence that the attackers behind CL-CRI-1116 are also most likely associated with The Com, adding that the intrusions primarily rely on living-off-the-land (LotL) techniques, as well as utilize residential proxies to conceal their geographic location and bypass basic IP-based reputation filters.

    “CL-CRI-1116 activity has been actively targeting the retail and hospitality space since February 2026, specifically leveraging vishing attacks impersonating IT help desk personnel in combination with phishing login sites to steal credentials,” researchers Lee Clark, Matt Brady, and Cuong Dinh said.

    Attacks mounted by the two groups are known to register a new device in order to bypass MFA and maintain access to compromised access — but not before removing existing devices — following which the threat actors move to suppress automated email notifications related to unauthorized device registration by configuring inbox rules that automatically delete such messages.

    The next stage entails pivoting to targeting high-privileged accounts via further social engineering by scraping internal employee directories. Upon again elevated access, the adversaries break into target SaaS environments to look for high-value files and business-critical reports in Google Workspace, HubSpot, Microsoft SharePoint, and Salesforce, and then exfiltrate data of interest to infrastructure under its control.

    “In most observed cases, these credentials grant access to the organization’s identity provider (IdP), providing a single point of entry into multiple SaaS applications,” CrowdStrike said. “By abusing the trust relationship between the IdP and connected services, the adversaries bypass the need to compromise individual SaaS apps and instead move laterally across the victim’s entire SaaS ecosystem with a single authenticated session.”

    Abuse attacks Cybercrime extortion groups rapid SaaS SSO Vishing
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleHow to Build Local Citations & Boost Your Visibility Online
    Next Article Enterprise Spotlight: Transforming software development with AI
    admin
    • Website

    Related Posts

    If AI’s So Smart, Why Does It Keep Deleting Production Databases?

    May 1, 2026

    Automating Pentest Delivery: A Step-by-Step Guide

    May 1, 2026

    US and allies urge ‘careful adoption’ of AI agents

    May 1, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    If AI’s So Smart, Why Does It Keep Deleting Production Databases?

    May 1, 2026

    AEO prompt tracking for marketing teams

    May 1, 2026

    Enterprise Spotlight: Transforming software development with AI

    May 1, 2026

    Cybercrime Groups Using Vishing and SSO Abuse in Rapid SaaS Extortion Attacks

    May 1, 2026
    Categories
    • Blogging (71)
    • Cybersecurity (1,624)
    • Privacy & Online Earning (194)
    • SEO & Digital Marketing (1,004)
    • Tech Tools & Mobile / Apps (1,796)
    • WiFi / Internet & Networking (259)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    If AI’s So Smart, Why Does It Keep Deleting Production Databases?

    May 1, 2026

    AEO prompt tracking for marketing teams

    May 1, 2026

    Enterprise Spotlight: Transforming software development with AI

    May 1, 2026
    Most Popular
    • If AI’s So Smart, Why Does It Keep Deleting Production Databases?
    • AEO prompt tracking for marketing teams
    • Enterprise Spotlight: Transforming software development with AI
    • Cybercrime Groups Using Vishing and SSO Abuse in Rapid SaaS Extortion Attacks
    • How to Build Local Citations & Boost Your Visibility Online
    • Automating Pentest Delivery: A Step-by-Step Guide
    • A Bridge to Somewhere: How to Link Your Mastodon, Bluesky, or Other Federated Accounts
    • How to build SEO agent skills that actually work
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.