radar

ONE Sentinel

securitySecurity/THREATS/HIGH

Cybercrime Groups Using Vishing and SSO Abuse in Rapid SaaS Extortion Attacks

sourceThe Hacker News
calendar_todayMay 1, 2026
schedule1 min read
lightbulb

EXECUTIVE SUMMARY

Cybercrime Groups Exploit Vishing and SSO for Rapid SaaS Extortion

Summary

The article discusses two cybercrime groups, Cordial Spider and Snarky Spider, that are executing rapid and high-impact attacks within SaaS environments. These groups are using techniques like vishing and SSO abuse to conduct data theft and extortion with minimal traces.

Key Points

  • Two cybercrime groups, Cordial Spider and Snarky Spider, are identified as executing rapid attacks.
  • These groups operate almost entirely within SaaS environments, focusing on data theft and extortion.
  • The attacks involve techniques such as vishing (voice phishing) and SSO (Single Sign-On) abuse.
  • Cordial Spider is also known by aliases such as BlackFile, CL-CRI-1116, O-UNC-045, and UNC6671.
  • Snarky Spider is also referred to as O-UNC-025 and UNC6661.

Analysis

The significance of these findings lies in the sophisticated methods employed by these cybercrime groups, which allow them to exploit SaaS environments effectively. The use of vishing and SSO abuse indicates a trend towards targeting authentication mechanisms and user interactions, making it crucial for organizations to strengthen their security postures around these areas.

Conclusion

IT professionals should prioritize enhancing security measures around SaaS applications and authentication processes. Implementing robust multi-factor authentication and educating users about phishing tactics can mitigate the risks posed by such cybercrime groups.