Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
New cPanel & WHM Flaws Allow Code Execution Enable Attacks
May 10, 2026
TCLBANKER Malware Spreads Via WhatsApp Targets Users
May 9, 2026
NVIDIA Data Breach Exposes GeForce Users Reportedly Personal
May 9, 2026
Home/Threats/Google Exposes ShinyHunters’ Expanded Threat Activity & New
Threats

Google Exposes ShinyHunters’ Expanded Threat Activity & New

The ShinyHunters threat group has expanded its extortion operations, now deploying sophisticated attack methods that target cloud-based systems across multiple organizations. These cybercriminals use...

Sarah simpson
Sarah simpson
February 2, 2026 2 Min Read
2 0

The ShinyHunters threat group has expanded its extortion operations, now deploying sophisticated attack methods that target cloud-based systems across multiple organizations.

These cybercriminals use voice phishing and fake credential harvesting websites to steal login information from employees.

Once they gain access, they extract sensitive data from cloud software applications and use this information to demand ransom payments from victim companies.

The threat group creates realistic-looking phishing websites that mimic company login pages to capture single sign-on credentials and multi-factor authentication codes from unsuspecting employees.

The attackers typically call employees while pretending to be IT staff members and claim the company is updating security settings. They then direct workers to fraudulent websites designed to steal their login credentials.

This approach has proven effective because it combines human manipulation with technical deception.

Google Cloud analysts identified that the threat activity is being tracked under three separate threat clusters named UNC6661, UNC6671, and UNC6240.

The researchers discovered that these groups have expanded the number and types of cloud platforms they target, seeking more valuable data for their extortion schemes.

Recent incidents show the attackers are using aggressive tactics including harassment of victim employees and launching denial-of-service attacks against company websites.

Attack path diagram (Source - Google Cloud)
Attack path diagram (Source – Google Cloud)

The attacks do not exploit security vulnerabilities in software products or infrastructure. Instead, they succeed through social engineering techniques that trick people into providing their credentials voluntarily.

Security experts emphasize that organizations should adopt phishing-resistant authentication methods such as FIDO2 security keys or passkeys, which cannot be bypassed through social engineering tactics like traditional SMS or push-based authentication systems.

Attack Mechanism and Data Theft Operations

The threat actors register fake domains that impersonate legitimate corporate portals using patterns like companynamesso.com or companynameinternal.com to make their phishing sites appear authentic.

After obtaining employee credentials, the attackers register their own authentication devices to maintain persistent access to victim accounts.

They then systematically move through corporate cloud environments to steal data from platforms including SharePoint, Salesforce, DocuSign, and Slack.

Ransom note (Source - Google Cloud)
Ransom note (Source – Google Cloud)

The cybercriminals search specifically for documents containing terms like “confidential,” “internal,” “proposal,” and “vpn” within cloud applications.

In some cases, they enabled special tools like ToogleBox Recall within Google Workspace accounts to permanently delete security notification emails, preventing employees from discovering that unauthorized devices were accessing their accounts.

After stealing data, the attackers send extortion emails demanding Bitcoin payments within 72 hours and provide samples of stolen information hosted on file-sharing platforms to prove their claims.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackExploitphishingSecurityThreat

Share Article

Sarah simpson

Sarah simpson

Sarah is a cybersecurity journalist specializing in threat intelligence and malware analysis. With over 8 years of experience covering APT groups, zero-day exploits, and advanced persistent threats, Sarah brings deep technical expertise to breaking cybersecurity news. Previously, she worked as a security researcher at leading threat intelligence firms, where she analyzed malware samples and tracked cybercriminal operations. Sarah holds a Master's degree in Computer Science with a focus on cybersecurity and is a regular contributor to major security conferences.

Previous Post

Windows 11 Security Feature Blocks Unauthorized System File Access

Next Post

Arsink RAT Attacks Android: Exfiltrates Attacking Devices

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Hackers Deploy Modular RAT for Credential Theft With Screenshot
May 8, 2026
PamDOORa Backdoor Attacks Linux, Attacking Systems
May 8, 2026
Škoda Online Shop Security Incident Exposes Customers Data
May 8, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us