Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
AiTM Phishing Attacks Target SharePoint, HubSpot, Google
May 2, 2026
Attackers Abuse AppSheet, Netlify, Telegram for Google Facebook
May 2, 2026
cPanelSniper PoC Exploit for cPanel Vulner Disclosed Vulnerability
May 2, 2026
Home/Threats/Lapsus$ Hunters Launch ShinySp1d3r Scattered Resurface
Threats

Lapsus$ Hunters Launch ShinySp1d3r Scattered Resurface

After a period of silence, the notorious Scattered Lapsus$ Hunters threat group has resumed active operations following their high-profile supply chain attack targeting Salesforce third-party...

Marcus Rodriguez
Marcus Rodriguez
January 6, 2026 2 Min Read
8 0

After a period of silence, the notorious Scattered Lapsus$ Hunters threat group has resumed active operations following their high-profile supply chain attack targeting Salesforce third-party integrations, including Gainsight and Salesloft.

Recent activity observed across underground Telegram channels and credential-trading forums shows the collective has rebuilt its operational structure and launched an aggressive recruitment campaign targeting insiders and initial access brokers.

The group is now promoting a new Ransomware-as-a-Service platform called ShinySp1d3r, described as a joint effort involving operators linked to ShinyHunters, Scattered Spider, and Lapsus$.

The resurgence marks a significant shift in the group’s operational strategy. Unlike previous campaigns that relied primarily on social engineering tactics, the collective is now pursuing a more structured approach focused on acquiring privileged access through insider collaboration and commission-based deals.

Their recruitment advertisements specify clear targeting criteria: organizations with annual revenues exceeding 500 million dollars, excluding entities in Russia, China, North Korea, Belarus, and the healthcare sector.

The group has established tiered commission structures, offering 25 percent for Active Directory-joined systems and 10 percent for cloud identity platforms such as Okta, Azure Portal, and AWS IAM root access.

CYFIRMA analysts identified the resurgence through monitoring of closed Telegram clusters and access-broker ecosystems where the group has been actively posting recruitment messages and negotiating initial access purchases.

The collective is specifically seeking insiders who can provide VPN, VDI, Citrix, or AnyDesk access from telecommunications providers, software and gaming corporations, and call-center environments.

Chatroom discussions (Source - Cyfirma)
Chatroom discussions (Source – Cyfirma)

Chatroom discussions frequently reference the LizardSquad name, though these mentions appear to be part of a reputation-building strategy rather than evidence of a verified partnership.

The group has demonstrated its credibility by sharing leaked screenshots of a CrowdStrike internal dashboard and an Okta single sign-on page allegedly provided by an insider source.

Insider Recruitment and Operational Security Messaging

The threat actors have adopted a sophisticated approach to addressing potential insider concerns about detection.

Following the recent CrowdStrike insider incident, the group publicly reassured potential collaborators by claiming that informants within their operation would remain undetected.

Latest activities (Source - Cyfirma)
Latest activities (Source – Cyfirma)

They framed the CrowdStrike case as a self-inflicted disclosure resulting from a failed insider attempt, using this narrative to build confidence among prospective recruits.

This messaging strategy suggests the group understands the psychological barriers that prevent insiders from engaging in malicious activity and is actively working to overcome these concerns.

The development of ShinySp1d3r further indicates the collective is positioning itself for sustained operations throughout 2026, with public threats to compromise and leak additional customer data from targeted organizations.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackransomwareSecurityThreat

Share Article

Marcus Rodriguez

Marcus Rodriguez

Marcus is a security researcher and investigative journalist with expertise in vulnerability research, bug bounties, and cloud security. Since 2017, Marcus has been breaking stories on critical vulnerabilities affecting major platforms. His investigative work has led to the disclosure of numerous security flaws and improved defenses across the industry. Marcus is an active participant in bug bounty programs and has been recognized for responsible disclosure practices. He holds multiple security certifications and regularly speaks at industry events.

Previous Post

AI-Enhanced Tuoni C2 Malware Targets Stealthy Major

Next Post

Discover the 10 Best Vulnerability Management Tools for

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Attackers Abuse CAPTCHA, ClickFix for Cred Tactics Boost
May 1, 2026
DDoS Malware Exploits Jenkins to Attack Source Engine Games
May 1, 2026
DDoS Attack Hits Ubuntu Website & Canonical Web Services
May 1, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us