Cybercrime Groups Cordial Spider and Snarky Spider Target U.S. Firms with Advanced Vishing and SaaS-based Attacks

"Living Within SaaS": Cordial & Snarky Spider Groups Use Vishing, SSO Abuse for Rapid Extortion

HIGH
May 2, 2026
6m read
PhishingThreat ActorCloud Security

Related Entities

Threat Actors

Cordial SpiderSnarky SpiderThe ComScattered SpiderShinyHunters

Products & Tech

Google WorkspaceHubSpotMicrosoft SharePointSalesforce

Other

MullvadOxylabsInfatica

Full Report

Executive Summary

Two emerging cybercrime groups, Cordial Spider and Snarky Spider, are executing rapid data theft and extortion campaigns by "living within" their victims' Software-as-a-Service (SaaS) environments. Linked to the notorious e-crime collective known as "The Com", these actors leverage sophisticated social engineering, including voice phishing (vishing) and adversary-in-the-middle (AiTM) phishing sites, to compromise Single Sign-On (SSO) credentials. Once they gain access to an organization's identity provider (IdP), they pivot seamlessly across interconnected SaaS applications, exfiltrating high-value data for extortion demands that often reach seven figures. These groups primarily target U.S.-based organizations across a wide range of critical sectors.


Threat Overview

Active since at least October 2025, Cordial Spider (also tracked as BlackFile, UNC6671) and Snarky Spider represent a new evolution in extortion tactics that bypass traditional network perimeter defenses. Their methodology focuses on compromising the user, not the infrastructure. The attack chain begins with highly convincing social engineering, where attackers impersonate IT help desk staff in vishing calls or messages. Victims are directed to spoofed SSO login pages that capture credentials and session tokens.

This initial access is the linchpin of their operation. By compromising a single set of credentials tied to an IdP, the attackers gain the keys to the kingdom, allowing them to access a multitude of SaaS platforms like Google Workspace, HubSpot, Microsoft SharePoint, and Salesforce. This "live-within-SaaS" approach allows them to operate stealthily, as their activities are often indistinguishable from legitimate user behavior. The groups are known for their speed, quickly exfiltrating data and escalating pressure tactics, which include DDoS attacks and "swatting" if ransom demands are not met.

Technical Analysis

The attack methodology demonstrates a deep understanding of modern enterprise IT and cloud security weaknesses.

  1. Initial Access - Social Engineering: The primary vector is social engineering (T1566 - Phishing). The groups use vishing calls, texts, or emails to create a pretext, often impersonating the target's IT support team. This is a form of T1648 - Vishing.

  2. Credential Theft - AiTM Phishing: Victims are directed to an adversary-in-the-middle (AiTM) phishing site that perfectly mimics their organization's SSO portal. These sites proxy the connection to the real service, allowing the attackers to steal not just usernames and passwords, but also session cookies and MFA tokens in real-time (T1539 - Steal Web Session Cookie).

  3. Defense Evasion & Persistence: Upon gaining access, the attackers move to solidify their foothold. They have been observed disabling MFA for the compromised account and deleting security alerts within the SaaS platforms to avoid detection (T1562.007 - Disable or Modify Cloud Firewall).

  4. Lateral Movement & Discovery: With control of the IdP, the attackers pivot to connected SaaS applications (T1078.004 - Cloud Accounts). They explore platforms like SharePoint, Salesforce, and Google Drive to identify and access sensitive financial data, customer lists, and intellectual property.

  5. Exfiltration: High-value data is exfiltrated for extortion purposes (T1537 - Transfer Data to Cloud Account).

  6. Anonymization: To obscure their location and blend in with normal traffic, the groups heavily rely on residential proxy networks such as Mullvad, Oxylabs, and Infatica. This makes IP-based blocking and geolocation analysis ineffective.

Impact Assessment

The primary impact is financial, stemming from seven-figure ransom demands. However, the operational disruption and reputational damage are also severe. By exfiltrating sensitive data, the attackers create a double-extortion scenario, threatening to leak the data if the ransom is not paid. The targeting of critical sectors like aviation, finance, and legal services means a successful attack can have wide-ranging consequences. The use of aggressive tactics like DDoS attacks and swatting demonstrates a willingness to cause maximum disruption and psychological distress to force payment.

IOCs — Directly from Articles

No specific file-based or network-based IOCs were provided in the source articles. The threat relies on behavior and social engineering.

Cyber Observables — Hunting Hints

Security teams may want to hunt for the following patterns to detect related activity:

  • Anomalous Logins: Monitor for logins to SaaS platforms originating from known residential proxy IP ranges (e.g., Mullvad, Oxylabs, Infatica, 9Proxy). Correlate with impossible travel alerts.
  • MFA Changes: Alert on any user-initiated MFA de-registration or re-enrollment, especially if it occurs shortly after a login from an unusual location.
  • SaaS Alert Deletion: Monitor audit logs in platforms like Microsoft 365 for the deletion of security alerts or the modification of alerting rules.
  • Anomalous Data Access: Use CASB or SSPM tools to baseline normal data access patterns and alert on unusual activity, such as a single user downloading large volumes of data from multiple SaaS applications in a short period.

Detection & Response

Detection:

  • Implement D3-UBA: User Behavior Analytics to detect deviations from normal user activity, such as logins from new locations, unusual access times, or bulk data downloads.
  • Monitor IdP logs for suspicious authentication events. Look for repeated failed logins followed by a success from a new IP/region, which could indicate a successful AiTM phishing attack.
  • Deploy a Cloud Access Security Broker (CASB) to gain visibility into cross-SaaS application activity and enforce data loss prevention (DLP) policies.

Response:

  1. If a compromise is suspected, immediately trigger a session revocation for the affected user across all SaaS applications.
  2. Force a password reset and re-enrollment of MFA for the user.
  3. Analyze IdP and SaaS audit logs to determine the scope of the attacker's access and what data was exfiltrated.
  4. Block known malicious IP ranges associated with residential proxies, though this is a cat-and-mouse game.

Mitigation

  • Phishing-Resistant MFA: The most critical mitigation is to implement phishing-resistant MFA, such as FIDO2 security keys. These methods are not susceptible to AiTM phishing attacks as they bind the authentication to the user's device and the legitimate domain. This is a form of D3-MFA: Multi-factor Authentication.
  • User Training: Conduct continuous, realistic social engineering and vishing training for all employees. Emphasize the importance of verifying IT requests through established, out-of-band channels.
  • Restrict SaaS Permissions: Apply the principle of least privilege to SaaS applications. Users should only have access to the data and functions they absolutely need. Regularly review and prune permissions.
  • Conditional Access Policies: Implement strict conditional access policies in your IdP. For example, block logins from anonymizing services or require stronger authentication for access from untrusted networks. This aligns with D3-UAP: User Account Permissions.

Timeline of Events

1
October 1, 2025
Cordial Spider and Snarky Spider groups became active.
2
February 1, 2026
Cordial Spider (BlackFile) began actively targeting retail and hospitality industries.
3
May 2, 2026
This article was published

MITRE ATT&CK Mitigations

Implement phishing-resistant MFA, such as FIDO2 security keys, to prevent credential and session theft from AiTM attacks.

Conduct ongoing, realistic security awareness training focused on identifying and reporting social engineering and vishing attempts.

Apply the principle of least privilege to all SaaS accounts, ensuring users only have the permissions necessary to perform their roles.

Audit

M1047enterprise

Continuously monitor and audit IdP and SaaS application logs for signs of anomalous behavior, such as impossible travel or MFA changes.

Timeline of Events

1
October 1, 2025

Cordial Spider and Snarky Spider groups became active.

2
February 1, 2026

Cordial Spider (BlackFile) began actively targeting retail and hospitality industries.

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

vishingphishingSaaSSSOextortionCordial SpiderSnarky SpiderThe Com

📢 Share This Article

Help others stay informed about cybersecurity threats

🎯 MITRE ATT&CK Mapped

Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.

🧠 Enriched & Analyzed

Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.

🛡️ Actionable Guidance

Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.

🔗 STIX Visualizer

Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.

Sigma Generator

Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.