Two emerging cybercrime groups, Cordial Spider and Snarky Spider, are executing rapid data theft and extortion campaigns by "living within" their victims' Software-as-a-Service (SaaS) environments. Linked to the notorious e-crime collective known as "The Com", these actors leverage sophisticated social engineering, including voice phishing (vishing) and adversary-in-the-middle (AiTM) phishing sites, to compromise Single Sign-On (SSO) credentials. Once they gain access to an organization's identity provider (IdP), they pivot seamlessly across interconnected SaaS applications, exfiltrating high-value data for extortion demands that often reach seven figures. These groups primarily target U.S.-based organizations across a wide range of critical sectors.
Active since at least October 2025, Cordial Spider (also tracked as BlackFile, UNC6671) and Snarky Spider represent a new evolution in extortion tactics that bypass traditional network perimeter defenses. Their methodology focuses on compromising the user, not the infrastructure. The attack chain begins with highly convincing social engineering, where attackers impersonate IT help desk staff in vishing calls or messages. Victims are directed to spoofed SSO login pages that capture credentials and session tokens.
This initial access is the linchpin of their operation. By compromising a single set of credentials tied to an IdP, the attackers gain the keys to the kingdom, allowing them to access a multitude of SaaS platforms like Google Workspace, HubSpot, Microsoft SharePoint, and Salesforce. This "live-within-SaaS" approach allows them to operate stealthily, as their activities are often indistinguishable from legitimate user behavior. The groups are known for their speed, quickly exfiltrating data and escalating pressure tactics, which include DDoS attacks and "swatting" if ransom demands are not met.
The attack methodology demonstrates a deep understanding of modern enterprise IT and cloud security weaknesses.
Initial Access - Social Engineering: The primary vector is social engineering (T1566 - Phishing). The groups use vishing calls, texts, or emails to create a pretext, often impersonating the target's IT support team. This is a form of T1648 - Vishing.
Credential Theft - AiTM Phishing: Victims are directed to an adversary-in-the-middle (AiTM) phishing site that perfectly mimics their organization's SSO portal. These sites proxy the connection to the real service, allowing the attackers to steal not just usernames and passwords, but also session cookies and MFA tokens in real-time (T1539 - Steal Web Session Cookie).
Defense Evasion & Persistence: Upon gaining access, the attackers move to solidify their foothold. They have been observed disabling MFA for the compromised account and deleting security alerts within the SaaS platforms to avoid detection (T1562.007 - Disable or Modify Cloud Firewall).
Lateral Movement & Discovery: With control of the IdP, the attackers pivot to connected SaaS applications (T1078.004 - Cloud Accounts). They explore platforms like SharePoint, Salesforce, and Google Drive to identify and access sensitive financial data, customer lists, and intellectual property.
Exfiltration: High-value data is exfiltrated for extortion purposes (T1537 - Transfer Data to Cloud Account).
Anonymization: To obscure their location and blend in with normal traffic, the groups heavily rely on residential proxy networks such as Mullvad, Oxylabs, and Infatica. This makes IP-based blocking and geolocation analysis ineffective.
The primary impact is financial, stemming from seven-figure ransom demands. However, the operational disruption and reputational damage are also severe. By exfiltrating sensitive data, the attackers create a double-extortion scenario, threatening to leak the data if the ransom is not paid. The targeting of critical sectors like aviation, finance, and legal services means a successful attack can have wide-ranging consequences. The use of aggressive tactics like DDoS attacks and swatting demonstrates a willingness to cause maximum disruption and psychological distress to force payment.
No specific file-based or network-based IOCs were provided in the source articles. The threat relies on behavior and social engineering.
Security teams may want to hunt for the following patterns to detect related activity:
Detection:
Response:
Implement phishing-resistant MFA, such as FIDO2 security keys, to prevent credential and session theft from AiTM attacks.
Conduct ongoing, realistic security awareness training focused on identifying and reporting social engineering and vishing attempts.
Apply the principle of least privilege to all SaaS accounts, ensuring users only have the permissions necessary to perform their roles.
Cordial Spider and Snarky Spider groups became active.
Cordial Spider (BlackFile) began actively targeting retail and hospitality industries.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.