<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Extortion — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/extortion/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 01 May 2026 15:28:27 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/extortion/feed.xml" rel="self" type="application/rss+xml"/><item><title>Social Engineering Attacks Targeting Enterprise SaaS Environments</title><link>https://feed.craftedsignal.io/briefs/2026-05-saas-social-engineering/</link><pubDate>Fri, 01 May 2026 15:28:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-saas-social-engineering/</guid><description>Financially motivated threat actors are using social engineering techniques like vishing and credential harvesting to compromise enterprise SaaS environments, leading to data exfiltration and extortion.</description><content:encoded><![CDATA[<p>Since mid-2025, financially motivated threat actors, potentially including ShinyHunters, have shifted their focus towards social-engineering-driven attacks targeting enterprise SaaS platforms and identity services. These campaigns bypass traditional vulnerability exploitation, instead relying on techniques like voice phishing (vishing), brand impersonation, credential harvesting, and abuse of help-desk processes to compromise user accounts. Once inside, the attackers prioritize data exfiltration and extortion, often operating without deploying malware. This approach makes detection more challenging because their activity blends in with legitimate user behavior. The attackers target a wide range of SaaS applications, including email, document repositories, CRM systems, HR platforms, and analytics tools. They exploit trusted third-party SaaS integrations and OAuth tokens to access downstream systems.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Contact:</strong> The attacker initiates contact with an employee via phone, impersonating IT staff, an identity provider, or a trusted vendor.</li>
<li><strong>Social Engineering:</strong> The attacker claims urgent account or MFA changes are required and directs the victim to an attacker-controlled portal.</li>
<li><strong>Credential Harvesting:</strong> The victim enters their SSO credentials and MFA codes into the fake portal, which the attacker captures. Alternatively, the attacker uses an adversary-in-the-middle (AiTM) framework to capture a valid session in real time.</li>
<li><strong>Session Hijacking:</strong> The attacker uses the stolen credentials or session tokens to gain access to the victim&rsquo;s SaaS accounts.</li>
<li><strong>Lateral Movement:</strong> Using the compromised SSO identity, the attacker pivots to other SaaS applications, such as email, document repositories, and CRM systems.</li>
<li><strong>Data Exfiltration:</strong> The attacker exfiltrates large volumes of sensitive data using legitimate APIs and export functions.</li>
<li><strong>Abuse of Third-Party Integrations:</strong> The attacker exploits trusted third-party SaaS integrations and stored authentication tokens to access downstream systems.</li>
<li><strong>Extortion:</strong> The attacker threatens public disclosure or sale of the stolen data if ransom demands are not met.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful attacks lead to the exfiltration of sensitive data from multiple SaaS applications. Victims face potential financial losses from extortion demands and reputational damage from data breaches. These attacks can impact organizations across various sectors that heavily rely on SaaS infrastructure. The absence of malware makes these attacks harder to detect with traditional endpoint security solutions. Recent reports suggest that ShinyHunters has been actively involved in corporate extortion sprees, indicating a widespread campaign affecting numerous organizations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy phishing-resistant MFA, such as FIDO2 security keys or passkeys, especially for administrators and users with access to sensitive SaaS data (Identity and Access Controls).</li>
<li>Monitor identity provider and SaaS logs for anomalous sign-ins, unusual API activity, and high-volume data exports (SaaS and Cloud Security).</li>
<li>Implement a Sigma rule to detect access to look-alike domains or impersonated subdomains resembling corporate or SSO portals based on DNS or proxy logs (see rule: &ldquo;Detect Access to Impersonated Subdomains&rdquo;).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>social-engineering</category><category>saas</category><category>data-exfiltration</category><category>extortion</category></item></channel></rss>