Big Tech is Moving Data Through the Gulf Using Fiber-Optic Cables Alongside Iraq's Oil Pipelines
Read more of this story at Slashdot.
Read more of this story at Slashdot.


Read more of this story at Slashdot.
A pair of persistent and problematic threat groups affiliated with The Com are actively targeting organizations across multiple critical infrastructure sectors for rapid data theft and extortion attacks, according to CrowdStrike.
The financially-motivated attackers, which CrowdStrike tracks as Cordial Spider and Snarky Spider, have used voice-phishing and social engineering attacks to break into victimsβ identity platforms and traverse SaaS environments since at least October 2025, the company said in a report Thursday, which it shared exclusively with CyberScoop prior to release.Β
Adam Meyers, senior vice president of counter adversary operations at CrowdStrike, said the subgroups composed of native English speakers primarily target U.S.-based organizations in the academic, aviation, retail, hospitality, automotive, financial services, legal and technology sectors.
This βnew wave of ecrime threat actorsβ are closely aligned with Scattered Spider and linked to other subsets of The Com, including SLSH and ShinyHunters, Meyers said.Β
Because these attacks target identity systems and can expose data in other connected services beyond the initial breach point, itβs difficult to determine how many victims have been caught up in these campaigns.Β
CrowdStrikeβs warning closely follows research Palo Alto Networksβ Unit 42 and the Retail & Hospitality Information Sharing and Analysis Center shared last week about Cordial Spiderβs string of attacks targeting organizations in the retail and hospitality industry, among others.Β
Cordial and Snarky Spider have set lures via voice calls, text messages and emails directing targeting employees to phishing pages posing as their employerβs legitimate single sign-on page or primary identity provider, researchers said.Β
These phishing pages, which capture credentials, session keys or tokens, depending on the workflow, provide attackers an entry point into systems, which they exploit for widespread access across victimsβ entire SaaS ecosystems.
Attackers use these initial hooks to remove and establish multi-factor authentication devices, then delete emails and other alerts that would otherwise warn organizations of potential malicious activity, researchers said.Β
The data theft for extortion campaigns share striking similarities, but CrowdStrike said the tactics, techniques and procedures for each subgroup are distinct. These variances include hours of operation, different phishing domain providers, preferred operating systems, data leak sites, and the tools or devices they used to register for multi-factor authentication.Β
The domain for BlackFile, Cordial Spiderβs data-leak site, was offline as of Wednesday, according to Meyers.
CrowdStrike declined to put a range on the groupsβ extortion demands, but Unit 42 previously said Cordial Spider, which is also tracked as CL-CRI-1116 and UNC6671, are typically in the seven-figure range.
Some victims that didnβt pay extortion demands have been subjected to DDoS attacks, and Snarky Spider has used more aggressive follow-on harassment tactics, including the swatting of victim organizationsβ employees, Meyers said.Β
CrowdStrike said Cordial and Snarky Spider also use residential proxy networks β including Mullvad, Oxylabs, NetNut, 9Proxy, Infatica and NSOCKS β to evade IP-based detection and blend in with typical traffic.Β
Residential proxy networks, which rely on IP addresses assigned to real home users, can serve a legitimate purpose, but researchers have been warning that unethical or outright criminal operators are abusing these networks to build and support botnets, cybercrime campaigns, espionage and other malicious activity.
Cordial and Snarky Spider havenβt achieved the impact or technical capability of Scattered Spider, but the groups share many commonalities and objectives, Meyers said.Β
βTheyβve kind of taken their playbook and theyβre using a lot of their techniques, but we havenβt really seen the technical sophistication demonstrated by them that we saw from Scattered Spider,β he said. βItβs kind of the new generation of Scattered Spider.β
The post Two new extortion crews are speedrunning the Scattered Spider playbook appeared first on CyberScoop.
The growth of data centers β and adversariesβ targeting of them β left lawmakers at a hearing Wednesday contemplating whether the federal government has the right setup for defending them.
Some industry witnesses and experts at the hearing of the House Homeland Security Subcommittee on Cybersecurity and Infrastructure Protection testified that the answer might be to give data centers their own standalone designation as a critical infrastructure sector.
The question of how to secure data centers against cyber and physical attacks coincides with artificial intelligence fuelling a boom in the building of such facilities across the United States. Last month, Iranian drones targeted two Amazon data centers in response to the U.S.-Israel bombing campaign on Iran, and a third data center in Bahrain was struck as well.
βIf a major data center is attacked, disrupted, or taken offline, the consequences can reach far beyond one company or one sector,β Rep. Andy Ogles, R-Tenn., said in prepared opening remarks. βYet our current framework does not provide a clear, unified approach to data center security. It does not clearly answer which federal agency is responsible for understanding the risk, coordinating with industry, or leading the response when this infrastructure is targeted.β
Three providers account for 63 percent of the market share of data centers: Amazon Web Services, Microsoft Azure and Google Cloud Platform.Β
The United Kingdom already has deemed data centers as a standalone critical infrastructure sector. Reps. Vince Fong, R-Calif., and LaMonica McIver, D-N.J., asked panel witnesses Wednesday about federal protection of them.
βGiven the scrutiny that is required to make sure that those data centers are secure, there would be a benefit in having them work together as a unique coordinating council,β said Robert Mayer, senior vice president for cybersecurity and innovation at USTelecom, an industry group.
The Foundation for Defense of Democraciesβ Mark Montgomery suggested a sector that combines data centers and cloud providers, given the overlap in ownership. The 2024 rewrite of a White House national security memo left some experts disappointed that it didnβt designate cloud computing as a critical infrastructure sector.Β
Samuel Visner, chair of the board of directors of the Space Information Sharing and Analysis Center, said he agreed, given the role data centers are playing in the U.S. economy, military and other dependencies. βFinding a way to regard them as part of our critical infrastructure and protect them accordingly is sine qua non, absolutely necessary,β he said.
A fourth witness didnβt weigh in on the need for a separate critical infrastructure designation. But Scott Algeier, executive director of Information Technology Information Sharing and Analysis Center, said his organization had created a βspecial interest groupβ for data center providers.
βThe data centers are integrated already into the critical infrastructure discussions,β he told the panel.
The post Congress, industry ponder government posture for protecting data centers appeared first on CyberScoop.
Researchers found more than 80 high-impact cloud and AI vulnerabilities during the event, which had a $5 million prize pool.
The post Microsoft Paid Out $2.3 Million at Zero Day Quest 2026 Hacking Contest appeared first on SecurityWeek.


Palo Alto Networks has disclosed the details of its analysis of Google Cloud Platformβs Vertex AI.
The post Google Addresses Vertex Security Issues After Researchers Weaponize AI Agents appeared first on SecurityWeek.

The company has disclosed a cybersecurity incident involving one of its electronic health record environments.
The post Healthcare IT Platform CareCloud Probing Potential Data Breach appeared first on SecurityWeek.

Read more of this story at Slashdot.
Read more of this story at Slashdot.

