Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Badges, Bytes and Blackmail

February 7, 2026

Ex-Google Engineer Convicted for Stealing AI Secrets for China Startup

February 7, 2026

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026
Facebook X (Twitter) Instagram
Saturday, February 7
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Scattered Lapsus$ Hunters Signal Shift in Tactics
News

Scattered Lapsus$ Hunters Signal Shift in Tactics

Team-CWDBy Team-CWDOctober 22, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Scattered Lapsus$ Hunters appear to be evolving their operational playbook, with Palo Alto Network’s Unit 42 detecting early indicators of tactical shifts via monitored Telegram activity.

Unit 42 has shared insights based on observations it has made via the hackers’ Telegram channel since early October 2025.

One of the developments is the refence to the launch of their extortion-as-a-service (EaaS) program.

This program would be similar to ransomware-as-a-service (RaaS) but with no file encryption.

The Unit 42 author noted that the shift could be in an attempt to “fly under the radar of law enforcement attention.”

We have seen law enforcement take a proactive approach to tackling cybercrime in recent months, with members of the Scattered Spider-linked group arrested in the UK over the summer. Two teens were also arrested in connection with the Kido cyber-attack, also linked to Scattered Spider.

Unit 42 also noted the potential emergence of new ransomware linked to the group. It found Telegram posts referring to talking about and testing new ransomware which is believed to be dubbed SHINYSP1D3R.

These posts, made on October 4, were also linked to observations previously noted by Falconfeeds in August 2025. 

While new ransomware development is concerning, Unit 42 noted that it is unclear if it is still under development or if it is simply a false claim.

Similarly, it remains relatively uncertain if the EaaS program advertised by the threat actors will be as lucrative of a business model as they likely hope it would be, according to Unit 42.

The researchers noted that they had recently attempted to access the data leak site (DLS) associated with the threat actors, and noticed the website had what appeared to be a defacement message posted.

This meant that they were unable to determine if any victim data was still listed.

Scattered LAPSUS$ Hunters had previously listed the deadline for impacted organizations to make a ransom payment as 11:59 PM ET on October 10, 2025.

It is understood that data linked to at least six companies has been leaked.

However, on October 11, 2025, a day after the posted deadline and the release of data for the six organizations, the threat actors stated that “nothing else will be leaked.” 

Scattered Spider, ShinyHunters and LAPSUS$ are associated with The Com, a loosely organized online criminal network involving thousands of English-speaking individuals.

Earlier in September, the group was among those who supposedly said they would be shutting down their operations. However, many observed this as either a PR stunt or an attempt to lie low in the face of escalating law enforcement interest.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleResearchers Expose TA585’s MonsterV2 Malware Capabilities and Attack Chain
Next Article npm, PyPI, and RubyGems Packages Found Sending Developer Data to Discord Channels
Team-CWD
  • Website

Related Posts

News

Badges, Bytes and Blackmail

February 7, 2026
News

Ex-Google Engineer Convicted for Stealing AI Secrets for China Startup

February 7, 2026
News

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

Chronology of a Skype attack

February 5, 2026

What it is and how to protect yourself

January 8, 2026

Why the tech industry needs to stand firm on preserving end-to-end encryption

September 12, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.