The Containment Era is here. →Explore

Executive Summary

In October 2025, two financially motivated threat groups, Cordial Spider and Snarky Spider, affiliated with The Com, initiated a series of rapid data theft and extortion attacks targeting U.S.-based organizations across sectors such as academia, aviation, retail, hospitality, automotive, financial services, legal, and technology. Utilizing voice-phishing and social engineering tactics, these groups directed employees to fraudulent single sign-on (SSO) pages to capture credentials, enabling them to infiltrate identity platforms and traverse SaaS environments. Once inside, they removed existing multi-factor authentication (MFA) devices, established their own, and deleted alerts to conceal their activities, leading to significant data exfiltration and extortion demands, often in the seven-figure range.

This incident underscores a growing trend of cybercriminals leveraging sophisticated social engineering techniques to exploit identity systems, highlighting the urgent need for organizations to enhance their security measures against such evolving threats.

Why This Matters Now

The emergence of Cordial Spider and Snarky Spider highlights the increasing sophistication of cybercriminal groups in exploiting identity systems through advanced social engineering tactics, emphasizing the critical need for organizations to bolster their defenses against such evolving threats.

Attack Path Analysis

MITRE ATT&CK® Techniques

Potential Compliance Exposure

Sector Implications

Sources

Frequently Asked Questions

The attacks revealed vulnerabilities in identity management and multi-factor authentication processes, indicating a need for stricter access controls and user verification methods.

Cloud Native Security Fabric Mitigations and ControlsCNSF

Aviatrix Zero Trust CNSF is pertinent to this incident as it embeds security directly into the cloud fabric, potentially limiting attackers' ability to move laterally and exfiltrate data.

Initial Compromise

Control: Cloud Native Security Fabric (CNSF)

Mitigation: While Aviatrix Zero Trust CNSF may not prevent initial credential compromise, it could limit unauthorized access by enforcing strict identity-based policies.

Privilege Escalation

Control: Zero Trust Segmentation

Mitigation: Aviatrix Zero Trust Segmentation could limit the scope of privilege escalation by enforcing least-privilege access controls.

Lateral Movement

Control: East-West Traffic Security

Mitigation: Aviatrix East-West Traffic Security could constrain lateral movement by monitoring and controlling internal traffic flows.

Command & Control

Control: Multicloud Visibility & Control

Mitigation: Aviatrix Multicloud Visibility & Control could limit command and control activities by providing comprehensive monitoring across cloud environments.

Exfiltration

Control: Egress Security & Policy Enforcement

Mitigation: Aviatrix Egress Security & Policy Enforcement could reduce data exfiltration risks by controlling outbound data flows.

Impact (Mitigations)

While Aviatrix Zero Trust CNSF may not prevent initial data theft, it could limit the extent of data exposure, potentially reducing the impact of extortion attempts.

Impact at a Glance

Affected Business Functions

  • Identity and Access Management
  • SaaS Application Management
  • Data Security
  • Incident Response
Operational Disruption

Estimated downtime: 7 days

Financial Impact

Estimated loss: $1,000,000

Data Exposure

Potential exposure of sensitive corporate data, including customer information and intellectual property.

Recommended Actions

  • Implement robust multi-factor authentication (MFA) mechanisms to prevent unauthorized access through compromised credentials.
  • Enforce strict identity and access management (IAM) policies to limit privilege escalation opportunities.
  • Utilize network segmentation and east-west traffic monitoring to detect and prevent lateral movement within the network.
  • Deploy advanced threat detection systems to identify and respond to command and control communications.
  • Establish comprehensive data loss prevention (DLP) strategies to monitor and control data exfiltration activities.

Secure the Paths Between Cloud Workloads

A cloud-native security fabric that enforces Zero Trust across workload communication—reducing attack paths, compliance risk, and operational complexity.

Cta pattren Image