Over 100 Organizations Targeted in ShinyHunters Phishing Campaign
Domains set up by the threat actor suggest attacks aimed at Atlassian, Canva, Epic Games, HubSpot, Moderna, ZoomInfo, and WeWork. The post Over 100 Organizations Targeted in ShinyHunters Phishing Campaign appeared first on SecurityWeek .
AI Analysis
Technical Summary
The ShinyHunters phishing campaign involves the creation of fraudulent domains impersonating well-known organizations including Atlassian, Canva, Epic Games, HubSpot, Moderna, ZoomInfo, and WeWork. These domains are used to conduct phishing attacks aimed at harvesting credentials or delivering malware to employees and affiliates of these companies. The campaign targets over 100 organizations, indicating a broad and coordinated effort. Phishing remains a prevalent attack vector due to its effectiveness in bypassing technical controls by exploiting human factors. The absence of specific affected software versions or known exploits suggests the attack relies primarily on social engineering rather than technical vulnerabilities. The threat actor’s choice of high-profile targets indicates an intent to access valuable corporate data or intellectual property. The medium severity rating reflects the potential for unauthorized access and data breaches if credentials are compromised, but the attack requires user interaction and does not exploit zero-day vulnerabilities. The campaign highlights the importance of vigilance against domain spoofing and phishing attempts, especially for organizations using or partnering with the targeted companies.
Potential Impact
For European organizations, this phishing campaign poses a significant risk of credential compromise, leading to unauthorized access to corporate networks and sensitive data. Given the involvement of widely used platforms such as Atlassian and HubSpot, successful phishing could enable lateral movement within networks, data exfiltration, or deployment of ransomware. The impact extends to operational disruption, reputational damage, and potential regulatory penalties under GDPR if personal data is exposed. Organizations in sectors like healthcare (e.g., Moderna), technology, and professional services are particularly vulnerable due to the nature of the targeted companies. The campaign could also facilitate supply chain attacks by compromising partners or service providers. The reliance on user interaction means that the effectiveness of the attack can vary, but the broad targeting increases the likelihood of successful compromises. European entities with remote workforces or less mature phishing defenses may face heightened exposure.
Mitigation Recommendations
European organizations should implement targeted phishing awareness and training programs emphasizing the recognition of domain spoofing and social engineering tactics. Deploy advanced email filtering solutions capable of detecting and blocking phishing domains and suspicious attachments. Monitor domain registrations similar to corporate brands and report fraudulent domains to relevant authorities and hosting providers for takedown. Enforce multi-factor authentication (MFA) across all critical systems to reduce the risk of compromised credentials leading to unauthorized access. Conduct regular simulated phishing exercises to assess and improve employee resilience. Integrate threat intelligence feeds to stay informed about emerging phishing domains and tactics used by ShinyHunters. Ensure incident response plans include procedures for credential compromise and phishing attack containment. Collaborate with industry groups and law enforcement to share information about ongoing campaigns and mitigation strategies.
Affected Countries
United Kingdom, Germany, France, Netherlands, Italy, Spain, Sweden
Over 100 Organizations Targeted in ShinyHunters Phishing Campaign
Description
Domains set up by the threat actor suggest attacks aimed at Atlassian, Canva, Epic Games, HubSpot, Moderna, ZoomInfo, and WeWork. The post Over 100 Organizations Targeted in ShinyHunters Phishing Campaign appeared first on SecurityWeek .
AI-Powered Analysis
Technical Analysis
The ShinyHunters phishing campaign involves the creation of fraudulent domains impersonating well-known organizations including Atlassian, Canva, Epic Games, HubSpot, Moderna, ZoomInfo, and WeWork. These domains are used to conduct phishing attacks aimed at harvesting credentials or delivering malware to employees and affiliates of these companies. The campaign targets over 100 organizations, indicating a broad and coordinated effort. Phishing remains a prevalent attack vector due to its effectiveness in bypassing technical controls by exploiting human factors. The absence of specific affected software versions or known exploits suggests the attack relies primarily on social engineering rather than technical vulnerabilities. The threat actor’s choice of high-profile targets indicates an intent to access valuable corporate data or intellectual property. The medium severity rating reflects the potential for unauthorized access and data breaches if credentials are compromised, but the attack requires user interaction and does not exploit zero-day vulnerabilities. The campaign highlights the importance of vigilance against domain spoofing and phishing attempts, especially for organizations using or partnering with the targeted companies.
Potential Impact
For European organizations, this phishing campaign poses a significant risk of credential compromise, leading to unauthorized access to corporate networks and sensitive data. Given the involvement of widely used platforms such as Atlassian and HubSpot, successful phishing could enable lateral movement within networks, data exfiltration, or deployment of ransomware. The impact extends to operational disruption, reputational damage, and potential regulatory penalties under GDPR if personal data is exposed. Organizations in sectors like healthcare (e.g., Moderna), technology, and professional services are particularly vulnerable due to the nature of the targeted companies. The campaign could also facilitate supply chain attacks by compromising partners or service providers. The reliance on user interaction means that the effectiveness of the attack can vary, but the broad targeting increases the likelihood of successful compromises. European entities with remote workforces or less mature phishing defenses may face heightened exposure.
Mitigation Recommendations
European organizations should implement targeted phishing awareness and training programs emphasizing the recognition of domain spoofing and social engineering tactics. Deploy advanced email filtering solutions capable of detecting and blocking phishing domains and suspicious attachments. Monitor domain registrations similar to corporate brands and report fraudulent domains to relevant authorities and hosting providers for takedown. Enforce multi-factor authentication (MFA) across all critical systems to reduce the risk of compromised credentials leading to unauthorized access. Conduct regular simulated phishing exercises to assess and improve employee resilience. Integrate threat intelligence feeds to stay informed about emerging phishing domains and tactics used by ShinyHunters. Ensure incident response plans include procedures for credential compromise and phishing attack containment. Collaborate with industry groups and law enforcement to share information about ongoing campaigns and mitigation strategies.
Affected Countries
Threat ID: 6978d4214623b1157c312357
Added to database: 1/27/2026, 3:05:05 PM
Last enriched: 1/27/2026, 3:05:21 PM
Last updated: 2/3/2026, 10:19:06 AM
Views: 105
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Mandiant Finds ShinyHunters-Style Vishing Attacks Stealing MFA to Breach SaaS Platforms
MediumGoogle Presentations Abused for Phishing, (Fri, Jan 30th)
MediumIn Other News: Paid for Being Jailed, Google’s $68M Settlement, CISA Chief’s ChatGPT Leak
MediumInitial Stages of Romance Scams [Guest Diary], (Tue, Jan 27th)
MediumPhishers Abuse SharePoint in New Campaign Targeting Energy Sector
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.