Threat Actor Characterization
You’re viewing the read-only version.
Sign in for analyst tools (editors, promote draft, file/relations management, etc.)
Shinyhunters
ID: b24e8db4391f6c92a113a67f24a03a33
Hacktivist Group
Hacktivism
Threat types: Hacktivism, Intrusion, Extortion, Vishing
Progress: 77%
Completeness: 80%
Freshness: 70%
Operation zone: —
Aliases
Limited alias preview
| Shiny | Shiny Hunters | Sh******* | Sh*********** |
Showing 2 of 4 aliases in free preview.
Actor Network Graph
Open Network GraphMITRE ATT&CK®
confidence: medium-high
ShinyHunters is a cybercrime brand associated with large-scale data theft and extortion. Recent OSINT emphasizes identity-driven access (vishing/SSO credential theft) and OAuth/token abuse leading to SaaS tenant access and bulk export, alongside underground forum ecosystem adjacency (BreachForums) used for pressure and monetization. Activity is often claim-led; corroborate via victim disclosures and telemetry.
| Technique | Technique name | Tactics | Evidence |
|---|---|---|---|
| T1598 | Phishing for Information | TA0043 |
|
| T1078 | Valid Accounts | TA0001 TA0003 TA0004 TA0005 |
|
| T1528 | Steal Application Access Token | TA0006 |
|
| T1005 | Data from Local System | TA0009 |
|
| T1041 | Exfiltration Over C2 Channel | TA0010 |
|
| T1567.002 | Exfiltration to Cloud Storage | TA0010 |
|
| T1654 | Log Enumeration | TA0007 |
|
Executive brief
now
Saved successfully.
Hunting Playbook — ShinyHunters
Focus: identity-first compromise, OAuth/SSO abuse, SaaS tenant exports, and extortion pressure workflows. This playbook prioritizes early detection before bulk export and disclosure pressure.
Tip: Hover the section title to learn what’s included in Analyst / Premium plans.
Hunting Playbook
now
Saved successfully.
IOC Appendix
now
Saved successfully.
OSINT Library
now
Saved successfully.