ForumsGeneralCordial Spider & Snarky Spider: SaaS Extortion without Malware

Cordial Spider & Snarky Spider: SaaS Extortion without Malware

DNS_Security_Rita 5/1/2026 USER

Just caught the latest intel on Cordial Spider (BlackFile) and Snarky Spider. The shift to "living off the land" strictly within the SaaS tenant is concerning. They aren't dropping malware; they are abusing native collaboration tools to exfiltrate data rapidly after bypassing SSO via vishing.

The "minimal traces" part is the kicker. Since they are interacting via the web UI or Graph API using legitimate credentials, standard EDR is effectively blind. By the time you see the data leaving, it's too late—they are already extorting the victim.

For those running Entra ID (Azure AD) or monitoring SaaS logs, you should be hunting for 'Anomalous Token Usage'. Specifically, look for users accessing the Graph API with unusual User Agents or from impossible travel locations shortly after a help desk ticket was closed (a common vishing vector).

Here is a KQL query to hunt for rapid mass-download behaviors via the Microsoft Graph API, which is a key TTP for these groups:

AuditLogs
| where OperationName == "Download file" or OperationName == "ExportItem"
| where InitiatedBy App contains "Graph Explorer" or InitiatedBy App contains "REST API"
| extend TargetId = tostring(TargetResources[0].id)
| summarize Count = count() by bin(TimeGenerated, 5m), InitiatedBy, TargetId
| where Count > 10
| order by Count desc


I’m also looking at tightening Conditional Access to require 'Compliant Device' or 'Hybrid Azure AD Joined' status for sensitive admin tasks, though that breaks some BYOD workflows.

How is everyone else handling the vishing angle? Are we seeing an uptick in helpdesk spoofing, or is it mostly direct MFA fatigue attacks against users?

IA
IAM_Specialist_Yuki5/1/2026

We saw a similar trend last quarter. The vishing calls were incredibly sophisticated—spoofing the internal IT number and knowing the org structure. We stopped it by enforcing FIDO2 hardware keys for all admin roles and Privileged Identity Management (PIM). Even if they social engineer the password, they can't get the token without the physical key. It's the only thing that reliably stops this SSO abuse wave.

CR
CryptoKatie5/1/2026

Great query. You can also add a filter for 'LocationDetails' to detect the impossible travel scenarios more effectively:

| evaluate geo_distance_query(IPAddress, 50)


We found that Cordial Spider often moves from a residential VPN (in the US/EU) to a data center IP (hosting) in the same region to bypass basic geo-fencing. Correlating the sign-in risk score during the session creation is critical.
IN
Incident_Cmdr_Tanya5/1/2026

From the MSP side, this is a nightmare for clients without dedicated SOC teams. We've automated the response using Logic Apps: if a user triggers 'High Risk' sign-in during off-hours, their session is revoked and the account is flagged for review immediately. We can't wait for humans to catch this anymore.

Verified Access Required

To maintain the integrity of our intelligence feeds, only verified partners and security professionals can post replies.

Request Access

Thread Stats

Created5/1/2026
Last Active5/1/2026
Replies3
Views62