ShinyHunters, one of the most notorious financially motivated eCrime groups, is broadening its arsenal with AI-driven social engineering, supply chain compromises, and insider recruitment, according to new research from EclecticIQ.
EclecticIQ analysts warn: “ShinyHunters is expanding its operations by combining AI-enabled voice phishing, supply chain compromises, and leveraging malicious insiders, such as employees or contractors, who can provide direct access to enterprise networks.”
This evolution highlights a trend of eCrime groups adopting advanced technologies and human infiltration simultaneously, making them far harder to defend against.
The group has been observed outsourcing vishing operations to affiliates. “ShinyHunters is very likely relying on members of Scattered Spider and The Com to conduct voice phishing attacks that provide unauthorized access to single sign-on (SSO) platforms used by retail, airline, and telecom companies.”

Once attackers gain footholds through vishing and SSO compromises, stolen data is monetized at scale. “Analysts observed that ShinyHunters leader, ShinyCorp, is actively selling stolen datasets with ransomware affiliates and other eCrime actors, at prices exceeding $1M per company.”
The group is also developing a ransomware-as-a-service program. EclecticIQ notes: “The ‘shinysp1d3r’ ransomware-as-a-service (RaaS) network is currently in development, with features designed to encrypt VMware ESXi environments.” Once active, it could expand the group’s extortion reach and attract affiliates.
Beyond voice phishing, ShinyHunters has shown increasing interest in development infrastructure. Analysts explain: “ShinyHunters targets high privilege engineering accounts on Git version control, BrowserStack, JFrog, and cloud project management platforms to infiltrate CI/CD pipelines.”
These intrusions provide the group with the ability to compromise entire software supply chains, a tactic already favored by advanced persistent threats (APTs).
ShinyHunters operates under the leadership of the persona ShinyCorp and recruits across Telegram, BreachStars, OGUsers, and DarkForums. EclecticIQ highlights the group’s interconnectedness: “ShinyHunters members operate interchangeably across multiple cybercriminal groups, with some maintaining ties to Ransomware-as-a-Service (RaaS) programs. This cross membership integrates ShinyHunters into the broader eCrime ecosystem.”
Their use of AI-powered voice agents further raises the stakes. By leveraging platforms like Vapi and Bland AI, attackers can scale phishing campaigns that sound convincingly human. “The built-in large language model (LLM) in Bland AI enables attackers to generate and design conversational pathways tailored to specific scenarios, ensuring the call remains convincing even if the victim responds outside the scripted scenario.”
This report demonstrates how ShinyHunters is blurring the line between nation-state sophistication and cybercriminal monetization. Their multi-pronged strategy—blending AI, insider recruitment, supply chain access, and ransomware development—represents a serious escalation in eCrime capability.
As EclecticIQ concludes, “ShinyHunters will likely leverage this service to expand its victim base, attract new affiliates, and broaden its extortion capabilities.”
Related Posts:
- Google Admits Salesforce Breach, Joins Chanel & Allianz on ShinyHunters Victim List
- Smishing Triad: eCrime Group Targets 121+ Countries with Advanced Smishing
- Allianz Life Suffers Data Breach: 1.4 Million Customers’ PII Compromised via Cloud CRM Social Engineering Attack
- Recruitment Scam Targets Job Seekers with Fake CrowdStrike Branding
- Voice Phishing on Microsoft Teams Facilitates DarkGate Malware Attack