CoinbaseCartel is a financially motivated single-extortion threat actor that emerged in September 2025, stealing data instead of encrypting systems and threatening to leak it unless victims pay. It has claimed more than 160 victims worldwide by reusing stolen credentials and is linked by researchers to groups and tools including ShinyHunters, Scattered Spider, Lapsus$, and the shinysp1d3r alias. #CoinbaseCartel #ShinyHunters #ScatteredSpider #Lapsus$ #shinysp1d3r
Keypoints
- CoinbaseCartel emerged in mid-September 2025 with a Tor-based leak site and an unusually aggressive debut of 10 to 17 victim listings.
- The group uses a single-extortion model: it steals data, threatens publication on its leak site, and does not encrypt victim systems.
- Researchers say CoinbaseCartel has claimed more than 160 victims across 36 countries and 17 industry verticals, with technology, healthcare, and logistics among the top targets.
- Its operations are strongly associated with reused stolen credentials from infostealer logs, along with compromised VPN/RDP access, OAuth abuse, and cloud-service exploitation.
- The group is active in partnerships and affiliate recruitment, but it is not a traditional RaaS operation; it offers fixed-fee and revenue-sharing arrangements.
- CoinbaseCartel has advertised a budget above $2 million USD for zero-day exploits, suggesting strong underground financial resources.
- Researchers have linked the group to the alias shinysp1d3r and hypothesized overlaps with ShinyHunters, Scattered Spider, and Lapsus$, though attribution remains unconfirmed.
MITRE Techniques
- [T1078 ] Valid Accounts â The group reuses stolen credentials from infostealer logs to access corporate cloud environments and services (âCredentials harvested by malware families such as RedLine, Lumma, and Vidar are reusedâ).
- [T1078.004 ] Valid Accounts: Cloud Accounts â Stolen cloud credentials are used to authenticate to cloud environments and management consoles (âauthenticate against corporate cloud environmentsâ).
- [T1199 ] Trusted Relationship â CoinbaseCartel is linked to use of initial access brokers and trusted access paths (âlinked to the use of Initial Access Brokersâ).
- [T1566.004 ] Phishing: Spearphishing Voice â The MITRE table lists voice phishing as an observed initial access technique (âPhishing: Spearphishing Voiceâ).
- [T1059.004 ] Command and Scripting Interpreter: Unix Shell â The group uses built-in admin tools and shell activity for low-noise operations (âbuilt-in operating system administrative toolsâ).
- [T1059.006 ] Command and Scripting Interpreter: Python â Custom Python tooling is used to mimic legitimate data export behavior (âcustom Python tooling designed to mimic the legitimate Salesforce Data Loaderâ).
- [T1136 ] Create Account â Persistence may be established by creating accounts (âCreate Accountâ).
- [T1098 ] Account Manipulation â The group modifies or abuses accounts for persistence (âAccount Manipulationâ).
- [T1003 ] OS Credential Dumping â Listed in the ATT&CK mapping as a privilege escalation method (âOS Credential Dumpingâ).
- [T1003.001 ] OS Credential Dumping: LSASS Memory â The table specifically names LSASS memory dumping (âOS Credential Dumping: LSASS Memoryâ).
- [T1070 ] Indicator Removal â The group truncates logs and removes traces to hinder investigation (âtruncates log files in bulkâ).
- [T1562.002 ] Impair Defenses: Disable Windows Event Logging â CoinbaseCartel disables logging and audit functions (âdisables syslog forwarding, and manipulates system-wide audit settingsâ).
- [T1090.003 ] Proxy: Multi-hop Proxy â The ATT&CK table lists multi-hop proxying for concealment (âMulti-hop Proxyâ).
- [T1036 ] Masquerading â The table indicates masquerading to blend in with legitimate activity (âMasqueradingâ).
- [T1555.003 ] Credentials from Password Stores: Web Browsers â The group targets credentials stored in browsers (âCredentials from Password Stores: Web Browsersâ).
- [T1528 ] Steal Application Access Token â OAuth application abuse is used to obtain tokens for persistent access (âgrant persistent access to cloud environmentsâ).
- [T1580 ] Cloud Infrastructure Discovery â The group identifies cloud assets and repositories to target (âCloud Infrastructure Discoveryâ).
- [T1018 ] Remote System Discovery â It searches for systems and repositories of high value (âRemote System Discoveryâ).
- [T1069.002 ] Permission Groups Discovery: Domain Groups â The table lists discovery of privileged groups (âPermission Groups Discovery: Domain Groupsâ).
- [T1021.004 ] Remote Services: SSH â Attackers use SSH for lateral movement (âRemote Services: SSHâ).
- [T1021.001 ] Remote Services: Remote Desktop Protocol â RDP is used to move laterally after access (âRemote Services: Remote Desktop Protocolâ).
- [T1021.002 ] Remote Services: SMB/Windows Admin Shares â SMB/admin shares are used for lateral movement (âRemote Services: SMB/Windows Admin Sharesâ).
- [T1213 ] Data from Information Repositories â The group collects data from CRM and other repositories (âData from Information Repositoriesâ).
- [T1119 ] Automated Collection â Bulk CRM exports and scripted collection are used to gather data (âenabling bulk CRM exportsâ).
Indicators of Compromise
- [Malware Families ] Credential sources referenced in the article â RedLine, Lumma, and Vidar
- [Cloud / Platform Services ] Infrastructure used for exfiltration or access â AWS, Google Cloud, Cloudflare, Salesforce, Microsoft 365, and Google Workspace
- [File Transfer / Remote Access Services ] Targeted services for credential reuse â SFTP, FTP, VPN, and RDP
- [Threat Actor Aliases ] Names associated with the group or hypothesized overlaps â shinysp1d3r, ShinyHunters, Scattered Spider, and Lapsus$
- [Data / File Artifacts ] Collected data is staged before theft â large compressed archives, Salesforce Data Loader, and infostealer logs
- [Network / Delivery Channels ] Delivery and concealment channels mentioned â Tor-based leak site, Tor exit nodes, and commercial VPN services
- [Time / Campaign Markers ] Activity timeline and windows referenced â September 15â16, 2025, April 2026, and early 2026
Read more: https://socradar.io/blog/dark-web-profile-coinbasecartel/