VPS Shenanigans: How Cyber Crooks Hijack SaaS Accounts with Virtual Trickery
Threat actors are turning to virtual private servers (VPS) to sneakily compromise software-as-a-service (SaaS) accounts. By blending in with legitimate activity, they dodge security measures with the grace of a ninja, conducting phishing attacks and evading detection. It’s a cyber cat-and-mouse game, and the mice just got faster.

Hot Take:
Looks like the villains in the cyber world have found their new Batmobile: the VPS! Who knew a virtual private server could be such a popular ride for cybercriminals? With their slick capability to avoid detection, they’re proving to be the James Bond of servers, except with less martinis and more phishing attacks. Time for IT teams to play a little Inspector Gadget and keep these sneaky spies at bay!
Key Points:
– Cybercriminals are utilizing Virtual Private Servers (VPS) to compromise SaaS accounts by bypassing traditional security measures.
– Darktrace discovered coordinated attacks involving VPS providers, such as Hyonix and Host Universal, which are used to conduct phishing campaigns.
– Attackers are using VPS to mimic legitimate user activity and avoid detection, making traditional security tools largely ineffective.
– Suspicious SaaS activities include anomalous logins and the creation of deceptive email rules to maintain access.
– Despite no lateral movement detected, the coordinated nature of the attacks suggests a shared infrastructure among cybercriminals.