CATEGORY
NOV 19TH, 2025

Unit 42 Threat Bulletin – November 2025

The November edition of the Unit 42 Threat Bulletin is live. Find new content and expert perspectives on the latest threats in this packed issue.

Welcome to the November edition of the Unit 42 Threat Bulletin, where we take a look into the threat landscape to surface insights for security leaders. I’m Mitch Mayne, Editor in Chief of the Threat Bulletin and Cybersecurity Research Principal for Unit 42.

This month, we spoke with Senior Principal Researcher Matt Brady about the Scattered LAPSUS$ threat group and what trends to expect next year. Threat Intelligence Manager Richard Emerson explores recent supply chain attacks, and our threat researchers bring us up to date on Jingle Thief retail attacks.

author image
Mitch Mayne, Principal, Security Research

Intel and Insights

Securing the supply chain should be top of mind for every organization, as recent incidents have shown how a single compromise can disrupt operations, erode customer trust and expose partners across an entire digital ecosystem. We spoke to Richard Emerson, manager of Unit 42’s Reactive Threat Intelligence team, about why supply chain risks remain a priority for security leaders and how a recent intrusion into a major technology provider’s environment underscores how close a routine compromise can come to becoming a one-to-many event.

Mitch Mayne: We have seen several high-impact supply chain attacks recently, so this topic is front of mind for many CISOs. This intrusion was not confirmed as a supply chain attack, but it raised many of the same concerns. What makes it worth watching?

Richard Emerson: While we have not observed downstream impact at this point, the concern is that follow-on effects may emerge over time. A highly capable nation-state actor gaining access to a vendor’s development or engineering environment often indicates an intelligence-gathering objective, and it may also signal an interest in reaching customers who rely on that vendor’s technology. It highlights the ongoing appeal of one-to-many compromise.

MM: What does the timeline tell us about how these attacks unfold?

RE: Public reporting suggests the attackers maintained access for an extended period before the intrusion was discovered. The point is that these operations are long-running, whether or not they evolve into full supply chain incidents. Persistent access often provides attackers with insights and opportunities that become visible only much later.

MM: What steps can security leaders take to strengthen resilience against supply chain risk?

RE: Beyond proactive measures like maintaining a robust Cybersecurity Supply Chain Risk Management program, organizations need to operate from an “assume breach” mindset and plan for containment. Zero Trust principles, strong segmentation, and least-privilege access help reduce the chance that a single vendor exposure disrupts operations or cascades across business lines. At the leadership level, it is critical to quantify the risk being outsourced and ensure that those risks align with the company’s tolerance, continuity plans, and regulatory obligations. That alignment is what turns technical controls into business resilience.

author
Richard Emerson, Manager, Threat Intelligence
Read more by Richard Emerson
Video

CISO Unscripted

Scattered LAPSUS$ is noted for fast, high-impact campaigns – but since doxing government officials from several agencies, they’ve gone relatively quiet. They could be facing pressure from law enforcement, or they could be regrouping. In this episode, Senior Principal Researcher Matt Brady predicts what we can expect in 2026, from the recruitment of company insiders to the evolution of ransomware as a service playbooks.
poster image
“Is collaboration across companies and countries actually working? Or is it something we’re doing to be polite in a world of competing incentives, intellectual property battles and revenue goals?”
Michael Daniel, President and CEO of the Cyber Threat Alliance
Podcast

Threat Vector

podcast default icon
podcast default icon

Frenemies With Benefits

00:00 00:00

Behind the Intelligence

A new attack called Jingle Thief is costing retailers hundreds of thousands of dollars in gift card fraud. We talked to researchers Stav Setty and Shachar Roitman about this new threat.

Mitch Mayne: What should we know at a glance?

Stav Setty & Shachar Roitman: This campaign shows how attackers are turning identity into a direct path to profit. They phish employees with convincing Microsoft 365 login pages, harvest credentials, and then operate entirely inside the cloud with no malware or endpoint activity. Once inside, they use legitimate tools to stay hidden, create inbox rules, and quietly issue high-value gift cards across multiple programs. Those cards are quickly resold or laundered, which results in immediate financial loss for the business. The key point is that this fraud happens inside trusted business workflows. These are not system takeovers but process takeovers, where normal permissions are used in abnormal ways. It is a reminder that for modern enterprises, identity has become both the new perimeter and a direct source of financial exposure.

MM: What makes this attack stand out?

SS&SR: The accessibility. Practically any employee who can issue a gift card becomes a potential target. The attackers do not need to compromise an executive or administrator. All they need is one account with the right business function. That is especially true in retail environments where seasonal hiring expands the workforce and creates many new cloud identities in a short time. Once the attackers are inside, they often stay for months. We have seen cases where they quietly operated for nearly a year, learning how systems work and striking again when the business is most vulnerable, such as during peak shopping periods. They are disciplined and financially motivated, and they use legitimate tools to stay under the radar. For CISOs, the concern is visibility. Gift card systems often sit outside centralized monitoring and can span multiple brands or vendors. This makes credential misuse hard to detect until significant losses have already occurred.

MM: What is the big picture here?

SS&SR: Gift cards may seem like a narrow target, but this campaign reflects a broader trend in financial crime. Attackers are exploiting trust in cloud identities to turn access into money. Today the focus is gift cards, but the same methods could apply to loyalty programs, payroll systems, or vendor credits. Once credentials are stolen, they are often sold on dark web marketplaces, giving other actors a foothold in the business.

MM: What should CISOs take away from this research?

SS&SR: CISOs should focus on three things. First, treat identity permissions like financial controls and limit who can issue or approve high-value transactions. Second, monitor for subtle identity anomalies such as MFA resets, new device enrollments, or inbox forwarding rules. Third, invest in behavioral analytics that flag when legitimate users start behaving in risky ways. The Jingle Thief campaign highlights how attackers are monetizing access from inside trusted systems. Strengthening identity governance is no longer just a technical objective. It is essential to protecting revenue, brand trust, and continuity of operations.

author
Stav Setty, Researcher
Read more by Stav Setty
author
Shachar Roitman, Researcher
Read more by Shachar Roitman