[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.] #  @SpiderLabs SpiderLabs SpiderLabs posts on X about microsoft, $googl, portal, docusign the most. They currently have XXXXXX followers and X posts still getting attention that total XXX engagements in the last XX hours. ### Engagements: XXX [#](/creator/twitter::18741862/interactions)  - X Week XXXXX +3,620% - X Month XXXXXX +753% - X Months XXXXXX +538% - X Year XXXXXX +171% ### Mentions: X [#](/creator/twitter::18741862/posts_active)  - X Week X +100% - X Month X +50% - X Months XX +114% - X Year XX +69% ### Followers: XXXXXX [#](/creator/twitter::18741862/followers)  - X Week XXXXXX +0.03% - X Month XXXXXX -XXXX% - X Months XXXXXX +0.10% - X Year XXXXXX -XXXX% ### CreatorRank: XXXXXXXXX [#](/creator/twitter::18741862/influencer_rank)  ### Social Influence **Social category influence** [stocks](/list/stocks) XX% [technology brands](/list/technology-brands) XX% [social networks](/list/social-networks) XX% [finance](/list/finance) XX% **Social topic influence** [microsoft](/topic/microsoft) #1267, [$googl](/topic/$googl) 20%, [portal](/topic/portal) 20%, [docusign](/topic/docusign) 20%, [telegram](/topic/telegram) 20%, [microsoft teams](/topic/microsoft-teams) 20%, [the official](/topic/the-official) 20%, [business](/topic/business) 20%, [accounting](/topic/accounting) XX% **Top accounts mentioned or mentioned by** [@teamsmailmicrosoft](/creator/undefined) **Top assets mentioned** [Microsoft Corp. (MSFT)](/topic/microsoft) [Alphabet Inc Class A (GOOGL)](/topic/$googl) ### Top Social Posts Top posts by engagements in the last XX hours "#PhishingAlert 🚨 A new phishing campaign is using newly registered domains to impersonate #Google Partners luring victims with fake personal invitations to claim a Partner Badge. The links lead to a spoofed Google page before redirecting to a phishing login portal with domains following patterns such as signup.gpartnerrandomstrings.com or invite.gpartnerrandomstrings.com so remain cautious and verify any unexpected badge or partner invitations before clicking. Sample IoCs: hxxps://signup.gpartnerpaths.com hxxps://signup.gpartnercollect.com hxxps://signup.gpartnerpaths.com" [X Link](https://x.com/SpiderLabs/status/1993826655408935208) 2025-11-26T23:38Z 27K followers, XXX engagements "#PhishingAlert: We spotted a new #phishing campaign impersonating HR departments with fake bonus-themed emails. It includes a PDF document that is branded with #DocuSign and embeds a QR code that points to a #DocSend URL as a redirector. The final payload is a blob-based phishing page spoofing #Microsoft login rendered in-browser. Objective: credential harvesting #Quishing #Scams #CyberSecurity #MailMarshal #Spiderlabs #Cybercrime #ThreatIntel #InfoSec #IOCs: hxxps://docsend.com/view/aj4bpd25ewvnnph2 hxxps://embelektrik.com.tr/blb/blob.html blob://hxxps://embelektrik.com.tr/* POST:" [X Link](https://x.com/SpiderLabs/status/1991321775314203059) 2025-11-20T01:44Z 27K followers, 1740 engagements "#MalwareAlert: A new "Executive Award" campaign delivers a two-stage hit. First a polished HTML phish steals credentials straight to Telegram C2. Then a malicious SVG triggers a PowerShell #ClickFix chain that installs the #Stealerium infostealer via multi-stage loaders. One lure = stolen credentials + malware infection. #cybersecurity #malware #mailmarshal #IoCs: Virtual-Gift-Card-Claim.html 4db5c047a1cfd9ee5f8da8611c30889b 7cb2fa5762cb71120e16e9a778c5a1f1c3649aa02e06f837bf142885b98ee58c account-verification-form.svg 5ed74724b45d28825d93f21097dc2475" [X Link](https://x.com/SpiderLabs/status/1995639456028926169) 2025-12-01T23:41Z 27K followers, 6273 engagements "PhishingAlert: Threat actors are abusing #Microsoft Teams notifications to deliver callback #phishing. Victims are invited to groups where team names contain the #scam content such as fake invoices auto-renewal notices or #PayPal payment claims and urges users to call a fake support number if the charge was not authorized. Because these messages come from the official Microsoft Teams sender address (no-reply@teams.mail.microsoft) they may bypass user suspicion and email filters. #CyberSecurity #Cybersec #Microsoft365 #MailMarshal #Trustwave #Levelblue #Spiderlabs #IOC #Scams Scam numbers: 1" [X Link](https://x.com/SpiderLabs/status/1996706651500577118) 2025-12-04T22:22Z 27K followers, 2170 engagements "#BECAlert We detected a large-scale Business Email Compromise (BEC) campaign sent using SendGrid targeting company accounting departments globally. This attack impersonates the company's executive and an accountant from a coaching firm with the latter requesting payment for a bogus overdue executive coaching invoice. IoCs: ipeccoach.info novus-worldwide.ws novusworldwide.org novus-global.us xiroemail.com executives-foxmails.com #BEC #Scam #MailMarshal" [X Link](https://x.com/SpiderLabs/status/1997019490585137386) 2025-12-05T19:05Z 27K followers, 1724 engagements
[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.]
@SpiderLabs SpiderLabsSpiderLabs posts on X about microsoft, $googl, portal, docusign the most. They currently have XXXXXX followers and X posts still getting attention that total XXX engagements in the last XX hours.
Social category influence stocks XX% technology brands XX% social networks XX% finance XX%
Social topic influence microsoft #1267, $googl 20%, portal 20%, docusign 20%, telegram 20%, microsoft teams 20%, the official 20%, business 20%, accounting XX%
Top accounts mentioned or mentioned by @teamsmailmicrosoft
Top assets mentioned Microsoft Corp. (MSFT) Alphabet Inc Class A (GOOGL)
Top posts by engagements in the last XX hours
"#PhishingAlert 🚨 A new phishing campaign is using newly registered domains to impersonate #Google Partners luring victims with fake personal invitations to claim a Partner Badge. The links lead to a spoofed Google page before redirecting to a phishing login portal with domains following patterns such as signup.gpartnerrandomstrings.com or invite.gpartnerrandomstrings.com so remain cautious and verify any unexpected badge or partner invitations before clicking. Sample IoCs: hxxps://signup.gpartnerpaths.com hxxps://signup.gpartnercollect.com hxxps://signup.gpartnerpaths.com"
X Link 2025-11-26T23:38Z 27K followers, XXX engagements
"#PhishingAlert: We spotted a new #phishing campaign impersonating HR departments with fake bonus-themed emails. It includes a PDF document that is branded with #DocuSign and embeds a QR code that points to a #DocSend URL as a redirector. The final payload is a blob-based phishing page spoofing #Microsoft login rendered in-browser. Objective: credential harvesting #Quishing #Scams #CyberSecurity #MailMarshal #Spiderlabs #Cybercrime #ThreatIntel #InfoSec #IOCs: hxxps://docsend.com/view/aj4bpd25ewvnnph2 hxxps://embelektrik.com.tr/blb/blob.html blob://hxxps://embelektrik.com.tr/* POST:"
X Link 2025-11-20T01:44Z 27K followers, 1740 engagements
"#MalwareAlert: A new "Executive Award" campaign delivers a two-stage hit. First a polished HTML phish steals credentials straight to Telegram C2. Then a malicious SVG triggers a PowerShell #ClickFix chain that installs the #Stealerium infostealer via multi-stage loaders. One lure = stolen credentials + malware infection. #cybersecurity #malware #mailmarshal #IoCs: Virtual-Gift-Card-Claim.html 4db5c047a1cfd9ee5f8da8611c30889b 7cb2fa5762cb71120e16e9a778c5a1f1c3649aa02e06f837bf142885b98ee58c account-verification-form.svg 5ed74724b45d28825d93f21097dc2475"
X Link 2025-12-01T23:41Z 27K followers, 6273 engagements
"PhishingAlert: Threat actors are abusing #Microsoft Teams notifications to deliver callback #phishing. Victims are invited to groups where team names contain the #scam content such as fake invoices auto-renewal notices or #PayPal payment claims and urges users to call a fake support number if the charge was not authorized. Because these messages come from the official Microsoft Teams sender address (no-reply@teams.mail.microsoft) they may bypass user suspicion and email filters. #CyberSecurity #Cybersec #Microsoft365 #MailMarshal #Trustwave #Levelblue #Spiderlabs #IOC #Scams Scam numbers: 1"
X Link 2025-12-04T22:22Z 27K followers, 2170 engagements
"#BECAlert We detected a large-scale Business Email Compromise (BEC) campaign sent using SendGrid targeting company accounting departments globally. This attack impersonates the company's executive and an accountant from a coaching firm with the latter requesting payment for a bogus overdue executive coaching invoice. IoCs: ipeccoach.info novus-worldwide.ws novusworldwide.org novus-global.us xiroemail.com executives-foxmails.com #BEC #Scam #MailMarshal"
X Link 2025-12-05T19:05Z 27K followers, 1724 engagements
/creator/twitter::SpiderLabs