Dark | Light
[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.]

# ![@SpiderLabs Avatar](https://lunarcrush.com/gi/w:26/cr:twitter::18741862.png) @SpiderLabs SpiderLabs

SpiderLabs posts on X about microsoft, $googl, portal, docusign the most. They currently have XXXXXX followers and X posts still getting attention that total XXX engagements in the last XX hours.

### Engagements: XXX [#](/creator/twitter::18741862/interactions)
![Engagements Line Chart](https://lunarcrush.com/gi/w:600/cr:twitter::18741862/c:line/m:interactions.svg)

- X Week XXXXX +3,620%
- X Month XXXXXX +753%
- X Months XXXXXX +538%
- X Year XXXXXX +171%

### Mentions: X [#](/creator/twitter::18741862/posts_active)
![Mentions Line Chart](https://lunarcrush.com/gi/w:600/cr:twitter::18741862/c:line/m:posts_active.svg)

- X Week X +100%
- X Month X +50%
- X Months XX +114%
- X Year XX +69%

### Followers: XXXXXX [#](/creator/twitter::18741862/followers)
![Followers Line Chart](https://lunarcrush.com/gi/w:600/cr:twitter::18741862/c:line/m:followers.svg)

- X Week XXXXXX +0.03%
- X Month XXXXXX -XXXX%
- X Months XXXXXX +0.10%
- X Year XXXXXX -XXXX%

### CreatorRank: XXXXXXXXX [#](/creator/twitter::18741862/influencer_rank)
![CreatorRank Line Chart](https://lunarcrush.com/gi/w:600/cr:twitter::18741862/c:line/m:influencer_rank.svg)

### Social Influence

**Social category influence**
[stocks](/list/stocks)  XX% [technology brands](/list/technology-brands)  XX% [social networks](/list/social-networks)  XX% [finance](/list/finance)  XX%

**Social topic influence**
[microsoft](/topic/microsoft) #1267, [$googl](/topic/$googl) 20%, [portal](/topic/portal) 20%, [docusign](/topic/docusign) 20%, [telegram](/topic/telegram) 20%, [microsoft teams](/topic/microsoft-teams) 20%, [the official](/topic/the-official) 20%, [business](/topic/business) 20%, [accounting](/topic/accounting) XX%

**Top accounts mentioned or mentioned by**
[@teamsmailmicrosoft](/creator/undefined)

**Top assets mentioned**
[Microsoft Corp. (MSFT)](/topic/microsoft) [Alphabet Inc Class A (GOOGL)](/topic/$googl)
### Top Social Posts
Top posts by engagements in the last XX hours

"#PhishingAlert 🚨 A new phishing campaign is using newly registered domains to impersonate #Google Partners luring victims with fake personal invitations to claim a Partner Badge. The links lead to a spoofed Google page before redirecting to a phishing login portal with domains following patterns such as signup.gpartnerrandomstrings.com or invite.gpartnerrandomstrings.com so remain cautious and verify any unexpected badge or partner invitations before clicking. Sample IoCs: hxxps://signup.gpartnerpaths.com hxxps://signup.gpartnercollect.com hxxps://signup.gpartnerpaths.com"  
[X Link](https://x.com/SpiderLabs/status/1993826655408935208)  2025-11-26T23:38Z 27K followers, XXX engagements


"#PhishingAlert: We spotted a new #phishing campaign impersonating HR departments with fake bonus-themed emails. It includes a PDF document that is branded with #DocuSign and embeds a QR code that points to a #DocSend URL as a redirector. The final payload is a blob-based phishing page spoofing #Microsoft login rendered in-browser. Objective: credential harvesting #Quishing #Scams #CyberSecurity #MailMarshal #Spiderlabs #Cybercrime #ThreatIntel #InfoSec #IOCs: hxxps://docsend.com/view/aj4bpd25ewvnnph2 hxxps://embelektrik.com.tr/blb/blob.html blob://hxxps://embelektrik.com.tr/* POST:"  
[X Link](https://x.com/SpiderLabs/status/1991321775314203059)  2025-11-20T01:44Z 27K followers, 1740 engagements


"#MalwareAlert: A new "Executive Award" campaign delivers a two-stage hit. First a polished HTML phish steals credentials straight to Telegram C2. Then a malicious SVG triggers a PowerShell #ClickFix chain that installs the #Stealerium infostealer via multi-stage loaders. One lure = stolen credentials + malware infection. #cybersecurity #malware #mailmarshal #IoCs: Virtual-Gift-Card-Claim.html 4db5c047a1cfd9ee5f8da8611c30889b 7cb2fa5762cb71120e16e9a778c5a1f1c3649aa02e06f837bf142885b98ee58c account-verification-form.svg 5ed74724b45d28825d93f21097dc2475"  
[X Link](https://x.com/SpiderLabs/status/1995639456028926169)  2025-12-01T23:41Z 27K followers, 6273 engagements


"PhishingAlert: Threat actors are abusing #Microsoft Teams notifications to deliver callback #phishing. Victims are invited to groups where team names contain the #scam content such as fake invoices auto-renewal notices or #PayPal payment claims and urges users to call a fake support number if the charge was not authorized. Because these messages come from the official Microsoft Teams sender address (no-reply@teams.mail.microsoft) they may bypass user suspicion and email filters. #CyberSecurity #Cybersec #Microsoft365 #MailMarshal #Trustwave #Levelblue #Spiderlabs #IOC #Scams Scam numbers: 1"  
[X Link](https://x.com/SpiderLabs/status/1996706651500577118)  2025-12-04T22:22Z 27K followers, 2170 engagements


"#BECAlert We detected a large-scale Business Email Compromise (BEC) campaign sent using SendGrid targeting company accounting departments globally. This attack impersonates the company's executive and an accountant from a coaching firm with the latter requesting payment for a bogus overdue executive coaching invoice. IoCs: ipeccoach.info novus-worldwide.ws novusworldwide.org novus-global.us xiroemail.com executives-foxmails.com #BEC #Scam #MailMarshal"  
[X Link](https://x.com/SpiderLabs/status/1997019490585137386)  2025-12-05T19:05Z 27K followers, 1724 engagements

[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.]

@SpiderLabs Avatar @SpiderLabs SpiderLabs

SpiderLabs posts on X about microsoft, $googl, portal, docusign the most. They currently have XXXXXX followers and X posts still getting attention that total XXX engagements in the last XX hours.

Engagements: XXX #

Engagements Line Chart

  • X Week XXXXX +3,620%
  • X Month XXXXXX +753%
  • X Months XXXXXX +538%
  • X Year XXXXXX +171%

Mentions: X #

Mentions Line Chart

  • X Week X +100%
  • X Month X +50%
  • X Months XX +114%
  • X Year XX +69%

Followers: XXXXXX #

Followers Line Chart

  • X Week XXXXXX +0.03%
  • X Month XXXXXX -XXXX%
  • X Months XXXXXX +0.10%
  • X Year XXXXXX -XXXX%

CreatorRank: XXXXXXXXX #

CreatorRank Line Chart

Social Influence

Social category influence stocks XX% technology brands XX% social networks XX% finance XX%

Social topic influence microsoft #1267, $googl 20%, portal 20%, docusign 20%, telegram 20%, microsoft teams 20%, the official 20%, business 20%, accounting XX%

Top accounts mentioned or mentioned by @teamsmailmicrosoft

Top assets mentioned Microsoft Corp. (MSFT) Alphabet Inc Class A (GOOGL)

Top Social Posts

Top posts by engagements in the last XX hours

"#PhishingAlert 🚨 A new phishing campaign is using newly registered domains to impersonate #Google Partners luring victims with fake personal invitations to claim a Partner Badge. The links lead to a spoofed Google page before redirecting to a phishing login portal with domains following patterns such as signup.gpartnerrandomstrings.com or invite.gpartnerrandomstrings.com so remain cautious and verify any unexpected badge or partner invitations before clicking. Sample IoCs: hxxps://signup.gpartnerpaths.com hxxps://signup.gpartnercollect.com hxxps://signup.gpartnerpaths.com"
X Link 2025-11-26T23:38Z 27K followers, XXX engagements

"#PhishingAlert: We spotted a new #phishing campaign impersonating HR departments with fake bonus-themed emails. It includes a PDF document that is branded with #DocuSign and embeds a QR code that points to a #DocSend URL as a redirector. The final payload is a blob-based phishing page spoofing #Microsoft login rendered in-browser. Objective: credential harvesting #Quishing #Scams #CyberSecurity #MailMarshal #Spiderlabs #Cybercrime #ThreatIntel #InfoSec #IOCs: hxxps://docsend.com/view/aj4bpd25ewvnnph2 hxxps://embelektrik.com.tr/blb/blob.html blob://hxxps://embelektrik.com.tr/* POST:"
X Link 2025-11-20T01:44Z 27K followers, 1740 engagements

"#MalwareAlert: A new "Executive Award" campaign delivers a two-stage hit. First a polished HTML phish steals credentials straight to Telegram C2. Then a malicious SVG triggers a PowerShell #ClickFix chain that installs the #Stealerium infostealer via multi-stage loaders. One lure = stolen credentials + malware infection. #cybersecurity #malware #mailmarshal #IoCs: Virtual-Gift-Card-Claim.html 4db5c047a1cfd9ee5f8da8611c30889b 7cb2fa5762cb71120e16e9a778c5a1f1c3649aa02e06f837bf142885b98ee58c account-verification-form.svg 5ed74724b45d28825d93f21097dc2475"
X Link 2025-12-01T23:41Z 27K followers, 6273 engagements

"PhishingAlert: Threat actors are abusing #Microsoft Teams notifications to deliver callback #phishing. Victims are invited to groups where team names contain the #scam content such as fake invoices auto-renewal notices or #PayPal payment claims and urges users to call a fake support number if the charge was not authorized. Because these messages come from the official Microsoft Teams sender address (no-reply@teams.mail.microsoft) they may bypass user suspicion and email filters. #CyberSecurity #Cybersec #Microsoft365 #MailMarshal #Trustwave #Levelblue #Spiderlabs #IOC #Scams Scam numbers: 1"
X Link 2025-12-04T22:22Z 27K followers, 2170 engagements

"#BECAlert We detected a large-scale Business Email Compromise (BEC) campaign sent using SendGrid targeting company accounting departments globally. This attack impersonates the company's executive and an accountant from a coaching firm with the latter requesting payment for a bogus overdue executive coaching invoice. IoCs: ipeccoach.info novus-worldwide.ws novusworldwide.org novus-global.us xiroemail.com executives-foxmails.com #BEC #Scam #MailMarshal"
X Link 2025-12-05T19:05Z 27K followers, 1724 engagements

@SpiderLabs
/creator/twitter::SpiderLabs