darxai: engineering, AI, and cybersecurity darxai
Back to blog
SaaS and SSO attacks without malware: closing the door EDR cannot see

Cybersecurity 4 min read

SaaS and SSO attacks without malware: closing the door EDR cannot see

Technical guide for SMBs facing actors like Cordial Spider and Snarky Spider that operate inside Salesforce, Workday, and Snowflake using vishing and SSO abuse. Per-vendor hardening and useful monitoring.

In this article +

In recent weeks, two extortion clusters identified as Cordial Spider and Snarky Spider have operated exclusively on SaaS environments such as Salesforce, Workday, and Snowflake. The technique uses no malware, does not touch the endpoint, and does not trigger classic EDR/XDR alerts. It combines targeted vishing, social engineering of the help desk, and IdP abuse to obtain legitimate access.

For an SMB with three or more critical SaaS apps behind SSO, endpoint-only detection leaves a large gap. Defense relies on IdP hardening, activity reviews inside each SaaS, and help desk processes that do not reset MFA on a phone call.

Short answer

Effective control sits in four layers: strong IdP identity, hardened configuration inside each SaaS, logging and review of relevant events, and a help desk process with strong verification. Without those four layers, a well-prepared call is enough to get in.

Why traditional defense fails

Common assumptionReality with these actors
”EDR will see it”There is no binary, process, or hash to detect
”MFA is enough”The attacker tricks the help desk into resetting it
”SSO is secure”Abuse happens inside valid SSO tokens
”We will see SaaS logs if something happens”Without alerts, nobody looks until the incident

The problem is not purely technical. It is process and configuration.

Surface map

LayerMain risk
Identity (IdP)MFA reset, persistent sessions, unmanaged devices
SaaS per vendorBroad permissions, mass export, unknown integrations
Help deskVerification based only on public employee data
VisibilityDecentralized logs without actionable alerts

Any of the four layers can be the weak link. The attacker finds the softest one.

Hardening per identity provider

ProviderConcrete controls
OktaHardware MFA (FIDO2), managed-device policies, IP restrictions for admin, weekly “system log” review
Microsoft Entra IDRisk-based Conditional Access, compliant devices, legacy auth blocked, “sign-in logs” review
Google WorkspaceMandatory 2SV with security keys for admin, “Admin alerts”, OAuth restricted to trusted apps
Auth0Adaptive MFA, origin restrictions, tenant log review

The common denominator: hardware-based or passkey MFA, short admin sessions, IP allowlists on management consoles, and periodic review of anomalous activity.

Hardening per critical SaaS

SaaSConcrete controls
SalesforceDisable mass export per profile, IP login ranges, Event Monitoring on
WorkdayRestrict “Implementer” roles, review third-party OAuth apps
SnowflakeNetwork policies per warehouse, column masking, “ACCOUNT_USAGE” reviews
Microsoft 365Audit log on, OneDrive/SharePoint exfiltration alerts, eDiscovery control
HubSpot / CRMExport restrictions, integration and API key reviews

You do not need an SSPM tool to start. You do need someone who reviews the base configuration every quarter.

Help desk process

Typical abuse happens through a call requesting an MFA reset or a phone number change. The countermeasures are simple and uncomfortable at the same time:

  1. Out-of-band verification through a different channel from the request.
  2. Direct manager approval for sensitive actions.
  3. Holding period before applying critical changes.
  4. Full record of every help desk action with reason.
  5. Specific help desk training on common vishing pretexts.
  6. Explicit policy: “if in doubt, no change is made”.

The discomfort is the price of avoiding the attack. The team needs to understand why.

Useful detection without a dedicated SOC

SignalWhere to lookFrequency
Login from new IP at unusual hourIdP logsDaily with alert
MFA reset or phone number changeHelp desk + IdPEach case, logged
Mass export in CRM or ERPSaaS logsWeekly
OAuth app or API key creationEach SaaSChange triggers review
Login without managed deviceConditional AccessDaily with alert
Configuration change in admin consoleIdP audit logEach change, logged

For a budget-constrained SMB, a shared inbox with filtered alerts and weekly review covers most of the value.

Common mistakes

  1. Confusing having SSO with having identity security.
  2. Allowing MFA resets via call without verification.
  3. Leaving third-party OAuth apps without periodic review.
  4. Not classifying who is “full admin” in each SaaS.
  5. Enabling logging and assigning nobody to review it.
  6. Treating Salesforce, Workday, or Snowflake as “the vendor’s responsibility”.

Progress indicators

IndicatorGoodBad
Hardware MFA for adminAcross every consoleSoftware only for some
Conditional AccessRisk- and device-based rules”Allow all”
Help desk verificationDocumented dual-channelCall and immediate reset
SaaS logsCentralized with alertsOn but unread
OAuth app inventoryKnown and reviewedList never consulted

When to invest more

A SaaS Security Posture Management (SSPM) tool makes sense above a certain number of critical SaaS apps or when the team cannot sustain manual reviews with quality. Before that, native vendor controls cover most of the risk.

Final criterion

Actors operating in SaaS and SSO do not look for a technical vulnerability. They look for weak processes. Effective defense combines measurable hardening, strong help desk verification, and periodic log review. For an SMB, that is achievable without hiring a SOC.

Working sources

  • Activity reports on Cordial Spider and Snarky Spider in SaaS environments.
  • Official documentation from Okta, Microsoft Entra ID, and Google Workspace for identity controls.
  • SSPM best practices applied to Salesforce, Workday, and Snowflake.
  • Technical decisions must be adapted to each company’s sector, size, and processed data.

Next step

Apply cybersecurity and compliance to your company?

We assess, harden, and monitor systems, applications, and processes to reduce risk and support compliance with ENS, NIS2, DORA, and GDPR.