
In early September of this year, a notorious cybercrime collective, formed through the convergence of the hacking groups Scattered Spider, Shiny Hunters, and Lapsus$, made a bold announcement. They proclaimed that they had achieved their main goal: extorting a substantial ransom. As a result, they stated their intention to retire from cybercrime, signaling an end to their illicit operations. However, it seems the end of one chapter might have only paved the way for the birth of another, darker narrative.
Enter the Trinity of Chaos—a newly emerged hacking group that has quickly garnered attention with its bold and unsettling claims. For the past three days, the group has been making waves in the cybercriminal underworld by announcing the launch of a new data leak website. This site, which can only be accessed through the privacy-focused TOR network, will serve as a platform for the group to release sensitive data stolen from its victims. True to their word, they have already begun publishing detailed information about over 35 companies previously targeted by other cybercrime groups.
Security analysts have begun speculating that the Trinity of Chaos may have shifted its modus operandi. Instead of launching new cyberattacks on fresh targets, they seem to be focusing on exposing the data of previous victims—victims already compromised by other hacking groups. This strategy could represent a shift in priorities for the group, which is no longer engaging in direct hacking but instead capitalizing on the data already stolen by others. In essence, Trinity of Chaos is exploiting the work of prior cybercriminals, packaging it as a new threat to further intimidate and extort victims.
A particularly disturbing aspect of this shift is the possibility that this group is not just collecting data from prior attacks, but may be actively involved in blackmailing those affected. There are growing concerns that Trinity of Chaos might be threatening these victims with the public release of sensitive data unless they comply with certain demands—likely financial in nature. If true, this could signal a new wave of cyber-extortion tactics, where groups with access to vast amounts of stolen information attempt to monetize it by threatening the public exposure of valuable data.
In the midst of this, one of the biggest names in the tech and business world, Salesforce, has recently been caught in the crossfire. Reports suggest that the Salesforce instance breach could be one of the largest in recent history, with over a billion files—spanning various types of sensitive business data—allegedly accessed and stolen. Although Salesforce has attempted to downplay the severity of these claims, they are actively investigating the breach with the help of cybersecurity experts. This large-scale data theft, if confirmed, would be a major blow to Salesforce’s security posture and raise serious concerns about the vulnerability of cloud-based service providers in general.
Adding to the uncertainty surrounding Trinity of Chaos is the anonymity of its members. While very little is known about the group’s formation, analysts believe it may be the result of an alliance formed by former members of Scattered Spider, Shiny Hunters, and Lapsus$. Speculation suggests that the group might be an underground collective formed by these seasoned hackers, who have now joined forces to create a more sophisticated cybercriminal operation. The group’s tactics seem to align with those of its predecessors, but with an added layer of complexity: leveraging stolen data as leverage against victims in exchange for financial gain.
The group has also issued a chilling warning about potential future cyberattacks. According to their threats, Trinity of Chaos intends to expand its scope of operations, focusing on ransomware attacks that will target key industries around the world, including automotive, finance, insurance, technology, telecom, and internet service providers (ISPs). This expanded focus on global industries suggests that the group is preparing for a large-scale campaign designed to cripple critical infrastructure and further its financial objectives.
In an even more troubling development, Trinity of Chaos has provided a contact email, urging businesses that have been affected by prior breaches to communicate with them regarding their stolen data. This may indicate that the group is not only extorting the companies for ransom, but also offering a “negotiation platform” where victims can discuss the terms of data retention or release. The email communication adds another layer of complexity to the threat landscape, indicating that the group is operating with a level of sophistication and professionalism that mirrors that of legitimate criminal organizations.
The group’s list of targeted victims reads like a who’s who of global corporations, showcasing the scale and breadth of their operations. Some of the major companies allegedly impacted by previous data breaches include:
Toyota
FedEx
Disney / Hulu
Republic Services
UPS
Aeromexico
Home Depot
Marriott
Vietnam Airlines
Walgreens
Stellantis
McDonald’s
KFC
ASICS
GAP
HMH
Fujifilm
Canvas
Albertsons
Engie Resources
Instacart
Petco
Kering
Puma
Cartier
Adidas
TripleA
Qantas Airways
CarMax
Saks Fifth Avenue
Air France
Google AdSense
Cisco
Pandora
TransUnion
Chanel
IKEA
These companies have all been given a 10-day deadline to either pay the ransom or face the consequences: the potential sale or public exposure of their stolen data. The group’s clear ultimatum has sparked panic in the cybersecurity community, with organizations scrambling to protect themselves from further threats.
While it remains to be seen how the cybersecurity landscape will evolve in response to the rise of Trinity of Chaos, one thing is clear: the threat of cybercrime is becoming increasingly complex and insidious. With a growing number of high-profile data breaches, new forms of ransomware attacks, and the rise of powerful cybercrime syndicates, businesses worldwide must remain vigilant and prepared for the ever-evolving landscape of cyber threats.
Join our LinkedIn group Information Security Community!














