{"id":14428,"date":"2025-07-11T07:28:33","date_gmt":"2025-07-11T07:28:33","guid":{"rendered":"https:\/\/newestek.com\/?p=14428"},"modified":"2025-07-11T07:28:33","modified_gmt":"2025-07-11T07:28:33","slug":"anatomy-of-a-scattered-spider-attack-a-growing-ransomware-threat-evolves","status":"publish","type":"post","link":"https:\/\/newestek.com\/?p=14428","title":{"rendered":"Anatomy of a Scattered Spider attack: A growing ransomware threat evolves"},"content":{"rendered":"<div>\n<div id=\"remove_no_follow\">\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<section class=\"wp-block-bigbite-multi-title\">\n<div class=\"container\"><\/div>\n<\/section>\n<p><a href=\"https:\/\/www.csoonline.com\/article\/3994369\/how-cisos-can-defend-against-scattered-spider-ransomware-attacks.html\">Scattered Spider<\/a> is increasingly making headlines of late, evolving its techniques and broadening the scope of its criminal activities against a wider array of enterprises.<\/p>\n<p>Active since at least May 2022, the financially motivated cybercriminal group initially targeted telecommunications and entertainment companies, including MGM Resorts and Caesars Entertainment, through SIM-swapping and ransomware operations.<\/p>\n<p><strong>[ See also: <a href=\"https:\/\/www.csoonline.com\/article\/3994369\/how-cisos-can-defend-against-scattered-spider-ransomware-attacks.html\">How CISOs can defend against Scattered Spider ransomware attacks<\/a> ]<\/strong><\/p>\n<p>Over time, the group has shifted to high-value industries, most notably with attacks in May targeting major retailers such as Marks &amp; Spencer, Co-op, and Harrods, and more recently <a href=\"https:\/\/www.csoonline.com\/article\/4014787\/scattered-spider-shifts-focus-to-airlines-as-strikes-hit-hawaiian-westjet-and-now-qantas.html\">airlines \u00a0such as Hawaiian and Quantas<\/a> in assaults that caused widespread disruption to their operations and millions of dollars in damages and recovery costs.<\/p>\n<p>While the UK\u2019s National Crime Agency this week announced <a href=\"https:\/\/nationalcrimeagency.gov.uk\/news\/retail-cyber-attacks-nca-arrest-four-for-attacks-on-m-s-co-op-and-harrods\">four arrests for the attacks on Marks &amp; Spencer, Co-op, and Harrods<\/a>, law enforcement officials have given no indication that the group\u2019s threat has abated.<\/p>\n<p>Notorious for its aggressive use of social engineering, Scattered Spider is believed to be targeting a <a href=\"https:\/\/www.bankinfosecurity.com\/interviews\/scattered-spider-persists-as-major-threat-to-insurers-i-5487\">wider range of industries<\/a> with more sophisticated attacks. Understanding the group\u2019s latest tactics can help CISOs prepare to counter the threat.<\/p>\n<p>In a recent attack, the subject of a post-mortem by threat detection and response vendor ReliaQuest, Scattered Spider used advanced social engineering to compromise the organization\u2019s Entra ID, Active Directory, and virtual infrastructure. The attack chain demonstrates the Scattered Spider\u2019s ability to blend patient planning with rapid execution, as well as increased knowledge of cloud-based and on-premises enterprise IT systems.<\/p>\n<p>Scattered Spider took care to minimize its chance of detection and, even after the attack was discovered, aggressively attempted to maintain control of compromised systems.<\/p>\n<h2 class=\"wp-block-heading\" id=\"scattered-spiders-evolving-plan-of-attack\">Scattered Spider\u2019s evolving plan of attack<\/h2>\n<p>Scattered Spider began its attack against the unnamed organization\u2019s public-facing Oracle Cloud authentication portal, targeting its chief financial officer.<\/p>\n<p>Using personal details, such as the CFO\u2019s date of birth and the last four digits of their Social Security number obtained from public sources and previous breaches, Scattered Spider impersonated the CFO in a call to the company\u2019s help desk, tricking help desk staff into resetting the CFO\u2019s registered device and credentials.<\/p>\n<p>The ruse was expedited by a combination of the priority help desk staff typically attach to requests from executive leadership and the fact that IT organizations routinely over-privilege C-suite accounts, allowing them access to a greater range of IT systems. It also demonstrates an evolution in Scattered Spider\u2019s tactics, ReliaQuest notes. Whereas previously the group deployed credential harvesters via typosquatted domains to obtain valid credentials, its latest attacks see the group already equipped with valid credentials from the outset.<\/p>\n<p>Given access to the CFO\u2019s account, Scattered Spider mapped Entra ID (Azure AD) privileged accounts and groups before locating sensitive files on SharePoint and gaining an understanding of the targeted organization\u2019s on-premises IT systems and cloud environment.<\/p>\n<p>Cybercriminals hacked into the target\u2019s Horizon Virtual Desktop Infrastructure (VDI) using the CFO\u2019s credentials before using social engineering to compromise two further accounts and pivoting toward the on-premises environment. In parallel, the group breached the organization\u2019s VPN infrastructure to maintain remote access to compromised systems.<\/p>\n<p>Scattered Spider subsequently reactivated a decommissioned virtual machine and began creating a parallel virtual environment under its control before shutting down a virtualized production domain controller, and extracted the NTDS.dit database file (Active Directory credentials) \u2014 all the while evading traditional endpoint detection.<\/p>\n<p>The cybercriminals extracted more than 1,400 secrets by taking advantage of compromised admin accounts tied to the target\u2019s CyberArk password vault and likely an automated script. Scattered Spider granted administrator roles to compromised user accounts before using tools, including ngrok, to maintain access on compromised virtual machines.<\/p>\n<p>\u201cOn several occasions, the group assigned additional roles to compromised users, including the Exchange Administrator role,\u201d according to ReliaQuest. \u201cThis role was used to monitor the inboxes of high-profile employees, enabling the attackers to stay ahead of the security team and maintain their control over the environment.\u201d<\/p>\n<h2 class=\"wp-block-heading\" id=\"ensuing-battle-over-it-resources\">Ensuing battle over IT resources<\/h2>\n<p>Despite the stealth of the attack incident response defenders at the compromised company detected the attack and began to fight back, setting up a tug-of-war to establish control over the organization\u2019s IT resources. In response, Scattered Spider abandoned attempts at covert infiltration and began an aggressive attempt to disrupt business operations and hinder response and recovery.<\/p>\n<p>For example, the group began deleting Azure Firewall policy rule collection groups. The attack was ultimately thwarted, at least in its main aims. Although some sensitive data was extracted, the likely plan to deploy ransomware never came to fruition.<\/p>\n<p>This battle over privileged roles escalated until Microsoft had to intervene to restore control over the tenant.<\/p>\n<p>\u201cScattered Spider\u2019s latest campaign demonstrates its ability to adapt and evolve, blending human-centric exploitation with technical sophistication to compromise identity systems and virtual environments,\u201d ReliaQuest concludes.<\/p>\n<h2 class=\"wp-block-heading\" id=\"faster-further-stronger\">Faster, further, stronger<\/h2>\n<p>Christiaan Beek, senior director, threat analytics at Rapid7, told CSO that Scattered Spider\u2019s tradecraft has evolved over recent months as it has developed better knowledge of cloud-based systems and carried out more aggressive, multi-pronged attacks.<\/p>\n<p>Beek noted the following additions to Scattered Spider\u2019s arsenal:<\/p>\n<ul class=\"wp-block-list\">\n<li><strong>Cloud intrusion techniques<\/strong>: \u201cThe group has demonstrated a deep understanding of cloud environments using AWS Systems Manager Session Manager, EC2 Serial Console, and IAM [identity and access management] role enumeration to pivot and persist within cloud infrastructure \u2014 techniques typically seen in advanced threat actors,\u201d according to Beek.<\/li>\n<li><strong>New persistence methods<\/strong>: \u201cThey\u2019ve begun abusing legitimate infrastructure tools like Teleport for long-term access, setting up encrypted outbound connections that evade traditional detection mechanisms \u2014 a shift from their earlier reliance on commercial RMM [remote monitoring and management] tools alone,\u201d Beek said.<\/li>\n<li><strong>Faster, multilayered attacks<\/strong>: Scattered Spider\u2019s operations have become more aggressive and compressed. \u201cWithin hours of initial compromise \u2014 often via social engineering \u2014 they escalate privileges, move laterally, establish persistence, and begin reconnaissance across both cloud and on-prem environments,\u201d Beek explained. \u201cThis speed and fluidity represent a significant escalation in operational maturity.\u201d<\/li>\n<\/ul>\n<p>While Scattered Spider has expanded its targets to new industries \u2014 first retail and then technology, finance, and now aviation \u2014 over recent months, its fundamental modus operandi remain similar, ReliaQuest researchers have found.<\/p>\n<p>\u201cThis shift shows the group is willing to adapt its targets to maximize financial returns,\u201d a ReliaQuest spokesperson told CSO. \u201cThat said, its tactics haven\u2019t really changed \u2014 Scattered Spider still leans on sophisticated social engineering to target help-desk employees and gain access to high-value accounts.\u201d<\/p>\n<h2 class=\"wp-block-heading\" id=\"countermeasures\">Countermeasures<\/h2>\n<p>In a blog post last week, security tools vendor <a href=\"https:\/\/www.rapid7.com\/blog\/post\/scattered-spider-rapid7-insights-observations-and-recommendations\/\">Rapid7 detailed Scattered Spider\u2019s latest tactics, techniques, and procedures (TTPs)<\/a>, alongside recommendations for defensive best practices.<\/p>\n<p>\u201c[The] group\u2019s techniques, while sophisticated in execution, often exploit lapses in basic security practices \u2014 such as over-reliance on help desk identity proofing, or unmonitored use of admin tools,\u201d Rapid7 researchers wrote. \u201cStrengthening those areas, along with user education and modern authentication controls, provides a strong defence against Scattered Spider\u2019s blend of social engineering and technical prowess.\u201d<\/p>\n<p>\u201cPhishing-resistant MFA is key to block attacks at the outset, whilst vigilant monitoring in the cloud and on endpoints plays a part in catching unusual behavior before it escalates. Beyond technology, it\u2019s crucial to maintain disciplined identity practices,\u201d Rapid7\u2019s Beek told CSO. \u201cThis means limiting standing privileges and enforcing approvals for sensitive actions, alongside regularly reviewing access rights.\u201d<\/p>\n<p>Defending effectively against Scattered Spider involves tackling both human and technical vulnerabilities, ReliaQuest researchers noted.<\/p>\n<p>\u201cTo defend against these attacks, strengthen help-desk verification procedures to prevent unauthorised access, harden virtualised infrastructure to detect suspicious activity, and regularly test and train employees against social engineering tactics,\u201d ReliaQuest advised. \u201cThese measures protect identity systems and workflows and disrupt the group\u2019s ability to manipulate trust and evade defences.\u201d<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Scattered Spider is increasingly making headlines of late, evolving its techniques and broadening the scope of its criminal activities against a wider array of enterprises. Active since at least May 2022, the financially motivated cybercriminal group initially targeted telecommunications and entertainment companies, including MGM Resorts and Caesars Entertainment, through SIM-swapping and ransomware operations. [ See also: How CISOs can defend against Scattered Spider ransomware attacks&#8230; <\/p>\n<p class=\"more\"><a class=\"more-link\" href=\"https:\/\/newestek.com\/?p=14428\">Read More<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-14428","post","type-post","status-publish","format-standard","hentry","category-uncategorized","is-cat-link-borders-light is-cat-link-rounded"],"_links":{"self":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/14428","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=14428"}],"version-history":[{"count":0,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/14428\/revisions"}],"wp:attachment":[{"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=14428"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=14428"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=14428"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}