• Home
    • What is
    • Computer security
      • Windows security
      • Mac security
      • Linux security
    • Mobile security
      • Android security
      • iOS Security
    • Data security
    • SCCM
    • Reviews
      • Case studies
    • Advertise
    • Contact
      • Privacy Policy
  • Subscribe now

    Loading
  • Home
  • What is
  • Computer security
    • Windows security
    • Mac security
    • Linux security
  • Mobile security
    • Android security
    • iOS Security
  • Data security
  • SCCM
  • Reviews
    • Case studies
  • Advertise
  • Contact
    • Privacy Policy
Home » Breaking Computer security Cyber Security data security Device security Latest Cybersecurity News Windows security

Scattered Spider: FBI and CISA Issue Warning on Elusive Cyber Threat

John Greenwood Posted On November 15, 2023
0



Scattered Spider

The Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) have jointly warned regarding the elusive threat entity Scattered Spider.

Collaborating with the ALPHV/BlackCat Russian ransomware operation, this loosely connected hacking collective has recently gained attention for its sophisticated tactics.

What is Scattered Spider?

Scattered Spider, also recognized by aliases such as 0ktapus, Starfraud, UNC3944, Scatter Swine, Octo Tempest, and Muddled Libra, is proficient in social engineering and employs techniques like phishing, multi-factor authentication (MFA) bombing, and SIM swapping to infiltrate large organizations.

Comprising English-speaking members, some as young as 16, with diverse skill sets, the group frequents hacker forums and Telegram channels. Certain members are suspected to be part of the “Comm,” a loosely connected community involved in both cyber incidents and violent acts, garnering widespread media attention.

Contrary to the perception of a cohesive gang, Scattered Spider operates as a network of individuals, with different actors participating in each attack. This decentralized structure poses challenges in tracking their activities. Despite the FBI having knowledge of at least 12 members, none have been indicted or arrested.

Scattered Spider’s notorious activities

Scattered Spider’s activities have been documented since the previous summer, with cybersecurity company Group-IB reporting attacks aimed at stealing Okta identity credentials and 2FA codes.

In December 2022, CrowdStrike characterized the group as a financially motivated entity targeting telecommunications companies. Their tactics involve high-level social engineering, defense reversal, and the use of various software tools.

In January 2023, Crowdstrike uncovered Scattered Spider’s use of “Bring Your Own Vulnerable Driver” (BYOVD) methods to evade detection from endpoint detection and response (EDR) security products.

Recent high-profile attacks against MGM Casino and Caesars Entertainment have been attributed to Scattered Spider, utilizing the BlackCat/ALPHV locker to encrypt systems.

Microsoft, referring to them as Octo Tempest, labelled Scattered Spider as one of the most dangerous financial criminal groups, known for resorting to violent threats to achieve their goals.

Scattered Spider
Octo Tempest’s physical harm threats to obtain account logins
Source: Microsoft

Scattered Spider Tactics

The FBI and CISA advisory underscores Scattered Spider’s potent initial access tactics, involving posing as IT or help-desk staff to trick company employees into providing credentials or network access. The group utilizes various methods, including phone calls, SMS phishing, email phishing, MFA fatigue attacks, and SIM swapping.

After gaining a foothold, Scattered Spider employs a range of publicly available software tools for reconnaissance and lateral movement. Legitimate tools like Fleetdeck.io, Level.io, Mimikatz, Ngrok, Pulseway, Screenconnect, Splashtop, and Tactical.

RMM, Tailscale, and Teamviewer are utilized maliciously. Additionally, the group conducts phishing attacks to install malware such as WarZone RAT, Raccoon Stealer, and Vidar Stealer to steal login credentials and other valuable data.

Recent observations indicate a new tactic involving data exfiltration and file encryption using the ALPHV/BlackCat ransomware, followed by negotiation attempts through messaging apps or email.

Mitigations

The FBI and CISA recommend specific mitigations to counter the threats posed by Scattered Spider.

Key recommendations include using application controls with allowlisting, monitoring remote access tools, implementing phishing-resistant MFA, securing and limiting Remote Desktop Protocol (RDP) usage, maintaining offline backups, adhering to strong password practices, regularly updating systems and software, implementing network segmentation, and enhancing email security.

Organizations are advised to test and validate their security controls against MITRE ATT&CK techniques described in the advisory.

Share the article with your friends


Cybersecuritydata securityhacking


Author

John Greenwood

He has been working with Cybersec and Infosec market for 12+ years now. Passionate about AI, Cybersecurity, Info security, Blockchain and Machine Learning. When he is not occupied with cybersecurity, he likes to go on bike rides!

You may also like
Recast Software: Advanced Endpoint Management and Security Tools for IT Teams
November 16, 2024
Patch My PC: Streamlined Software Management for ConfigMgr and Intune
November 9, 2024
Best Microsoft Intune Alternatives: Top 5 MDMs to Consider
November 4, 2024
Leave A Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

  • Subscribe to our newsletter

    Loading
  • Windows security

    • Recast Software: Advanced Endpoint Management and Security...
      November 16, 2024
    • Patch My PC: Streamlined Software Management for ConfigMgr...
      November 9, 2024
    • Best Microsoft Intune Alternatives: Top 5 MDMs to Consider
      November 4, 2024
    • Top 11 Log Management Tools for Efficient System Management
      September 20, 2024
    • Top 5 Threat Intelligence Tools For 2024
      September 19, 2024


  • About us

    Our vision is to deliver the trending and happening cyber events to the enthusiasts.

    We believe in delivering educational and quality content for hassle-free understanding of the subject.

  • Subscribe to our newsletter

    Loading
  • Follow us

  • Advertise with us

    You can reach us via Facebook, Linkedin, or Twitter for advertising purposes.


© The Cybersecurity Times 2022. All rights reserved.
Press enter/return to begin your search