Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Scattered Spider Activity Drops Following Arrests, but Others Adopting Group’s Tactics

Posted on July 30, 2025July 30, 2025 By CWS

Cybersecurity companies within the US, Australia, and Canada on Tuesday up to date their joint advisory on Scattered Spider to share data on the most recent TTPs related to the financially motivated hacking group’s assaults.

Recognized to interact in knowledge encryption and exfiltration, Scattered Spider, also referred to as Muddled Libra, Scatter Swine, Starfraud, and UNC3944, induced havoc not too long ago by quickly switching focus from UK retailers to US retailers, after which the insurance coverage business, and aviation.

Latest incidents attributed to the group have revealed the usage of extra refined social engineering, and the deployment of latest malware households, such because the DragonForce ransomware, CISA, the FBI, and Australian and Canadian authorities companies famous within the up to date joint advisory.

Consistent with a current technical report from Google’s Risk Intelligence Group (GTIG), the up to date advisory underlines the hackers’ concentrating on of assist desk personnel to take over worker accounts, their use of RMM instruments, and their concentrating on of VMware ESXi servers for encryption.

Scattered Spider, the federal government companies say, was seen buying compromised credentials from hacking boards, concentrating on organizations’ Snowflake entry to steal knowledge, creating new person accounts backed by faux social media personas, exfiltrating knowledge to MEGA[.]NZ and Amazon S3, and deploying RattyRAT, together with the DragonForce ransomware.

“Entry to a company’s Snowflake permits the group to run hundreds of queries instantly and concurrently, typically deploying Dragonforce malware to encrypt goal organizations’ servers. The potential for huge quantities of stolen knowledge explains why they’ve been profitable throughout a number of industries, from insurance coverage to transportation to retail,” Swimlane’s Nick Tausek mentioned in an emailed remark.

In accordance with Google Cloud, Scattered Spider’s exercise has dropped not too long ago, however the identical assault methods have been noticed in incidents attributed to different financially motivated menace actors.

“Because the current arrests tied to the alleged Scattered Spider (UNC3944) members within the UK, Mandiant Consulting hasn’t noticed any new intrusions immediately attributable to this particular menace actor,” Mandiant Consulting CTO Charles Carmakal instructed SecurityWeek.Commercial. Scroll to proceed studying.

“We’re actively seeing different menace actors, like UNC6040, efficiently using comparable social engineering techniques as UNC3944. Whereas one group could also be briefly dormant, others gained’t relent,” Carmakal mentioned.

In a contemporary report, Google Cloud explains that financially motivated and superior menace actors have been noticed concentrating on backup methods to stop knowledge restoration, and using refined social engineering to steal credentials and tokens and to bypass MFA.

UNC2165, recognized to have used the RansomHub ransomware, UNC4393, related to the Basta ransomware, and UNC2465, which used the Darkside and Lockbit ransomware, have been seen concentrating on backup platforms, deleting backup routines, erasing knowledge, and tampering with person permissions to stop restoration.

“The size and frequency of IT and cyber-related outages is continuous to rise. These incidents can carry cascading results and restoration complexities when essential methods are impacted at scale,” Google Cloud instructed SecurityWeek.

Weak credentials and misconfigurations, Google Cloud says, stay the principle entry factors for attackers, adopted by API/UI compromises. Leaked credentials, distant code execution (RCE), and different software program vulnerabilities have been additionally used for preliminary entry.

“To counter threats like Scattered Spider, defenders should develop their view of the assault floor to incorporate each technical methods and human conduct. These actors mix social engineering with technical ability, making identity-centric safety, layered verification, and Zero Belief ideas important, even inside inside environments,” Cynet Cyops head Ronen Ahdut mentioned.

“Conventional controls like patching and segmentation stay necessary, however resilience more and more hinges on anticipating and disrupting human-driven intrusion paths. The entrance line isn’t simply code—it’s folks, processes, and the insurance policies that bind them,” Ahdut added.

Associated: Scattered Spider Concentrating on VMware vSphere Environments

Associated: Hawaiian Airways Hacked as Aviation Sector Warned of Scattered Spider Assaults

Associated: US Insurance coverage Trade Warned of Scattered Spider Assaults

Security Week News Tags:Activity, Adopting, Arrests, Drops, Groups, Scattered, Spider, Tactics

Post navigation

Previous Post: Palo Alto Networks to Acquire CyberArk for $25 Billion
Next Post: Legion Emerges From Stealth With $38 Million in Funding

Related Posts

IoT Security Firm Exein Raises $81 Million  Security Week News
In Other News: McDonald’s Hack, 1,200 Arrested in Africa, DaVita Breach Grows to 2.7M Security Week News
FBI Warns of Deepfake Messages Impersonating Senior Officials Security Week News
Empirical Security Raises $12 Million for AI-Driven Vulnerability Management Security Week News
Man Who Hacked Organizations to Advertise Security Services Pleads Guilty Security Week News
Casie Antalis Named Executive Director of CISA Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers stole millions of Users’ Personal Data from Gucci, Balenciaga, and Alexander McQueen Stores
  • Chaos Mesh Critical GraphQL Flaws Enable RCE and Full Kubernetes Cluster Takeover
  • SlopAds Fraud Ring Exploits 224 Android Apps to Drive 2.3 Billion Daily Ad Bids
  • KillSec Ransomware Attacking Healthcare Industry IT Systems
  • Security Analytics Firm Vega Emerges From Stealth With $65M in Funding 

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers stole millions of Users’ Personal Data from Gucci, Balenciaga, and Alexander McQueen Stores
  • Chaos Mesh Critical GraphQL Flaws Enable RCE and Full Kubernetes Cluster Takeover
  • SlopAds Fraud Ring Exploits 224 Android Apps to Drive 2.3 Billion Daily Ad Bids
  • KillSec Ransomware Attacking Healthcare Industry IT Systems
  • Security Analytics Firm Vega Emerges From Stealth With $65M in Funding 

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News