Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Scattered Spider Activity Drops Following Arrests, but Others Adopting Group’s Tactics

Posted on July 30, 2025July 30, 2025 By CWS

Cybersecurity companies within the US, Australia, and Canada on Tuesday up to date their joint advisory on Scattered Spider to share data on the most recent TTPs related to the financially motivated hacking group’s assaults.

Recognized to interact in knowledge encryption and exfiltration, Scattered Spider, also referred to as Muddled Libra, Scatter Swine, Starfraud, and UNC3944, induced havoc not too long ago by quickly switching focus from UK retailers to US retailers, after which the insurance coverage business, and aviation.

Latest incidents attributed to the group have revealed the usage of extra refined social engineering, and the deployment of latest malware households, such because the DragonForce ransomware, CISA, the FBI, and Australian and Canadian authorities companies famous within the up to date joint advisory.

Consistent with a current technical report from Google’s Risk Intelligence Group (GTIG), the up to date advisory underlines the hackers’ concentrating on of assist desk personnel to take over worker accounts, their use of RMM instruments, and their concentrating on of VMware ESXi servers for encryption.

Scattered Spider, the federal government companies say, was seen buying compromised credentials from hacking boards, concentrating on organizations’ Snowflake entry to steal knowledge, creating new person accounts backed by faux social media personas, exfiltrating knowledge to MEGA[.]NZ and Amazon S3, and deploying RattyRAT, together with the DragonForce ransomware.

“Entry to a company’s Snowflake permits the group to run hundreds of queries instantly and concurrently, typically deploying Dragonforce malware to encrypt goal organizations’ servers. The potential for huge quantities of stolen knowledge explains why they’ve been profitable throughout a number of industries, from insurance coverage to transportation to retail,” Swimlane’s Nick Tausek mentioned in an emailed remark.

In accordance with Google Cloud, Scattered Spider’s exercise has dropped not too long ago, however the identical assault methods have been noticed in incidents attributed to different financially motivated menace actors.

“Because the current arrests tied to the alleged Scattered Spider (UNC3944) members within the UK, Mandiant Consulting hasn’t noticed any new intrusions immediately attributable to this particular menace actor,” Mandiant Consulting CTO Charles Carmakal instructed SecurityWeek.Commercial. Scroll to proceed studying.

“We’re actively seeing different menace actors, like UNC6040, efficiently using comparable social engineering techniques as UNC3944. Whereas one group could also be briefly dormant, others gained’t relent,” Carmakal mentioned.

In a contemporary report, Google Cloud explains that financially motivated and superior menace actors have been noticed concentrating on backup methods to stop knowledge restoration, and using refined social engineering to steal credentials and tokens and to bypass MFA.

UNC2165, recognized to have used the RansomHub ransomware, UNC4393, related to the Basta ransomware, and UNC2465, which used the Darkside and Lockbit ransomware, have been seen concentrating on backup platforms, deleting backup routines, erasing knowledge, and tampering with person permissions to stop restoration.

“The size and frequency of IT and cyber-related outages is continuous to rise. These incidents can carry cascading results and restoration complexities when essential methods are impacted at scale,” Google Cloud instructed SecurityWeek.

Weak credentials and misconfigurations, Google Cloud says, stay the principle entry factors for attackers, adopted by API/UI compromises. Leaked credentials, distant code execution (RCE), and different software program vulnerabilities have been additionally used for preliminary entry.

“To counter threats like Scattered Spider, defenders should develop their view of the assault floor to incorporate each technical methods and human conduct. These actors mix social engineering with technical ability, making identity-centric safety, layered verification, and Zero Belief ideas important, even inside inside environments,” Cynet Cyops head Ronen Ahdut mentioned.

“Conventional controls like patching and segmentation stay necessary, however resilience more and more hinges on anticipating and disrupting human-driven intrusion paths. The entrance line isn’t simply code—it’s folks, processes, and the insurance policies that bind them,” Ahdut added.

Associated: Scattered Spider Concentrating on VMware vSphere Environments

Associated: Hawaiian Airways Hacked as Aviation Sector Warned of Scattered Spider Assaults

Associated: US Insurance coverage Trade Warned of Scattered Spider Assaults

Security Week News Tags:Activity, Adopting, Arrests, Drops, Groups, Scattered, Spider, Tactics

Post navigation

Previous Post: Palo Alto Networks to Acquire CyberArk for $25 Billion
Next Post: Legion Emerges From Stealth With $38 Million in Funding

Related Posts

Asus DriverHub Vulnerabilities Expose Users to Remote Code Execution Attacks Security Week News
Telecom Giant Orange Hit by Cyberattack Security Week News
Critical Vulnerabilities Patched in Trend Micro Apex Central, Endpoint Encryption Security Week News
Cybersecurity M&A Roundup: 41 Deals Announced in June 2025 Security Week News
40,000 Security Cameras Exposed to Remote Hacking Security Week News
FBI Aware of 900 Organizations Hit by Play Ransomware Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Safely Use AI Chatbots and Assistants
  • Gen Z in the Crosshairs: Cybercriminals Shift Focus to Young, Digital-Savvy Workers
  • Cursor AI Code Editor Fixed Flaw Allowing Attackers to Run Commands via Prompt Injection
  • In Other News: Microsoft Probes ToolShell Leak, Port Cybersecurity, Raspberry Pi ATM Hack
  • Attackers Use Fake OAuth Apps with Tycoon Kit to Breach Microsoft 365 Accounts

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Safely Use AI Chatbots and Assistants
  • Gen Z in the Crosshairs: Cybercriminals Shift Focus to Young, Digital-Savvy Workers
  • Cursor AI Code Editor Fixed Flaw Allowing Attackers to Run Commands via Prompt Injection
  • In Other News: Microsoft Probes ToolShell Leak, Port Cybersecurity, Raspberry Pi ATM Hack
  • Attackers Use Fake OAuth Apps with Tycoon Kit to Breach Microsoft 365 Accounts

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News