Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Scattered Spider Hacker Arrests Halt Attacks, But Copycat Threats Sustain Security Pressure

Posted on July 30, 2025July 30, 2025 By CWS

Jul 30, 2025Ravie Lakshmanan
Google Cloud’s Mandiant Consulting has revealed that it has witnessed a drop in exercise from the infamous Scattered Spider group, however emphasised the necessity for organizations to make the most of the lull to shore up their defenses.
“Because the current arrests tied to the alleged Scattered Spider (UNC3944) members within the U.Okay., Mandiant Consulting hasn’t noticed any new intrusions immediately attributable to this particular menace actor,” Charles Carmakal, CTO of Mandiant Consulting at Google Cloud, advised The Hacker Information in a press release.
“This presents a vital window of alternative that organizations should capitalize on to completely examine the ways UNC3944 wielded so successfully, assess their methods, and reinforce their safety posture accordingly.”
Carmakal additionally warned companies to not “let their guard down totally,” as different menace actors like UNC6040 are using related social engineering ways as Scattered Spider to breach goal networks.

“Whereas one group could also be quickly dormant, others will not relent,” Carmakal added.
The event comes because the tech large detailed the financially motivated hacking group’s aggressive concentrating on of VMware ESXi hypervisors in assaults concentrating on retail, airline, and transportation sectors in North America.
The U.S. authorities, alongside Canada and Australia, has additionally launched an up to date advisory outlining Scattered Spider’s up to date tradecraft obtained as a part of investigations performed by the Federal Bureau of Investigation (FBI) as just lately as this month.
“Scattered Spider menace actors have been recognized to make use of varied ransomware variants in information extortion assaults, most just lately together with DragonForce ransomware,” the companies stated.
“These actors incessantly use social engineering methods reminiscent of phishing, push bombing, and subscriber identification module swap assaults to acquire credentials, set up distant entry instruments, and bypass multi-factor authentication. Scattered Spider menace actors constantly use proxy networks [T1090] and rotate machine names to additional hamper detection and response.”
The group has additionally been noticed posing as staff to influence IT and/or assist desk workers to offer delicate info, reset the worker’s password, and switch the worker’s multi-factor authentication (MFA) to a tool below their management.
This marks a shift from the menace actors impersonating assist desk personnel in telephone calls or SMS messages to acquire worker credentials or instruct them to run industrial distant entry instruments enabling preliminary entry. In different situations, the hackers have acquired worker or contractor credentials on illicit marketplaces reminiscent of Russia Market.

Moreover, the governments known as out Scattered Spider’s use of available malware instruments like Ave Maria (aka Warzone RAT), Raccoon Stealer, Vidar Stealer, and Ratty RAT to facilitate distant entry and collect delicate info, in addition to cloud storage service Mega for information exfiltration.
“In lots of situations, Scattered Spider menace actors seek for a focused group’s Snowflake entry to exfiltrate massive volumes of information in a short while, usually working hundreds of queries instantly,” per the advisory.
“In response to trusted third-parties, the place newer incidents are involved, Scattered Spider menace actors might have deployed DragonForce ransomware onto focused organizations’ networks – thereby encrypting VMware Elastic Sky X built-in (ESXi) servers.”

The Hacker News Tags:Arrests, Attacks, Copycat, Hacker, Halt, Pressure, Scattered, Security, Spider, Sustain, Threats

Post navigation

Previous Post: Lionishackers Threat Actors Exfiltrating and Selling Corporate Databases on Dark Web
Next Post: Microsoft Details Defence Techniques Against Indirect Prompt Injection Attacks

Related Posts

Adobe Releases Patch Fixing 254 Vulnerabilities, Closing High-Severity Security Gaps The Hacker News
Microsoft Fixes 78 Flaws, 5 Zero-Days Exploited; CVSS 10 Bug Impacts Azure DevOps Server The Hacker News
PUBLOAD and Pubshell Malware Used in Mustang Panda’s Tibet-Specific Attack The Hacker News
A Look Inside Pillar’s AI Security Platform The Hacker News
Deepfakes. Fake Recruiters. Cloned CFOs — Learn How to Stop AI-Driven Attacks in Real Time The Hacker News
Former Black Basta Members Use Microsoft Teams and Python Scripts in 2025 Attacks The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Noma Security Raises $100 Million for AI Security Platform
  • 5 Best IT Infrastructure Modernisation Services In 2025
  • 17K+ SharePoint Servers Exposed to Internet
  • Chinese Researchers Suggest Lasers and Sabotage to Counter Musk’s Starlink Satellites
  • Reach Security Raises $10 Million for Exposure Management Solution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Noma Security Raises $100 Million for AI Security Platform
  • 5 Best IT Infrastructure Modernisation Services In 2025
  • 17K+ SharePoint Servers Exposed to Internet
  • Chinese Researchers Suggest Lasers and Sabotage to Counter Musk’s Starlink Satellites
  • Reach Security Raises $10 Million for Exposure Management Solution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News