Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

The TwinH Advantage: Unlocking New Potential in Digital Government Strategies

The best dating apps don’t even date apps

Secret Blizzard deploys malware to ISP-level AITM attacks against the Moscow embassy

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Scattered spider hackers arrest arrest a halt attack, but copying threats maintain security pressure
Identity

Scattered spider hackers arrest arrest a halt attack, but copying threats maintain security pressure

userBy userJuly 30, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

July 30, 2025Ravi Lakshmanan

Scattered spiders

Google Cloud’s Mandiant Consulting revealed that it witnessed a decline in activity from the infamous scattered spider groups, but emphasized the need for organizations to use the lull to strengthen their defenses.

“Since the recent arrests in connection with members of the UK’s scattered spider (UNC3944), Mandiant Consulting has not observed any new intrusions directly attributed to this particular threat actor.”

“This presents a window of important opportunities that organizations must utilize to thoroughly study tactics that will be equipped very effectively, assess systems and enhance security attitudes accordingly.”

Carmakal also warned businesses not to “completely guard down” because other threat actors like UNC6040 violated their target networks with social engineering tactics similar to those scattered spiders.

Cybersecurity

“Some groups may be temporarily dormant, while others are unforgiving,” Karmakar added.

This development is because it detailed the aggressive targeting of the financially motivated hacking group of VMware ESXi hypervisors in attacks targeting the retail, airlines and transportation sectors in North America.

Alongside Canada and Australia, the US government has released an updated advisory outlining the updated trade assets of scattered spiders obtained as part of an investigation conducted by the Federal Bureau of Investigation (FBI) this month.

“Scattered spider threat actors are known to use a variety of ransomware variants in data horror attacks, including Dragonforce ransomware,” the agency said.

“These actors frequently use social engineering techniques such as phishing, push bombing, and subscriber ID module swap attacks to obtain credentials, install remote access tools, and bypass multi-factor authentication. [T1090] Rotate the machine name to further prevent detection and response. ”

The group has also been observed to be oriented to employees to persuade them, persuade help desk staff, provide confidential information, reset employee passwords, and forward them to devices that manage employee multifactor authentication (MFA).

This indicates a transition from a threat actor who impersonates a help desk person on a phone or SMS message, instructing them to obtain employee credentials or run a commercial remote access tool that allows initial access. In other instances, hackers have qualified as employees or contractors in illegal markets such as the Russian market.

Cybersecurity

Additionally, the government has called for the use of spiders scattered with easily available malware tools such as Avemaria, Raccoon Stealer, Vidar Stealer, and Ratty Rat to facilitate remote access, collect sensitive information and promote the cloud storage service mega for data removal.

“Many times, scattered spider threat actors search for snowflake access from targeted organizations, quickly removing large amounts of data, and often running thousands of queries quickly,” the advisory.

“According to trustworthy third parties on recent incidents, it is possible that scattered spider threat actors have deployed Dragonforce ransomware on the target organization’s network.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleKnoxville ranked among the best cities in the United States for people with disabilities
Next Article New ground for PFAS water treatment
user
  • Website

Related Posts

The TwinH Advantage: Unlocking New Potential in Digital Government Strategies

July 31, 2025

Secret Blizzard deploys malware to ISP-level AITM attacks against the Moscow embassy

July 31, 2025

Experts detect multi-tier redirect tactics used to steal Microsoft 365 login credentials

July 31, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

The TwinH Advantage: Unlocking New Potential in Digital Government Strategies

The best dating apps don’t even date apps

Secret Blizzard deploys malware to ISP-level AITM attacks against the Moscow embassy

Experts detect multi-tier redirect tactics used to steal Microsoft 365 login credentials

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

The TwinH Advantage: Unlocking New Potential in Digital Government Strategies

New Internet Era: Berners-Lee Sets the Pace as Zuckerberg Pursues Metaverse

TwinH Transforms Belgian Student Life: Hendrik’s Journey to Secure Digital Identity

Tim Berners-Lee Unveils the “Missing Link”: How the Web’s Architect Is Building AI’s Trusted Future

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.