Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

CISA reports flaw in Adobe AEM with perfect 10.0 score – already under active attack

Discover Spotify working on ‘SongDNA’ feature to introduce you to the people behind your favorite music

Apple adds 650 megawatts of renewable energy in Europe, also deploys renewable energy in China

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Resurfacement of scattered spiders with financial sector attacks despite resignation claims
Identity

Resurfacement of scattered spiders with financial sector attacks despite resignation claims

userBy userSeptember 17, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

September 17, 2025Ravi LakshmananThreat Intelligence/Cybercrime

Cybersecurity researchers have questioned the claims of “darkness” by tying new cyberattacks targeting financial services to the infamous cybercriminal group known as scattered spiders.

Threat Intelligence Firm ReliaQuest said there have been indications that threat actors have shifted their focus to the financial sector. This is supported by an increase in appearance-like domains that are potentially linked to vertically corresponding groups in the industry, and an increase in target invasions against recently identified unnamed US banking organizations.

“The scattered spiders gained initial access by social engineering social executive accounts and resetting their passwords via Azure Active Directory self-service password management,” the company said.

Audit and subsequent

“From there, they accessed sensitive IT and security documents, moved Citrix environments and VPNs sideways, compromised the VMware ESXI infrastructure, dumped credentials, and allowed them to further penetrate the network.”

To achieve privilege escalation, the attacker reset the password for the Veeam Service account, assigned Azure Global Administrator Permissions, and relocated the virtual machine to avoid detection. There are also indications that scattered spiders have attempted to remove data from snowflakes, Amazon Web Services (AWS), and other repositories.

Exit or smoke screen?

Recent activity has undermined the group’s claims that it has halted operations alongside 14 other criminal groups, including Lapsus $. Scattered spiders are monikers assigned to loose knee hacking groups, part of a wider online entity called COM.

The group also shares high overlap with other cybercrime crews like Shinyhunters and Lapsus$, which means that the three clusters formed an inclusive entity named “scattered Lapsus$Hunters.”

One of these clusters, especially Shinyhunters, is also involved in the efforts of Fear Tor after removing sensitive data from the victim’s Salesforce instance. In these cases, the activity took place several months after the target was compromised by another financially motivated hacking group that Google owned Mandiant tracks as UNC6040.

The incident reminds us that we are not depressed by false sense of security, ReliaQuest added, urging the organization to remain vigilant about threats. As with ransomware groups, it is very possible to reorganize or rebrand under another alias in the future, so there is no retirement or anything like that.

CIS Build Kit

“The recent claim that scattered spiders are retiring should be taken with a considerable degree of skepticism,” said Karl Sigler, security research manager for SpiderLabs Threat Intelligence at TrustWave. “Apart from a true breakup, this announcement could indicate a strategic move to distance the group from increasing pressure on law enforcement.”

Sigler also noted that farewell letters should be considered a strategic hideaway and avoids ongoing efforts to cover up the activity, not to mention the complex attribution efforts that make it difficult for the group to reassess its practices, refine trade, and link future cases to the same core actors.

“It is plausible that something within the group’s operational infrastructure has been compromised. It is likely that it will at least trigger a group to become darker, at least temporarily, through the arrest of a breached system, exposed communications channel, or lower tier affiliates. It will re-emerge under a new identity.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleThe UK secures £300 billion in US investment in the Northeast AI growth zone
Next Article NYUAD AI Breakthrough offers new hope for solar wind prediction
user
  • Website

Related Posts

CISA reports flaw in Adobe AEM with perfect 10.0 score – already under active attack

October 16, 2025

Chinese threat group Jewelbug secretly infiltrated Russian IT networks for months

October 15, 2025

F5 breach exposes BIG-IP source code — state hackers behind massive intrusion

October 15, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

CISA reports flaw in Adobe AEM with perfect 10.0 score – already under active attack

Discover Spotify working on ‘SongDNA’ feature to introduce you to the people behind your favorite music

Apple adds 650 megawatts of renewable energy in Europe, also deploys renewable energy in China

Chinese threat group Jewelbug secretly infiltrated Russian IT networks for months

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Revolutionize Your Workflow: TwinH Automates Tasks Without Your Presence

FySelf’s TwinH Unlocks 6 Vertical Ecosystems: Your Smart Digital Double for Every Aspect of Life

Beyond the Algorithm: How FySelf’s TwinH and Reinforcement Learning are Reshaping Future Education

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.