Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

New RFP template for AI usage control and AI governance

Inside the EU’s military innovation push

Calgon Carbon expands drinking water carbon reactivation capacity

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Scattered spider hackers arrest arrest a halt attack, but copying threats maintain security pressure
Identity

Scattered spider hackers arrest arrest a halt attack, but copying threats maintain security pressure

userBy userJuly 30, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

July 30, 2025Ravi Lakshmanan

Scattered spiders

Google Cloud’s Mandiant Consulting revealed that it witnessed a decline in activity from the infamous scattered spider groups, but emphasized the need for organizations to use the lull to strengthen their defenses.

“Since the recent arrests in connection with members of the UK’s scattered spider (UNC3944), Mandiant Consulting has not observed any new intrusions directly attributed to this particular threat actor.”

“This presents a window of important opportunities that organizations must utilize to thoroughly study tactics that will be equipped very effectively, assess systems and enhance security attitudes accordingly.”

Carmakal also warned businesses not to “completely guard down” because other threat actors like UNC6040 violated their target networks with social engineering tactics similar to those scattered spiders.

Cybersecurity

“Some groups may be temporarily dormant, while others are unforgiving,” Karmakar added.

This development is because it detailed the aggressive targeting of the financially motivated hacking group of VMware ESXi hypervisors in attacks targeting the retail, airlines and transportation sectors in North America.

Alongside Canada and Australia, the US government has released an updated advisory outlining the updated trade assets of scattered spiders obtained as part of an investigation conducted by the Federal Bureau of Investigation (FBI) this month.

“Scattered spider threat actors are known to use a variety of ransomware variants in data horror attacks, including Dragonforce ransomware,” the agency said.

“These actors frequently use social engineering techniques such as phishing, push bombing, and subscriber ID module swap attacks to obtain credentials, install remote access tools, and bypass multi-factor authentication. [T1090] Rotate the machine name to further prevent detection and response. ”

The group has also been observed to be oriented to employees to persuade them, persuade help desk staff, provide confidential information, reset employee passwords, and forward them to devices that manage employee multifactor authentication (MFA).

This indicates a transition from a threat actor who impersonates a help desk person on a phone or SMS message, instructing them to obtain employee credentials or run a commercial remote access tool that allows initial access. In other instances, hackers have qualified as employees or contractors in illegal markets such as the Russian market.

Cybersecurity

Additionally, the government has called for the use of spiders scattered with easily available malware tools such as Avemaria, Raccoon Stealer, Vidar Stealer, and Ratty Rat to facilitate remote access, collect sensitive information and promote the cloud storage service mega for data removal.

“Many times, scattered spider threat actors search for snowflake access from targeted organizations, quickly removing large amounts of data, and often running thousands of queries quickly,” the advisory.

“According to trustworthy third parties on recent incidents, it is possible that scattered spider threat actors have deployed Dragonforce ransomware on the target organization’s network.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleKnoxville ranked among the best cities in the United States for people with disabilities
Next Article New ground for PFAS water treatment
user
  • Website

Related Posts

New RFP template for AI usage control and AI governance

March 4, 2026

Fake Laravel packages on Packagist deploy RAT on Windows, macOS, and Linux

March 4, 2026

APT41-linked Silver Dragon uses Cobalt Strike and Google Drive C2 to target governments

March 4, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

New RFP template for AI usage control and AI governance

Inside the EU’s military innovation push

Calgon Carbon expands drinking water carbon reactivation capacity

Fake Laravel packages on Packagist deploy RAT on Windows, macOS, and Linux

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.