CISA and FBI Shared Tactics, Techniques, and Procedures of Scattered Spider Hacker Group

CISA and FBI Shared Tactics, Techniques, and Procedures of Scattered Spider Hacker Group

The Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI) have released an updated joint cybersecurity advisory detailing the sophisticated tactics employed by the Scattered Spider cybercriminal group, also known as UNC3944, Oktapus, and Storm-0875.

This threat actor has significantly evolved since its initial identification, now targeting large companies and their contracted information technology help desks with increasingly sophisticated social engineering techniques and ransomware deployment capabilities.

Scattered Spider represents a particularly dangerous evolution in cybercrime, combining traditional social engineering with advanced technical capabilities to breach high-value targets across commercial facilities and critical infrastructure sectors.

Google News

The group’s operations extend beyond simple data theft, encompassing comprehensive data extortion schemes that leverage both stolen information and ransomware encryption to maximize financial impact on victims.

CISA analysts identified that Scattered Spider has recently expanded its arsenal to include DragonForce ransomware alongside traditional data exfiltration techniques, marking a significant escalation in the group’s threat profile.

The threat actors demonstrate remarkable adaptability, frequently modifying their tactics, techniques, and procedures to evade detection while maintaining persistent access to compromised networks.

The group’s initial access methodology relies heavily on multilayered social engineering campaigns targeting both employees and IT support personnel.

Rather than deploying broad phishing campaigns, Scattered Spider conducts extensive reconnaissance using business-to-business websites, social media platforms, and open-source intelligence gathering to identify high-value targets within organizations.

Advanced Social Engineering and Persistence Mechanisms

Scattered Spider’s most distinctive characteristic lies in its sophisticated social engineering approach, which CISA researchers noted has evolved to include what they term “push bombing” attacks alongside traditional subscriber identity module (SIM) swap techniques.

The threat actors meticulously gather personally identifiable information from various sources, including commercial intelligence tools and database leaks, to craft convincing impersonation scenarios.

The group’s persistence strategy involves registering their own multifactor authentication tokens after successfully compromising user accounts, effectively establishing backdoor access that survives password resets.

This technique is complemented by the deployment of legitimate remote monitoring and management tools such as TeamViewer, Screenconnect, and newly identified tools like Teleport.sh and AnyDesk, which blend seamlessly with normal IT operations.

Their technical arsenal includes both legitimate tools repurposed for malicious activities and custom malware variants.

Tactic Technique Title Technique ID Use
Reconnaissance Gather Victim Identity Information T1589 Gather usernames, passwords, PII of targets
Phishing for Information T1598 Phishing to gain credentials and network access
Purchase Technical Data T1597.002 Buy credentials from illicit marketplaces
Search Victim-Owned Websites T1594 Collect employee info (roles, contacts)
Spearphishing Voice T1598.004 Calls to elicit sensitive information
Social Media Reconnaissance T1593.001 Gather info from social platforms about staff
Resource Development Acquire Infrastructure: Domains T1583.001 Create phishing/smishing domains
Create Social Media Accounts T1585.001 Fake profiles to support fake identities
Initial Access Phishing (Email) T1566 Broad phishing to install RATs
Smishing T1660 SMS-based phishing to deliver malware
Spearphishing Voice T1566.004 Voice calls to reset credentials/MFA
Trusted Relationship T1199 Exploit contracted IT service relationships
Valid Accounts: Domain Accounts T1078.002 Use valid accounts for access
Execution Serverless Execution T1648 Use ETL tools for cloud data collection
User Execution T1204 Trick users into running remote tools
Persistence Persistence (general) TA0003 Maintain long-term access
Create Account T1136 Add new user identities in org
Modify Authentication – MFA T1556.006 Modify MFA to maintain access
Valid Accounts T1078 Abuse valid credentials for persistence
Privilege Escalation Privilege Escalation (general) TA0004 Escalate privileges in the network
Modify Domain Trust T1484.002 Add federated identity provider with auto linking
Defense Evasion Create Cloud Instance T1578.002 Deploy new EC2 instances to evade detection
Impersonation T1656 Impersonate IT/helpdesk for info
Credential Access Credential Access (general) TA0006 Use tools like Raccoon Stealer
Forge Web Credentials T1606 Forge MFA tokens for access
MFA Notification Flooding T1621 Send repeated prompts (MFA fatigue)
Credentials in Files T1552.001 Search for stored credentials
Private Keys T1552.004 Steal private keys from systems
SIM Swap T1451 Gain control of MFA via SIM jacking
Discovery Discovery (general) TA0007 Search SharePoint, backups, AD
Browser Info Discovery T1217 Use stealer malware to get browser history
Cloud Dashboard Discovery T1538 Use AWS Systems Manager Inventory
File/Directory Discovery T1083 Search files/directories for valuable info
Remote System Discovery T1018 Identify remote systems in network
Steal Web Session Cookies T1539 Use tools to grab session cookies
Lateral Movement Lateral Movement (general) TA0008 Move across network after access
Remote Services: Cloud T1021.007 Use existing cloud services for lateral movement
Collection Data from Code Repositories T1213.003 Collect data/code from repos
SharePoint Collection T1213.002 Gather internal documents from SharePoint
Data Staged T1074 Centralize data before exfiltration
Email Collection T1114 Search emails for detection signs
Cloud Storage Data T1530 Search cloud storage for sensitive data
Command & Control Remote Access Software T1219 Use RMM tools for access/control
Proxy T1090 Use proxy networks to mask activity
Exfiltration Exfiltration (general) TA0010 Steal data for extortion
Exfiltration Over Web Service T1567 Use Snowflake for high-volume exfiltration
Impact Data Encrypted for Impact T1486 Encrypt victim data, demand ransom
Exfiltration to Cloud Storage T1567.002 Exfiltrate to MEGA[.]NZ and US cloud
Financial Theft T1657 Monetize access via extortion, theft

Recent investigations revealed the use of RattyRAT, a Java-based remote access trojan designed for persistent, stealth access and internal reconnaissance, alongside established information stealers like Raccoon Stealer and VIDAR Stealer.

The threat actors demonstrate exceptional operational security awareness by actively monitoring targeted organizations’ internal communications through compromised Slack, Microsoft Teams, and Exchange Online accounts.

This surveillance capability allows them to join incident response calls and proactively adapt their tactics in response to defensive measures, making traditional threat hunting approaches significantly less effective.

Integrate ANY.RUN TI Lookup with your SIEM or SOAR To Analyses Advanced Threats -> Try 50 Free Trial Searches


Source link