CISA and FBI Shared Tactics, Techniques, and Procedures of Scattered Spider Hacker Group


The Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI) have released an updated joint cybersecurity advisory detailing the sophisticated tactics employed by the Scattered Spider cybercriminal group, also known as UNC3944, Oktapus, and Storm-0875.

This threat actor has significantly evolved since its initial identification, now targeting large companies and their contracted information technology help desks with increasingly sophisticated social engineering techniques and ransomware deployment capabilities.

Scattered Spider represents a particularly dangerous evolution in cybercrime, combining traditional social engineering with advanced technical capabilities to breach high-value targets across commercial facilities and critical infrastructure sectors.

Google News

The group’s operations extend beyond simple data theft, encompassing comprehensive data extortion schemes that leverage both stolen information and ransomware encryption to maximize financial impact on victims.

CISA analysts identified that Scattered Spider has recently expanded its arsenal to include DragonForce ransomware alongside traditional data exfiltration techniques, marking a significant escalation in the group’s threat profile.

The threat actors demonstrate remarkable adaptability, frequently modifying their tactics, techniques, and procedures to evade detection while maintaining persistent access to compromised networks.

The group’s initial access methodology relies heavily on multilayered social engineering campaigns targeting both employees and IT support personnel.

Rather than deploying broad phishing campaigns, Scattered Spider conducts extensive reconnaissance using business-to-business websites, social media platforms, and open-source intelligence gathering to identify high-value targets within organizations.

Advanced Social Engineering and Persistence Mechanisms

Scattered Spider’s most distinctive characteristic lies in its sophisticated social engineering approach, which CISA researchers noted has evolved to include what they term “push bombing” attacks alongside traditional subscriber identity module (SIM) swap techniques.

The threat actors meticulously gather personally identifiable information from various sources, including commercial intelligence tools and database leaks, to craft convincing impersonation scenarios.

The group’s persistence strategy involves registering their own multifactor authentication tokens after successfully compromising user accounts, effectively establishing backdoor access that survives password resets.

This technique is complemented by the deployment of legitimate remote monitoring and management tools such as TeamViewer, Screenconnect, and newly identified tools like Teleport.sh and AnyDesk, which blend seamlessly with normal IT operations.

Their technical arsenal includes both legitimate tools repurposed for malicious activities and custom malware variants.

TacticTechnique TitleTechnique IDUse
ReconnaissanceGather Victim Identity InformationT1589Gather usernames, passwords, PII of targets
Phishing for InformationT1598Phishing to gain credentials and network access
Purchase Technical DataT1597.002Buy credentials from illicit marketplaces
Search Victim-Owned WebsitesT1594Collect employee info (roles, contacts)
Spearphishing VoiceT1598.004Calls to elicit sensitive information
Social Media ReconnaissanceT1593.001Gather info from social platforms about staff
Resource DevelopmentAcquire Infrastructure: DomainsT1583.001Create phishing/smishing domains
Create Social Media AccountsT1585.001Fake profiles to support fake identities
Initial AccessPhishing (Email)T1566Broad phishing to install RATs
SmishingT1660SMS-based phishing to deliver malware
Spearphishing VoiceT1566.004Voice calls to reset credentials/MFA
Trusted RelationshipT1199Exploit contracted IT service relationships
Valid Accounts: Domain AccountsT1078.002Use valid accounts for access
ExecutionServerless ExecutionT1648Use ETL tools for cloud data collection
User ExecutionT1204Trick users into running remote tools
PersistencePersistence (general)TA0003Maintain long-term access
Create AccountT1136Add new user identities in org
Modify Authentication – MFAT1556.006Modify MFA to maintain access
Valid AccountsT1078Abuse valid credentials for persistence
Privilege EscalationPrivilege Escalation (general)TA0004Escalate privileges in the network
Modify Domain TrustT1484.002Add federated identity provider with auto linking
Defense EvasionCreate Cloud InstanceT1578.002Deploy new EC2 instances to evade detection
ImpersonationT1656Impersonate IT/helpdesk for info
Credential AccessCredential Access (general)TA0006Use tools like Raccoon Stealer
Forge Web CredentialsT1606Forge MFA tokens for access
MFA Notification FloodingT1621Send repeated prompts (MFA fatigue)
Credentials in FilesT1552.001Search for stored credentials
Private KeysT1552.004Steal private keys from systems
SIM SwapT1451Gain control of MFA via SIM jacking
DiscoveryDiscovery (general)TA0007Search SharePoint, backups, AD
Browser Info DiscoveryT1217Use stealer malware to get browser history
Cloud Dashboard DiscoveryT1538Use AWS Systems Manager Inventory
File/Directory DiscoveryT1083Search files/directories for valuable info
Remote System DiscoveryT1018Identify remote systems in network
Steal Web Session CookiesT1539Use tools to grab session cookies
Lateral MovementLateral Movement (general)TA0008Move across network after access
Remote Services: CloudT1021.007Use existing cloud services for lateral movement
CollectionData from Code RepositoriesT1213.003Collect data/code from repos
SharePoint CollectionT1213.002Gather internal documents from SharePoint
Data StagedT1074Centralize data before exfiltration
Email CollectionT1114Search emails for detection signs
Cloud Storage DataT1530Search cloud storage for sensitive data
Command & ControlRemote Access SoftwareT1219Use RMM tools for access/control
ProxyT1090Use proxy networks to mask activity
ExfiltrationExfiltration (general)TA0010Steal data for extortion
Exfiltration Over Web ServiceT1567Use Snowflake for high-volume exfiltration
ImpactData Encrypted for ImpactT1486Encrypt victim data, demand ransom
Exfiltration to Cloud StorageT1567.002Exfiltrate to MEGA[.]NZ and US cloud
Financial TheftT1657Monetize access via extortion, theft

Recent investigations revealed the use of RattyRAT, a Java-based remote access trojan designed for persistent, stealth access and internal reconnaissance, alongside established information stealers like Raccoon Stealer and VIDAR Stealer.

The threat actors demonstrate exceptional operational security awareness by actively monitoring targeted organizations’ internal communications through compromised Slack, Microsoft Teams, and Exchange Online accounts.

This surveillance capability allows them to join incident response calls and proactively adapt their tactics in response to defensive measures, making traditional threat hunting approaches significantly less effective.

Integrate ANY.RUN TI Lookup with your SIEM or SOAR To Analyses Advanced Threats -> Try 50 Free Trial Searches



Source link