Scattered Spider is a cybercriminal group that targets large companies using sophisticated social engineering techniques, malware, and ransomware such as DragonForce to exfiltrate data and encrypt systems for extortion. This advisory outlines the groupβs evolving tactics, techniques, and procedures (TTPs), and provides mitigation strategies recommended by multiple international cybersecurity organizations. #ScatteredSpider #DragonForce #DragonForceRansomware #RattyRAT #RaccoonStealer
Keypoints
- The Scattered Spider group employs complex social engineering methods including SIM swap attacks, push bombing, and impersonation of IT helpdesk staff to gain initial access.
- The group uses legitimate remote access tools and malware such as AveMaria, Raccoon Stealer, VIDAR Stealer, RattyRAT, and DragonForce ransomware for persistence, credential theft, data exfiltration, and encryption.
- Recent TTPs include targeted spearphishing, multilayered social engineering calls, and exfiltration to cloud services like MEGA.NZ and Amazon S3.
- Scattered Spider operators exploit network services for lateral movement, discovery, and maintain persistence by creating new user accounts, modifying MFA, and leveraging cloud and on-premises environments.
- The advisory recommends application allowlisting, phishing-resistant MFA such as FIDO/WebAuthn, strict remote desktop usage controls, regular patching, network segmentation, offline backups, and continuous security validation.
- The group frequently uses proxy networks and rotates machine names to evade detection and adapts its TTPs regularly to avoid security responses.
- International cybersecurity agencies including FBI, CISA, NCSC-UK, and others collaborated on this advisory with updated information as of July 29, 2025.
MITRE Techniques
- [T1589] Gather Victim Identity Information β Scattered Spider gathers usernames, passwords, and PII for targeted organizations.
- [T1598] Phishing for Information β Poses as IT/helpdesk staff via calls and SMS to obtain credentials and access.
- [T1660] Phishing (Mobile) β Uses smishing attacks targeting organizations via SMS.
- [T1566.004] Phishing: Spearphishing Voice β Conducts voice calls to convince helpdesk personnel to reset passwords or MFA tokens.
- [T1199] Trusted Relationship β Abuses trusted contracted IT helpdesk relationships to gain access.
- [T1078.002] Valid Accounts: Domain Accounts β Uses valid domain accounts for initial access and persistence.
- [T1204] User Execution β Directs employees to run remote access tools for network access.
- [TA0003] Persistence β Maintains network presence using remote monitoring and management (RMM) tools and account creation.
- [T1136] Create Account β Creates new user accounts to sustain persistence on networks.
- [T1556.006] Modify Authentication Process: Multi-Factor Authentication β Registers or modifies MFA tokens to maintain access.
- [TA0004] Privilege Escalation β Escalates privileges on compromised networks.
- [T1484.002] Domain Policy Modification: Domain Trust Modification β Adds federated identity providers to SSO environments.
- [T1578.002] Modify Cloud Compute Infrastructure: Create Cloud Instance β Creates cloud instances for lateral movement.
- [T1656] Impersonation β Poses as IT staff to manipulate employees and gain credentials.
- [TA0006] Credential Access β Utilizes tools such as Raccoon Stealer to obtain credentials.
- [T1606] Forge Web Credentials β Forges MFA tokens to bypass authentication.
- [T1621] Multi-Factor Authentication Request Generation β Uses repeated MFA prompts to cause users to approve requests.
- [T1552.001] Unsecured Credentials: Credentials in Files β Searches for stored credentials on systems.
- [T1552.004] Unsecured Credentials: Private Keys β Searches for stored private keys on systems.
- [T1451] SIM Swap β Conducts SIM swap attacks to intercept MFA codes and credentials.
- [TA0007] Discovery β Searches for SharePoint, credential documentation, VMware, backups, and enumerates Active Directory.
- [T1217] Browser Information Discovery β Obtains browser history via stealer malware.
- [T1538] Cloud Service Dashboard β Uses AWS Systems Manager Inventory for target discovery.
- [T1083] File and Directory Discovery β Searches files and directories for sensitive data.
- [T1018] Remote System Discovery β Locates remote infrastructure components.
- [T1539] Steal Web Session Cookie β Collects browser cookies for session hijacking.
- [TA0008] Lateral Movement β Moves laterally across networks and cloud instances.
- [T1021.007] Remote Services: Cloud Services β Uses pre-existing cloud services for lateral movement.
- [T1213.003] Data from Information Repositories: Code Repositories β Extracts code repository data.
- [T1213.002] Data from Information Repositories: SharePoint β Exfiltrates SharePoint data.
- [T1074] Data Staged β Stages collected data centrally prior to exfiltration.
- [T1114] Email Collection β Searches emails for detection of intrusion or security response information.
- [T1530] Data from Cloud Storage β Exfiltrates data stored in cloud environments.
- [T1219] Remote Access Software β Uses commercial remote access tools for command and control.
- [T1090] Proxy β Utilizes proxy networks to mask malicious traffic sources.
- [TA0010] Exfiltration β Exfiltrates stolen data to cloud services and other sites.
- [T1567] Exfiltration Over Web Service β Uses platforms like Snowflake for data exfiltration.
- [T1486] Data Encrypted for Impact β Encrypts systems and demands ransom, including VMware ESXi servers.
- [T1567.002] Exfiltration Over Web Service: Exfiltration to Cloud Storage β Exfiltrates data to U.S.-based data centers and MEGA.NZ.
- [T1657] Financial Theft β Monetizes network access through data theft and extortion-enabled ransomware.
Indicators of Compromise
- [Domains] Used in phishing and smishing campaigns β targetsname-sso[.]com, targetsname-helpdesk[.]com, oktalogin-targetcompany[.]com
- [Malware] Used for credential theft and remote access β AveMaria (WarZone), Raccoon Stealer, VIDAR Stealer, RattyRAT, DragonForce Ransomware
- [Legitimate Tools] Repurposed for malicious remote access β Fleetdeck.io, Ngrok, TeamViewer, AnyDesk, Teleport.sh
- [Cloud Services] Used for exfiltration β MEGA[.]NZ, Amazon S3, Snowflake Data Cloud
Read more: https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-320a