Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      From Data To Decisions: UX Strategies For Real-Time Dashboards

      September 13, 2025

      Honeycomb launches AI observability suite for developers

      September 13, 2025

      Low-Code vs No-Code Platforms for Node.js: What CTOs Must Know Before Investing

      September 12, 2025

      ServiceNow unveils Zurich AI platform

      September 12, 2025

      Building personal apps with open source and AI

      September 12, 2025

      What Can We Actually Do With corner-shape?

      September 12, 2025

      Craft, Clarity, and Care: The Story and Work of Mengchu Yao

      September 12, 2025

      Distribution Release: Q4OS 6.1

      September 12, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Learning from PHP Log to File Example

      September 13, 2025
      Recent

      Learning from PHP Log to File Example

      September 13, 2025

      Online EMI Calculator using PHP – Calculate Loan EMI, Interest, and Amortization Schedule

      September 13, 2025

      Package efficiency and dependency hygiene

      September 13, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Dmitry — The Deep Magic

      September 13, 2025
      Recent

      Dmitry — The Deep Magic

      September 13, 2025

      Right way to record and share our Terminal sessions

      September 13, 2025

      Windows 11 Powers Up WSL: How GPU Acceleration & Kernel Upgrades Change the Game

      September 13, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»FBI, CISA Warn About Scattered Spider Cyberattacks

    FBI, CISA Warn About Scattered Spider Cyberattacks

    July 29, 2025

    FBI CISA warn about Scattered Spider cyberattacks

    The FBI and CISA issued updated guidance today on the Scattered Spider threat group, including information on recent attack techniques such as encrypting VMware ESXi servers with DragonForce ransomware. 

    The advisory, issued in cooperation with security and law enforcement agencies from Canada, Australia and the UK, recommended a number of steps to protect against Scattered Spider cyberattacks, including three urgent actions: 

    • Maintain isolated, offline backups of data that are tested regularly. 
    • Implement phishing-resistant multifactor authentication (MFA). 
    • Implement application controls to manage and control software execution. 

    Scattered Spider Attack Techniques

    Scattered Spider, which has been behind recent attack campaigns targeting the insurance, retail and other sectors, has been known for some aggressive attack techniques. 

    These have included posing as company IT or helpdesk staff using phone calls or SMS messages to steal credentials from employees, directing employees to run remote access tools that enable initial access, and convincing employees to share their one-time passwords (OTPs) for multi-factor authentication. 

    Most recently, Scattered Spider actors have posed as employees to convince IT or helpdesk staff “to provide sensitive information, reset the employee’s password, and transfer the employee’s MFA to a device they control on separate devices.” 

    Scattered Spider, which is also known as UNC3944, Scatter Swine, Oktapus, Octo Tempest, Storm-0875, and Muddled Libra, has also sent repeated MFA notification prompts to try to get employees to accept the prompt, an attack technique known as MFA fatigue. 

    The threat actors have also been able to convince cellular carriers to transfer control of a user’s phone number to a SIM card in their possession to gain control over the phone and MFA prompts. 

    The FBI has observed Scattered Spider threat actors using as many as a dozen legitimate remote access tunneling tools after gaining access to networks, the most recent being AnyDesk and Teleport.sh. 

    Once persistence has been established on a network, actions have included enumerating Active Directory (AD), performing discovery and exfiltration of code repositories, code-signing certificates, and source code. The threat actors have also activated Amazon Web Services (AWS) Systems Manager Inventory to discover targets for lateral movement and moving to both preexisting and threat actor-created Amazon Elastic Compute Cloud (EC2) instances. 

    More recent activities have included searching for an organization’s Snowflake access to exfiltrate large volumes of data quickly, “often running thousands of queries immediately,” and deploying DragonForce ransomware onto targeted networks to encrypt VMware ESXi servers. 

    Protecting Against Scattered Spider Attacks

    The advisory recommended extensive controls for protecting against Scattered Spider attacks, including: 

    • Application controls for managing, monitoring and controlling execution of software, including allowlisting remote access programs and preventing installation and execution of portable versions of unauthorized remote access and other software. 
    • Monitoring for remote access software loaded only in memory. 
    • Restricting authorized remote access solutions so they can run only from within the network over approved access solutions, such as virtual private networks (VPNs) or virtual desktop interfaces (VDIs). 
    • Blocking inbound and outbound connections on common remote access software ports and protocols at the network perimeter. 
    • Implementing FIDO/WebAuthn authentication or Public Key Infrastructure (PKI)-based MFA. 
    • Enforce account lockouts after a specified number of attempts. 

    The advisory also referenced May guidance from the UK’s National Cyber Security Centre after Scattered Spider-linked retail incidents, which included: 

    • Monitoring for unauthorized account misuse, such as risky logins within Microsoft Entra ID Protection. 
    • Monitoring Domain Admin, Enterprise Admin, Cloud Admin accounts to ensure that access is legitimate. 
    • Reviewing helpdesk password reset processes, including how the helpdesk authenticates employee credentials before resetting passwords, “especially those with escalated privileges.” 
    • Monitoring logins from atypical sources such as VPN services in residential ranges. 

     

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleAdvanced Swift Concurrency [SUBSCRIBER]
    Next Article Telecom Giant Orange Responding to Cyberattack on ‘Information Systems’

    Related Posts

    Artificial Intelligence

    Scaling Up Reinforcement Learning for Traffic Smoothing: A 100-AV Highway Deployment

    September 13, 2025
    Defending against Prompt Injection with Structured Queries (StruQ) and Preference Optimization (SecAlign)
    Artificial Intelligence

    Defending against Prompt Injection with Structured Queries (StruQ) and Preference Optimization (SecAlign)

    September 13, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    CVE-2025-40626 – AbanteCart Reflected Cross-Site Scripting (XSS)

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-1278 – GitLab IP Access Bypass Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Get a lifetime of cloud storage for up to 70% off — no subscription required

    News & Updates

    Interactive Video Projection Mapping with Three.js

    News & Updates

    Highlights

    CVE-2025-6805 – Marvell QConvergeConsole Directory Traversal Vulnerability

    July 7, 2025

    CVE ID : CVE-2025-6805

    Published : July 7, 2025, 3:15 p.m. | 2 hours, 59 minutes ago

    Description : Marvell QConvergeConsole deleteEventLogFile Directory Traversal Arbitrary File Deletion Vulnerability. This vulnerability allows remote attackers to delete arbitrary files on affected installations of Marvell QConvergeConsole. Authentication is not required to exploit this vulnerability.

    The specific flaw exists within the implementation of the deleteEventLogFile method. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to delete files in the context of SYSTEM. Was ZDI-CAN-24925.

    Severity: 8.2 | HIGH

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Hiding elements that require JavaScript without JavaScript

    April 30, 2025

    How Salesforce’s 5-level framework for AI agents finally cuts through the hype

    April 10, 2025

    Porn sexy video

    May 30, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.