Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      The Ultimate Guide to Node.js Development Pricing for Enterprises

      July 29, 2025

      Stack Overflow: Developers’ trust in AI outputs is worsening year over year

      July 29, 2025

      Web Components: Working With Shadow DOM

      July 28, 2025

      Google’s new Opal tool allows users to create mini AI apps with no coding required

      July 28, 2025

      5 preinstalled apps you should delete from your Samsung phone immediately

      July 30, 2025

      Ubuntu Linux lagging? Try my 10 go-to tricks to speed it up

      July 30, 2025

      How I survived a week with this $130 smartwatch instead of my Garmin and Galaxy Ultra

      July 30, 2025

      YouTube is using AI to verify your age now – and if it’s wrong, that’s on you to fix

      July 30, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Time-Controlled Data Processing with Laravel LazyCollection Methods

      July 30, 2025
      Recent

      Time-Controlled Data Processing with Laravel LazyCollection Methods

      July 30, 2025

      Create Apple Wallet Passes in Laravel

      July 30, 2025

      The Laravel Idea Plugin is Now FREE for PhpStorm Users

      July 30, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      New data shows Xbox is utterly dominating PlayStation’s storefront — accounting for 60% of the Q2 top 10 game sales spots

      July 30, 2025
      Recent

      New data shows Xbox is utterly dominating PlayStation’s storefront — accounting for 60% of the Q2 top 10 game sales spots

      July 30, 2025

      Opera throws Microsoft to Brazil’s watchdogs for promoting Edge as your default browser — “Microsoft thwarts‬‭ browser‬‭ competition‬‭‬‭ at‬‭ every‬‭ turn”

      July 30, 2025

      Activision once again draws the ire of players for new Diablo Immortal marketing that appears to have been made with generative AI

      July 30, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»FBI, CISA Warn About Scattered Spider Cyberattacks

    FBI, CISA Warn About Scattered Spider Cyberattacks

    July 29, 2025

    FBI CISA warn about Scattered Spider cyberattacks

    The FBI and CISA issued updated guidance today on the Scattered Spider threat group, including information on recent attack techniques such as encrypting VMware ESXi servers with DragonForce ransomware. 

    The advisory, issued in cooperation with security and law enforcement agencies from Canada, Australia and the UK, recommended a number of steps to protect against Scattered Spider cyberattacks, including three urgent actions: 

    • Maintain isolated, offline backups of data that are tested regularly. 
    • Implement phishing-resistant multifactor authentication (MFA). 
    • Implement application controls to manage and control software execution. 

    Scattered Spider Attack Techniques

    Scattered Spider, which has been behind recent attack campaigns targeting the insurance, retail and other sectors, has been known for some aggressive attack techniques. 

    These have included posing as company IT or helpdesk staff using phone calls or SMS messages to steal credentials from employees, directing employees to run remote access tools that enable initial access, and convincing employees to share their one-time passwords (OTPs) for multi-factor authentication. 

    Most recently, Scattered Spider actors have posed as employees to convince IT or helpdesk staff “to provide sensitive information, reset the employee’s password, and transfer the employee’s MFA to a device they control on separate devices.” 

    Scattered Spider, which is also known as UNC3944, Scatter Swine, Oktapus, Octo Tempest, Storm-0875, and Muddled Libra, has also sent repeated MFA notification prompts to try to get employees to accept the prompt, an attack technique known as MFA fatigue. 

    The threat actors have also been able to convince cellular carriers to transfer control of a user’s phone number to a SIM card in their possession to gain control over the phone and MFA prompts. 

    The FBI has observed Scattered Spider threat actors using as many as a dozen legitimate remote access tunneling tools after gaining access to networks, the most recent being AnyDesk and Teleport.sh. 

    Once persistence has been established on a network, actions have included enumerating Active Directory (AD), performing discovery and exfiltration of code repositories, code-signing certificates, and source code. The threat actors have also activated Amazon Web Services (AWS) Systems Manager Inventory to discover targets for lateral movement and moving to both preexisting and threat actor-created Amazon Elastic Compute Cloud (EC2) instances. 

    More recent activities have included searching for an organization’s Snowflake access to exfiltrate large volumes of data quickly, “often running thousands of queries immediately,” and deploying DragonForce ransomware onto targeted networks to encrypt VMware ESXi servers. 

    Protecting Against Scattered Spider Attacks

    The advisory recommended extensive controls for protecting against Scattered Spider attacks, including: 

    • Application controls for managing, monitoring and controlling execution of software, including allowlisting remote access programs and preventing installation and execution of portable versions of unauthorized remote access and other software. 
    • Monitoring for remote access software loaded only in memory. 
    • Restricting authorized remote access solutions so they can run only from within the network over approved access solutions, such as virtual private networks (VPNs) or virtual desktop interfaces (VDIs). 
    • Blocking inbound and outbound connections on common remote access software ports and protocols at the network perimeter. 
    • Implementing FIDO/WebAuthn authentication or Public Key Infrastructure (PKI)-based MFA. 
    • Enforce account lockouts after a specified number of attempts. 

    The advisory also referenced May guidance from the UK’s National Cyber Security Centre after Scattered Spider-linked retail incidents, which included: 

    • Monitoring for unauthorized account misuse, such as risky logins within Microsoft Entra ID Protection. 
    • Monitoring Domain Admin, Enterprise Admin, Cloud Admin accounts to ensure that access is legitimate. 
    • Reviewing helpdesk password reset processes, including how the helpdesk authenticates employee credentials before resetting passwords, “especially those with escalated privileges.” 
    • Monitoring logins from atypical sources such as VPN services in residential ranges. 

     

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleAdvanced Swift Concurrency [SUBSCRIBER]
    Next Article Telecom Giant Orange Responding to Cyberattack on ‘Information Systems’

    Related Posts

    Development

    Time-Controlled Data Processing with Laravel LazyCollection Methods

    July 30, 2025
    Development

    Create Apple Wallet Passes in Laravel

    July 30, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    CVE-2025-4089 – Mozilla Firefox/Thunderbird Command Injection Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    DOGE BIG BALLS Campaign Blurs Lines Between Exploitation, Recon, and Reputation Damage

    Development

    The Comprehensive Guide to Website Testing: Ensuring Quality, Performance, and SEO Success

    Development

    “Deus Ex” just turned 25 years old and it’s still the best PC game of all time — you only need $2 to play it on practically anything

    News & Updates

    Highlights

    News & Updates

    Xbox Game Pass gets Abiotic Factor, Grounded 2, a Soulslike RPG, and more — here’s what is coming through the rest of July

    July 15, 2025

    More titles are headed to Xbox Game Pass in July 2025, including Abiotic Factor, Grounded…

    NativePHP Hit $100K — And We’re Just Getting Started 🚀

    May 8, 2025

    12 Best Free and Open Source Food and Drink Software

    May 8, 2025

    CVE-2025-4580 – WordPress File Provider CSRF Vulnerability

    June 4, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.