Scattered Spider: Leveraging Social Engineering for Extortion - CISA Alert AA23-320A

The Blue Report 2024

Get a comprehensive analysis of over 136 million cyber attacks and understand the state of threat exposure management.

DOWNLOAD

On November 16, 2023, The Cybersecurity and Infrastructure Security Agency (CISA) released a joint advisory on a cybercriminal group called Scattered Spider [1]. Scattered Spider is known to target large organizations in telecom with data extortion and ransomware attacks. The cybercriminal group is affiliated with the infamous ransomware group BlackCat (ALPHV).

In this blog, we explained tools and TTPs used by Scattered Spider and how organizations can defend themselves against Scattered Spider attacks.

Simulate Data Extortion Attacks with a 14-Day Free Trial of the Picus Platform

Scattered Spider APT Group

Scattered Spider is a financially motivated data extortion and ransomware group that targets large organizations. The group has been known to be active since late 2022 and has several aliases, such as Muddled Libra, oktapus, Starfraud, Scatter Swine, and UNC3944. As a financially motivated threat group, Scattered Spider threat actors target large organizations in the telecommunication, entertainment, and IT industries. The latest MGM Casino and Caesars Entertainment ransomware attacks were attributed to Scattered Spider.

The group is proficient in social engineering skills and utilizes phishing, vishing, MFA bombing, and SIM-swapping techniques to gain initial access to their victims’ networks. After initial access, Scattered Spider uses Living-off-the-Land techniques and allows listed applications to conduct reconnaissance and lateral movement in the compromised network. The threat actors also evade detection using publicly available and legitimate remote access tunneling tools to exfiltrate data from the compromised network. Recently, Scattered Spider added ransomware to their extortion tactics, and they threatened their victims to release stolen data unless the ransom is paid. Scattered Spider is an affiliate of BlackCat (ALPHV) Ransomware-as-a-Service (RaaS) group, and they use their TTPs and ransomware payloads in their attacks.

Tools and Techniques Used by Scattered Spider Threat Group

Scattered Spider is known for their social engineering skills and defense evasion technique. They use these techniques to take over valid user accounts and compromise the target network without raising an alert. Depending on the target environment, adversaries quickly modify their TTPs and change the tools used in their campaigns. Tools and techniques used by Scattered Spider is as follows:

Initial Access

T1566 Phishing

Scattered Spider uses various phishing techniques to trick users into resetting passwords, disabling MFA, and installing remote access tools. Threat actors often use phone calls or SMS to impersonate legitimate users or help desk personnel in phishing attacks.

T1078 Valid Accounts

Adversaries use valid accounts to gain initial access to the target network. These accounts are obtained via phishing attacks or MFA bombing (fatigue) attacks. In MFA bombing attacks, threat actors repeatedly spam MFA prompts to cause the target user to accidentally or unknowingly allow one of the prompts. In some cases, Scattered Spider attackers threatened some users to give up their passwords and MFA tokens. Valid accounts also allow attackers to establish persistent connections to the target network.

Execution

T1648 Serverless Execution

Threat actors install and use Extract, Transform, and Load (ETL) tools to collect data from compromised cloud environments to a centralized database.

T1204 User Execution

Scattered Spider tricks users to install remote access tools or disable MFA via vishing attacks.

Persistence

T1556.006 Modify Authentication Process: Multi-Factor Authentication

After compromising a valid account, Scatter Spider attackers register their own MFA tokens to prevent their victims from taking back their accounts.

Privilege Escalation

T1484.002 Domain Policy Modification: Domain Trust Modification

Scattered Spider abuses the victim’s SSO tenant to elevate their privileges by adding a federated identity provider and activating account linking.

Defense Evasion

T1578.002 Modify Cloud Compute Infrastructure: Create Cloud Instance

Adversaries create new Amazon EC2 instances in the victim’s AWS environment for data collection and staging.

T1656 Impersonation

Scattered Spider threat actors impersonate legitimate users or IT help desk personnel to reset passwords, disable MFA, and install remote access tools.

Credential Access

T1621 Multi-Factor Authentication Request Generation

Scattered Spider uses MFA fatigue attacks to lead their victims to accidentally or unknowingly accept MFA prompts to gain access to their accounts.

T1552 Unsecured Credentials

Adversaries search for insecurely stored credentials and private keys in the compromised system. Attackers also use Mimikatz to extract credentials from the system.

Discovery

T1217 Browser Information Discovery & T1539 Steal Web Session Cookie

Scattered Spider uses Raccoon Stealer and VIDAR Stealer malware to extract login credentials, cookies, and browser history.

T1538 Cloud Service Dashboard

Adversaries use the AWS Systems Manager Inventory to discover cloud assets for lateral movement.

T1083 File and Directory Discovery

Scattered Spider enumerates its victim’s Active Directory, SharePoint sites, code repositories, code-signing certificates, and source code to discover files and directories. 

T1018 Remote System Discovery

Adversaries use the victim’s VMware vCenter infrastructure to discover remote services.

Command and Control

T1219 Remote Access Software

Scattered Spider uses publicly available and legitimate remote access tools such as Fleetdeck.io, Level.io, ngrok, Pulseway, Screenconnect, Splashtop, Tactical.RMM, and Teamviewer. These tools allow attackers to maintain persistence and exfiltrate data to adversaries-controlled C2 servers.

Exfiltration

T1567 Exfiltration Over Web Service: Exfiltration to Cloud Storage

Scattered Spider exfiltrates its victim’s data to public and private cloud storage services.

Impact

T1486 Data Encrypted for Impact

Scattered Spider is an affiliate of the BlackCat/ALPHV ransomware group and uses their ransomware payload to encrypt its victim’s files. In recent MGM Casino and Caesars Entertainment attacks, attackers were able to encrypt VMware ESXi servers.

How Picus Helps Simulate Scattered Spider Attacks?

We also strongly suggest simulating Scattered Spider attacks to test the effectiveness of your security controls against real-life cyber attacks using the Picus Complete Security Validation Platform. You can also test your defenses against hundreds of other cybercriminal groups, such as ALPHV, LAPSUS$, and Dragonfly, within minutes with a 14-day free trial of the Picus Platform.

Picus Threat Library includes the following threats for malware used by Scattered Spider Group:

Threat ID

Threat Name

Attack Module

75742

BlackCat Ransomware Campaign 2022

Windows Endpoint

54213

BlackCat Ransomware Download Threat

Network Infiltration

92332

BlackCat Ransomware Email Threat

Email Infiltration (Phishing)

37758

Raccoon Infostealer Download Threat

Network Infiltration

56873

Raccoon Infostealer Email Threat

Email Infiltration (Phishing)

65914

Raccoon V2 InfoStealer Download Threat

Network Infiltration

36249

Raccoon V2 InfoStealer Email Threat

Email Infiltration (Phishing)

97465

Vidar Infostealer Download Threat

Network Infiltration

57588

Vidar Infostealer Email Threat

Email Infiltration (Phishing)

Picus also provides actionable mitigation content. Picus Mitigation Library includes prevention signatures to address malware used by Scattered Spider and other ransomware attacks in preventive security controls. Currently, Picus Labs validated the following signatures for malware used by Scattered Spider:

Security Control

Signature ID

Signature Name

CheckPoint NGFW

0962429DB

HEUR:Trojan-Ransom.Win32.Generic.TC.647eHCzo

CheckPoint NGFW

0882B5C95

Trojan.Win32.BlackCatALPHV.TC.134fnYwT

CheckPoint NGFW

0AF5F7C96

Ransomware.Linux.BlackCat.TC.b8d9TO

CheckPoint NGFW

0AF5F7C96

Ransomware.Linux.BlackCat.TC.b8d9TOgB

CheckPoint NGFW

0D15AEC44

Ransomware.Linux.BlackCat.TC.3d12uqbo

CheckPoint NGFW

0A8007D7B

Ransomware.Win32.BlackCat.TC.c681NEmB

CheckPoint NGFW

0A8007D7B

Ransomware.Win32.BlackCat.TC.c681N

CheckPoint NGFW

08BDE47DE

Ransomware.Linux.domain.TC.7158tHvN

CheckPoint NGFW

0AD912491

Trojan.Win32.TS_RAT.Win32.Quasar.TC.e4d2mUML

CheckPoint NGFW

09FD30024

Trojan.Win32.HEUR:Trojan-Ransom.Win32.

CheckPoint NGFW

08957F91F

Trojan.Win32.HEUR:Trojan-Spy.MSIL.Stealer.gen.TC.4bf4yOqX

CheckPoint NGFW

0AE3376DF

Trojan.Win32.Raccoonstealer.TC.ta

CheckPoint NGFW

09FADC652

Trojan.Win32.HEUR:Backdoor.Win32.Tofsee.gen.TC.aff2iikw

CheckPoint NGFW

0E586AA50

Trojan.Win32.Raccoonstealer.TC.sy

CheckPoint NGFW

08FEDD997

Trojan.Win32.Trojan-PSW.Win32.Coins.acno.TC.b7d6VmaW

CheckPoint NGFW

0A4B7BE79

Trojan.Win32.Trojan-PSW.Win32.Coins.acno.TC.0b38kyUp

CheckPoint NGFW

0A4B7BE79

Trojan.Win32.Trojan-PSW.Win32.Coins.acno.TC.0b38kyUp

CheckPoint NGFW

0C98151BB

Trojan.Win32.Trojan-PSW.Win32.Coins.a

CheckPoint NGFW

0FE43476E

TS_Banker.Win32.Vidar.TC.b1ecVMvM

CheckPoint NGFW

0C7C44AF2

TS_Banker.Win32.Vidar.TC.4a0bRJyq

CheckPoint NGFW

0D3BAB249

TS_Banker.Win32.Vidar.TC.8eb6MJoU

CheckPoint NGFW

0E01528B3

Vidar.TC.dkbf

CheckPoint NGFW

0A3053DE0

TS_Banker.Win32.Vidar.TC.fd66GjKs

CheckPoint NGFW

0A8AE7FAE

TS_Banker.Win32.Vidar.TC.b103IQMv

CheckPoint NGFW

092D7EFF9

TS_Banker.Win32.Vidar.TC.2613AMvm

CheckPoint NGFW

0ECF01A38

Vidar.TC.dkbr

CheckPoint NGFW

0A28E35CD

TS_Banker.Win32.Vidar.TC.eb3bGDuS

CheckPoint NGFW

0CF5061A7

TS_Banker.Win32.Vidar.TC.9398fmvF

Cisco Firepower

 

W32.Auto:24499fbfd8.in03.Talos

Cisco Firepower

 

Auto.3C5120A6E8.malicious.tht.Talos

Cisco Firepower

 

W32.Auto:624b7ae8be.in03.Talos

Cisco Firepower

 

W32.Auto:012e38.in03.Talos

Cisco Firepower

 

W32.Auto:47f3c8.in03.Talos

Cisco Firepower

 

W32.Auto:048c01.in03.Talos

Cisco Firepower

 

W32.Auto:022432.in03.Talos

Cisco Firepower

 

W32.66162E69CA-100.SBX.TG

Cisco Firepower

 

W32.D71F81EDF8-95.SBX.TG

Cisco Firepower

 

W32.42C6950CA5-95.SBX.TG

Cisco Firepower

 

W32.Auto:2679fa8e9f.in05.Talos

Cisco Firepower

 

Possible_HPGen:GenKryptik-tpd

Cisco Firepower

 

W32.DAD5FCEAB0-95.SBX.TG

Cisco Firepower

 

Win.Dropper.Generic::1201

Cisco Firepower

 

W32.9EC586B079-95.SBX.TG

Forcepoint NGFW

 

File_Malware-Blocked

Fortigate AV

58991

W32/PossibleThreat

Fortigate AV

7909784

W32/Filecoder.A!tr.ransom

Fortigate AV

62183

PossibleThreat

Fortigate AV

10023911

W32/Kryptik.EAT!tr

Fortigate AV

2193347

W32/Agent.OOQ!tr

Fortigate AV

8027021

W32/GenKryptik.DDSI!tr.pws

Fortigate AV

1104576

W32/Agent.OFF!tr.pws

McAfee

0x4840c900

MALWARE: Malicious File Detected by GTI

Palo Alto

459475016

trojan/Win32 EXE.filecoder.anj

Palo Alto

577823691

trojan/Win32.artemis.anww

Palo Alto

409075248

trojan/Win32 EXE.kryptik.badtb

Palo Alto

409078323

trojan/Win32 EXE.kryptik.badrt

Palo Alto

453434723

trojan/Win32 EXE.kryptik.badrs

Palo Alto

491283974

trojan/Win32.coins.amb

Palo Alto

219847215

Trojan-Psw/Win32.tepfer.cjaq

Palo Alto

219847299

GenericRXGT/Win32.pr.ed

Palo Alto

218480952

GenericRXGQ/Win32.su.eo

Palo Alto

219847212

GenericRXGQ/Win32.su.ej

Palo Alto

219847308

GenericRXGQ/Win32.su.eq

Palo Alto

219847125

GenericRXGQ/Win32.su.ei

Palo Alto

219846795

GenericRXGQ/Win32.su.ek

Palo Alto

219847296

GenericRXGQ/Win32.su.ep

Palo Alto

219846783

GenericRXGQ/Win32.su.eh

Palo Alto

219847305

GenericRXGQ/Win32.su.er

Snort

1.49570.1

MALWARE-OTHER Windows Management Instrument

 

Start simulating emerging threats today and get actionable mitigation insights with a  14-day free trialof Picus The Complete Security Validation Platform.

References

[1] “Scattered Spider,” Cybersecurity and Infrastructure Security Agency CISA. Available: https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-320a. [Accessed: Nov. 17, 2023]