- Scattered Spider Attacks | Mimecast
The Mimecast Threat Research team has been monitoring several related phishing campaign clusters that began in February and continuing into May 2025 These campaigns impersonate legitimate email service providers (ESPs), primarily SendGrid, to deliver fraudulent notifications to end users
- Scattered Spider: Rapid7 Insights, Observations, and Recommendations
Scattered Spider is a cybercrime group known for targeting enterprises via social engineering Learn their TTPs, defenses, and more in our latest blog
- SCATTERED SPIDER Hackers Attacking IT Support Teams Bypass Multi . . .
A sophisticated cybercriminal group known as SCATTERED SPIDER has emerged as one of the most dangerous threats facing organizations today, demonstrating an alarming ability to bypass multi-factor authentication through cunning social engineering tactics targeting IT support teams
- Scattered Spider - CISA
After exfiltrating and or encrypting data, Scattered Spider threat actors communicate with victims via TOR, Tox, email, or encrypted applications
- ️Unmasking the Scattered Spider Threat Actor - Medium
What are some notable high-profile attacks attributed to Scattered Spider? Scattered Spider is associated with high-profile cyberattacks on corporations such as Twilio, Caesars, and MGM
- Scattered Spider BlackCat Ransomware: Mitigation Guidance
Scattered Spider (aka UNC3944, Roasted 0ktapus, Scatter Swine) is a prolific financially-motivated cybercriminal group specializing in the use of social engineering tactics to obtain credentials to steal sensitive data for extortion
- Defending Against UNC3944: Cybercrime Hardening Guidance from the . . .
UNC3944, which overlaps with public reporting on Scattered Spider, is a financially-motivated threat actor characterized by its persistent use of social engineering and brazen
- Scattered Spider: A sophisticated threat actor that can reverse . . . - SISA
Scattered Spider, a financially motivated threat actor, is infamous for gaining initial access using a variety of social engineering tactics, which include calling employees and impersonating IT staff, using Telegram and SMS messages that redirect to phishing sites, and employing MFA fatigue
|