
Threatening intelligence researchers, all strategies seen with scattered spider activity are warning of hackers who dissolve many American companies in the insurance industry.
Typically, the sector-by-field focus is focused in the group of danger. First, he targeted retail outfits in the United Kingdom and then switching to the target in the same region in the United States.
John Haltquist, Chief analyst of Google Danger Information Group (GTIG), said, “Google Threat Intelligence Group now knows about many intruders in the US, which are all hallmarks of scattered spider activity. Now we are watching incidents in insurance industry.”
Hultquist has warned that because the group goes to a region at a time, “the insurance industry must be on high warnings.”
The GTIG chief researcher says that companies should pay special attention to help desk and possible social engineering efforts at call centers.
Scattered spider strategy
The name given to a fluid coalition of scattered spider danger actors is a refined social engineering attacks to bypass mature safety programs.
The group is also tracked as 0ktapus, UNC3944, scatter swine, starfraud, and muddled Libra, and is associated with violations in many high-profile organizations that bombing the preliminary access, and mixed fishing, sim-swapping, and MFA fatigue/MFA bombing.
In the post -attack stage, the group is seen falling like ransomware RansomahbKyulin, and Dragonforce.
Defense against scattered spider attacks
Protected organizations against this type of danger should begin with full visibility in the entire infrastructure, identity systems and important management services.
GTIG recommended Separating identity and using strong authentication criteria along with strict identity control for password reset and MFA registration.
Since scattered spider depends on social engineering, organizations should educate employees and internal security teams on copying efforts through various channels (SMS, phone calls, messaging platforms), which can sometimes include aggressive language to intimidate goals in compliance.
Hackers dissolved the Marx and Spencer, Co-Op and Herodes retailers in the UK this year, the country’s National Cyber Security Center (NCSC) shared suggestions for organizations to improve their cyber security defense.
In all three attacks, the danger actor used the same social engineering strategy associated with spatter spide and dragonforce ransomware in the final stage.
The recommendations of the NCSC are valid to activate two-factor or multi-factor authentication, monitor for unauthorized login, and to check access to domain administrators, enterprise admins and cloud admin accounts.
Additionally, the UK agency recommends the organization to review how the helpdesk service certifies the credentials before resetting them, especially for employees with advanced privileges.
The ability to identify login from unusual sources (such as VPN services from residential range) may also help identify a possible attack.


