Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Scattered Spider Returns Despite Exit

September 17, 2025
Reading Time: 3 mins read
in Alerts
DHS Data Hub Leaked Sensitive Intel

A new wave of cyberattacks targeting the financial sector has been tied to the notorious hacking group known as Scattered Spider, raising serious doubts about the group’s recent claims that they were ceasing all operations. According to the threat intelligence firm ReliaQuest, evidence suggests that the group has shifted its focus to financial services. This is supported by an increase in “lookalike” domains created to mimic legitimate businesses within the industry, as well as a recently identified breach of a U.S. banking organization. This activity directly contradicts the group’s public statements about disbanding.

ReliaQuest’s investigation into the recent attack revealed a sophisticated approach. The hackers first gained access by using social engineering to trick an executive into resetting their account password through Azure Active Directory Self-Service Password Management. Once inside, they were able to access sensitive documents related to IT and security. The attackers then moved laterally through the company’s Citrix and VPN environments and compromised VMware ESXi infrastructure to dump credentials and further infiltrate the network, demonstrating a deep understanding of corporate IT systems.

To escalate their privileges within the network, the attackers reset a Veeam service account password and assigned it global administrator permissions in Azure. They also relocated virtual machines to evade detection. The group’s ultimate goal appears to be data theft, as there are also signs that Scattered Spider attempted to exfiltrate data from various repositories, including Snowflake and Amazon Web Services (AWS). This aligns with their reputation for financially motivated cybercrime and shows their focus on high-value targets.

The recent activity suggests the group’s announcement was a smokescreen to distance themselves from increasing law enforcement scrutiny. Scattered Spider is a loose-knit collective that is part of a larger online entity called The Com. They have a strong overlap with other cybercrime groups, including ShinyHunters and LAPSUS$, to the point that they’ve been collectively referred to as “scattered LAPSUS$ hunters.” This collaboration has also been linked to extortion efforts after data theft, with ShinyHunters reportedly extorting victims after another group, UNC6040, initially compromised their systems.

This incident serves as a crucial reminder for organizations not to become complacent. Much like ransomware groups, cybercriminals rarely truly “retire.” They often regroup or rebrand under a different name to avoid pressure from law enforcement and continue their criminal activities. The claim that Scattered Spider is retiring should be viewed with a high degree of skepticism. This is likely a strategic move rather than a genuine disbanding.

Reference:

  • Scattered Spider Launches New Financial Attacks Despite Claims of Retirement
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecuritySeptember 2025
ADVERTISEMENT

Related Posts

CISA Highlights Ongoing Spyware Campaign

Formatters Leak Thousands Of Secrets

November 25, 2025
CISA Highlights Ongoing Spyware Campaign

Second Wave Hits Thousands Of Repos

November 25, 2025
CISA Highlights Ongoing Spyware Campaign

CISA Highlights Ongoing Spyware Campaign

November 25, 2025
ShadowPad Exploits WSUS Flaw For Access

Windows 11 24H2 Explorer And Start Crash

November 24, 2025
ShadowPad Exploits WSUS Flaw For Access

Matrix Push C2 Uses Browser Alerts To Phish

November 24, 2025
ShadowPad Exploits WSUS Flaw For Access

ShadowPad Exploits WSUS Flaw For Access

November 24, 2025

Latest Alerts

Formatters Leak Thousands Of Secrets

Second Wave Hits Thousands Of Repos

CISA Highlights Ongoing Spyware Campaign

Windows 11 24H2 Explorer And Start Crash

Matrix Push C2 Uses Browser Alerts To Phish

ShadowPad Exploits WSUS Flaw For Access

Subscribe to our newsletter

    Latest Incidents

    Canon Subsidiary Hit By Oracle Hack

    Harvard Reports Significant Data Breach

    Dartmouth Confirms Major Data Breach

    Delta Dental Virginia Breach Hits 146000

    Iberia Alerts Customers To Data Breach

    Cox Confirms Oracle Hack As Victims Named

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial