Scattered Spider: TTPs, IOCs & Detection Tips

Who is Scattered Spider?
Scattered Spider (aka UNC3944, 0ktapus, Muddled Libra) is a financially motivated group, alleged comprised of young operators from the US and UK, specializing in social engineering, SIM‑swapping, and file extortion via ALPHV/BlackCat or DragonForce ransomware. They’ve hit major targets like Caesars, MGM, Snowflake customers, Marks & Spencer, Co‑op, Harrods, PNC, and Twilio.


1: Initial Access – Phishing, Smishing, Vishing, SIM‑swap

  • SMS phishing (smishing): direct links to credential-harvesting pages.
  • Coordinated help-desk calls: impersonation of CFO/IT to request MFA reset or remote-access installs.
  • MFA fatigue (“push bombing”) & SIM‑swap attacks for bypassing MFA.

Detection tips:

  • Alert on concurrent smishing links + helpdesk reset tickets.
  • Look for multiple declined MFA push requests followed by success.

2: Phishing Infrastructure – Evilginx Kits & Typosquats

  • At least five unique phishing kits used since 2023, including Evilginx-based frameworks .
  • Domain patterns: 81 % mimic tech services (okta, vpn, helpdesk, sso, duo, mfa) using subdomain variations (e.g., okta.company.com, vpn.c0mpany[.]com) over typosquatted TLDs.
  • Hosting infrastructure: frequent changes—but recurring ASNs include Cloudflare (AS13335), Choopa (AS20473), DigitalOcean (AS14061).
  • Registrars: NiceNIC, Hosting Concepts B.V., NameSilo, GoDaddy.

Detection tips:

  • Automate DNS alerts for new domains with target keywords and patterns.
  • Hunt outbound network requests to domains with subdomain patterns + mimicked service names.
  • Track registrations through high-risk ASNs/registrars.

3: Exploits, Drivers & RATs

  • Abuses CVE‑2015‑2291 (Intel Ethernet diagnostic driver) via malicious kernel driver (“POORTRY” + loader “STONESTOP”).
  • New Spectre RAT in 2025 for stealth persistence

Detection tips:

  • Block or alert on unusual iqvw64.sys IOCTL activity.
  • Detect driver loads under suspicious names.
  • Monitor rundll32 spawning Spectre-like payloads.

4: IAM Abuse & Cloud Persistence

  • Register unauthorized MFA devices, modify Conditional Access (Azure/Okta).
  • Use legitimate tools: AnyDesk, TeamViewer, AWS Session Manager, Teleport.


Detection tips:

  • Alert on “Add registered device” or MFA removal in Azure/Okta logs. Verify newly registered devices are legitimate.
  • Monitor remote-management software installs from non‑IT personnel

5: Lateral Movement, Credential Theft & Exfil

  • Tools: Mimikatz/secretdump, LSASS dumps, PsExec, RDP, SMB C$ shares, scheduled tasks

Detection tips:

  • Watch Sysmon ID  10 on lsass.exe read events.
  • Alert on non-IT created scheduled tasks and credential dumps.
  • Monitor large uploads to personal cloud storage.

6: Final Stage – Ransom & Double‑Extortion

  • Deploy ALPHV/BlackCat or DragonForce ransomware
  • Known victims include MGM, Caesars, Marks & Spencer, and Co‑op
  • Common exfil targets: Dropbox, MegaSync, etc.

Detection tips:

  • Alert on outbound flows to consumer cloud domains.
  • Flag new binaries like megasync.exe or backup.exe under user folders.
  • Watch for file-deletion + wallpaper or ransom note files.

IOC Summary Table

TypeExample IOCs
Domainscompany-hr.com
company-sso.com
company-helpdesk.com
ASNsCloudflare (AS13335), Choopa (AS20473), DigitalOcean (AS14061)
RegistrarsNiceNIC, Hosting Concepts B.V., NameSilo
Abused CVECVE‑2015‑2291
ToolsPOORTRY, STONESTOP, Spectre RAT
RATsSpectre, AnyDesk, TeamViewer
RansomwareALPHV/BlackCat, DragonForce

Final Thoughts

Scattered Spider combines advanced social engineering with identity abuse and kernel-level evasion. Focus defenses on help-desk workflows, IAM logging, DNS monitoring, driver loads, and outbound cloud traffic.

Leave a comment