CrowdStrike recently observed SCATTERED SPIDER—a known eCrime group—broadening its scope beyond insurance and retail to now include the aviation industry. In Q2 2025, the group primarily targeted U.S. and U.K. insurance and retail companies, but June saw attacks on U.S.-based airlines using familiar tactics.
Key Tactics and Techniques (TTPs)
SCATTERED SPIDER relies heavily on voice phishing (vishing) to impersonate employees and trick IT help desks into resetting credentials, particularly for Microsoft Entra ID (Azure AD), SSO, and VDI accounts. Once inside, they pivot to SaaS apps, conduct Active Directory (AD) reconnaissance, exploit VMware infrastructure, and install tunneling tools like Chisel, ngrok, and Teleport. They also manipulate email transport rules to avoid detection and exfiltrate data from AWS S3 buckets using tools like S3 Browser.
Objectives and Threat Patterns
The group’s main goal is ransomware deployment—specifically targeting VMware ESXi environments. When stopped early, they pivot to data extortion. SCATTERED SPIDER often hits multiple organizations in the same industry within short periods but is opportunistic in nature.
Common attack vectors include:
Social engineering via IT help desks
SIM swapping and MFA bypass
Abuse of remote access tools (e.g., AnyDesk, TeamViewer)
Cloud lateral movement and identity abuse
Data exfiltration before ransomware execution
Primary targets:
VMware vCenter/ESXi
Cloud identity providers (Azure, AWS, Okta, etc.)
Privileged accounts and remote access systems
Backup infrastructure and IT help desks
Defensive Recommendations with CrowdStrike Falcon
CrowdStrike customers should activate key Falcon capabilities, including:
Falcon Next-Gen SIEM: Prioritize ingestion of vCenter, firewall, DNS, and identity logs.
Correlation Rule Templates (CRTs): Use predefined rules for detecting risky logins, MFA manipulation, and VM creation.
Falcon Shield: Integrate with SaaS and cloud platforms (e.g., Microsoft 365, Google Workspace) for advanced threat visibility.
Falcon Cloud Security: Register cloud tenants, deploy VMware Asset Inventory Collectors, and monitor for rogue VM creation.
Proactive Hardening Tips
Enforce phishing-resistant MFA (no SMS)
Tighten help desk verification protocols
Monitor for authentication anomalies and suspicious SaaS activity
Secure virtual infrastructure and apply least privilege in cloud
Train staff against social engineering
Maintain isolated, tested backups and response playbooks
Bottom Line: SCATTERED SPIDER continues to evolve its tactics and widen its target pool. Combining the CrowdStrike Falcon platform with fundamental security hardening is key to defending against this persistent and sophisticated threat group.
We hope you’ve liked this blog. Stay tuned for more awareness blogs like this. Stay safe!