CISOs should fortify help desk and employee defenses, enhance intrusion detection and tracking capabilities, and recognize that paying ransoms is not a viable strategy.

https://ciso2ciso.com/how-cisos-can-defend-against-scattered-spider-ransomware-attacks-source-www-csoonline-com/

#ScatteredSpider #UNC3944 #Starfraud #ScatterSwine #MuddledLibra #OctoTempest #0katpus.

How CISOs can defend against Scattered Spider ransomware attacks – Source: www.csoonline.com

Source: www.csoonline.com - Author: CISOs should fortify help desk and employee defenses, enhance intrusion detection and tracking cap

CISO2CISO.COM & CYBER SECURITY GROUP
From infiltration to crypto-lock sometimes in hours (not days) — as attackers refine tactics, 'speed matters,' experts warn
https://www.databreachtoday.com/as-attackers-refine-tactics-speed-matters-experts-warn-a-24605 #ScatteredSpider #muddledlibra #octotempest #UNC3944
As Attackers Refine Tactics, 'Speed Matters,' Experts Warn

Advanced attackers increasingly feel the need for speed, lowering the time they spend lurking after they infiltrate networks before exfiltrating data and

Hackers that breached Las Vegas casinos rely on violent threats

A prolific hacking group that was behind a recent breach that crippled several Las Vegas resorts has made violence threats as part of its attempts to force victims to give up credentials.

In some cases, they sent text messages threatening violence against a target’s wife

#TheCom #OctoTempest #0ktapus #ScatteredSpider #Caesars #LasVegas #security #cybersecurity #socialengineering #hacking #hackers #hacked

https://cyberscoop.com/com-scattered-spider-tradecraft/

Hackers that breached Las Vegas casinos rely on violent threats

While best known for its social engineering techniques, a criminal hacking group known as "the Com" sometimes uses threats of violence.

CyberScoop

Microsoft has been tracking a threat group that stands out for its ability to cash in from data theft hacks that use broad social engineering attacks, painstaking research, and occasional physical threats.

Unlike many ransomware attack groups, #OctoTempest, as Microsoft has named the group, doesn’t encrypt data after gaining illegal access to it.
Instead, the threat actor threatens to share the data publicly unless the victim pays a hefty ransom.

To defeat targets’ defenses, the group resorts to a host of techniques, which, besides social engineering, includes SIM swaps, SMS phishing, and live voice calls.
Over time, the group has grown increasingly aggressive, at times resorting to threats of 🔹physical violence 🔹if a target doesn’t comply with instructions to turn over credentials.

https://arstechnica.com/security/2023/10/microsoft-profiles-new-threat-group-with-unusual-but-effective-practices/

Microsoft profiles new threat group with unusual but effective practices

Octo Tempest employs tactics that many of its targets aren't prepared for.

Ars Technica
Microsoft profiles new threat group with unusual but effective practices

Octo Tempest employs tactics that many of its targets aren't prepared for.

Ars Technica

This year, Octo Tempest broadened its targets to encompass companies in various sectors, including gaming, hospitality, retail, manufacturing, technology, financial services, and managed service providers.

#Cybersecurity #OctoTempest #HackerGroup

https://cybersec84.wordpress.com/2023/10/28/octo-tempest-the-most-dangerous-financial-hacking-group/

Octo Tempest: The Most Dangerous Financial Hacking Group

Microsoft has released an extensive profile of a highly sophisticated threat actor called Octo Tempest, which primarily targets companies for data extortion and ransomware attacks. Octo Tempest&#82…

CyberSec84 | Cybersecurity news.
Microsoft lifts the lid on a dangerous new hacking group that could pose a major threat to your online accounts

Octo Tempest will go to any lengths to breach a system

TechRadar pro