SIM-Swapper, Scattered Spider Hacker Gets 10 Years - A 20-year-old Florida man at the center of a prolific cybercrime group known as “S... https://krebsonsecurity.com/2025/08/sim-swapper-scattered-spider-hacker-gets-10-years/ #judgeharveye.schlesinger #neer-do-wellnews #noahmichaelurban #scatteredspider #news4jax.com #scatterswine #simswapping #mailchimp #starfraud #doordash #lastpass #t-mobile #kingbob #oktapus #unc3944 #thecom #twilio #plex #sosa
SIM-Swapper, Scattered Spider Hacker Gets 10 Years – Krebs on Security

SIM-Swapper, Scattered Spider Hacker Gets 10 Years – Krebs on Security

It's been a bit quiet over the last 24 hours, but we've got a crucial update on a persistent threat actor. Let's dive in:

Scattered Spider's VMware ESXi Hacking Spree 🕷️

- The notorious Scattered Spider group (also known as UNC3944, Octo Tempest, 0ktapus) is aggressively targeting VMware ESXi hypervisors across US retail, airline, transportation, and insurance sectors.
- Their attacks rely heavily on sophisticated social engineering, impersonating employees and privileged users to IT help desks for password resets, gaining initial access without exploiting vulnerabilities.
- Once inside, they escalate privileges to control vCenter Server Appliance (vCSA), enable SSH on ESXi hosts, perform "disk-swap" attacks to steal NTDS.dit, wipe backups, and ultimately deploy ransomware, often completing the entire chain in just hours. Google Threat Intelligence Group (GTIG) advises hardening vSphere, implementing phishing-resistant MFA, centralising logs, and using immutable, air-gapped backups.

🤖 Bleeping Computer | https://www.bleepingcomputer.com/news/security/scattered-spider-is-running-a-vmware-esxi-hacking-spree/

#CyberSecurity #ThreatIntelligence #ScatteredSpider #UNC3944 #VMware #ESXi #Ransomware #SocialEngineering #InfoSec #IncidentResponse #CyberAttack

Scattered Spider is running a VMware ESXi hacking spree

Scattered Spider hackers have been aggressively targeting virtualized environments by attacking VMware ESXi hypervisors at U.S. companies in the retail, airline, transportation, and insurance sectors.

BleepingComputer
From Help Desk to Hypervisor: Defending Your VMware vSphere Estate from UNC3944
#UNC3944
https://cloud.google.com/blog/topics/threat-intelligence/defending-vsphere-from-unc3944
From Help Desk to Hypervisor: Defending Your VMware vSphere Estate from UNC3944 | Google Cloud Blog

The anatomy of UNC3944's vSphere-centric attacks, and a fortified, multi-pillar defense strategy required for mitigation.

Google Cloud Blog
📢 Analyse des attaques sophistiquées de UNC3944 sur VMware vSphere
📝 Cet article de Google Cloud Threat Intelligence détaille l'attaque sophistiquée menée par le groupe de menace UNC3944, qui cible les environnement...
📖 cyberveille : https://cyberveille.ch/posts/2025-07-23-analyse-des-attaques-sophistiquees-de-unc3944-sur-vmware-vsphere/
🌐 source : https://cloud.google.com/blog/topics/threat-intelligence/defending-vsphere-from-unc3944/
#Active_Directory #UNC3944 #Cyberveille
Analyse des attaques sophistiquées de UNC3944 sur VMware vSphere

Cet article de Google Cloud Threat Intelligence détaille l’attaque sophistiquée menée par le groupe de menace UNC3944, qui cible les environnements VMware vSphere dans les secteurs du commerce de détail, des compagnies aériennes et de l’assurance. L’attaque se déroule en cinq phases : Ingénierie sociale pour compromettre les opérations du help desk et obtenir les identifiants Active Directory. Prise de contrôle du plan de contrôle vCenter via la manipulation du chargeur de démarrage GRUB et le déploiement de Teleport C2. Vol d’identifiants hors ligne par manipulation de disques VM et exfiltration de NTDS.dit. Sabotage de l’infrastructure de sauvegarde par manipulation de groupes AD. Déploiement de ransomware au niveau ESXi utilisant vim-cmd et des binaires personnalisés. Les mesures d’atténuation techniques recommandées incluent :

CyberVeille

Scattered Spider hackers shift focus to aviation, transportation firms

If you work in aviation or transportation, LISTEN

  • Scattered Spider is actively targeting your industry.
  • They are using trycloudflare.com to deliver Chisel, a FOSS encrypted reverse proxy.

ACTION ITEMS:

  • block trycloudflare.com by FQDN.
  • make sure you are using IPS or app signatures on your firewalls to detect the chisel traffic.

NOTE: Chisel is encrypted, so you need to be doing full SSL inspection (TLSI) to effectively detect and block the app.

Additional Resources:

Please don't let this fuck up your 4th.

#ScatteredSpider #UNC3944 #Chisel #ChiselMalware #ThreatIntel #CyberSecurity

Scattered Spider hackers shift focus to aviation, transportation firms

Hackers associated with Scattered Spider tactics have expanded their targeting to the aviation and transportation industries after previously attacking insurance and retail sectors

BleepingComputer

We were warned this would happen. And now here we are.

United Natural Foods ($UNFI) has had to switch off systems after a cyberattack, crippling its operations. This is a huge deal, because #UNFI is a big part of the grocery distribution network in the U.S. and Canada.

Once again, it looks like the work of #UNC3944, a/k/a #ScatteredSpider. In #SBBlogwatch, we hoard canned goods.

@TheFuturumGroup @TechstrongGroup @SecurityBlvd: https://securityboulevard.com/2025/06/united-natural-foods-hack-richixbw/?utm_source=richisoc&utm_medium=social&utm_content=richisoc&utm_campaign=richisoc

Huge Food Wholesaler Paralyzed by Hack — is it Scattered Spider Again?

UNFInished business: We were warned this would happen. And now here we are.

Security Boulevard

CISOs should fortify help desk and employee defenses, enhance intrusion detection and tracking capabilities, and recognize that paying ransoms is not a viable strategy.

https://ciso2ciso.com/how-cisos-can-defend-against-scattered-spider-ransomware-attacks-source-www-csoonline-com/

#ScatteredSpider #UNC3944 #Starfraud #ScatterSwine #MuddledLibra #OctoTempest #0katpus.

How CISOs can defend against Scattered Spider ransomware attacks – Source: www.csoonline.com

Source: www.csoonline.com - Author: CISOs should fortify help desk and employee defenses, enhance intrusion detection and tracking cap

CISO2CISO.COM & CYBER SECURITY GROUP

Three major British retailers recently attacked, resulting in huge damage. Now we see the self-same scum spotlighting stores in the States.

Google’s Mandiant threat intelligence team issued this dire warning yesterday. The scrotes appear to be #UNC3944, a/k/a #ScatteredSpider, a casual confederacy of criminals wielding #DragonForce #ransomware.

“Shields up, U.S. retailers,” quipped Mandiant’s chief analyst. In #SBBlogwatch, we hail the Kobayashi Maru.

@TheFuturumGroup @TechstrongGroup @SecurityBlvd: https://securityboulevard.com/2025/05/scattered-spider-us-retail-google-richixbw/?utm_source=richisoc&utm_medium=social&utm_content=richisoc&utm_campaign=richisoc

Warning to US Retail: ‘Scattered Spider’ Targets YOU (with DragonForce Ransomware)

Arachnid alarm: Three major British retailers recently attacked, resulting in huge damage. Now we see the self-same scum spotlighting stores in the States.

Security Boulevard
Defending Against UNC3944: Cybercrime Hardening Guidance from the Frontlines
#UNC3944
https://cloud.google.com/blog/topics/threat-intelligence/unc3944-proactive-hardening-recommendations
Defending Against UNC3944: Cybercrime Hardening Guidance from the Frontlines | Google Cloud Blog

Proactive hardening recommendations to defend against UNC3944, aka Scattered Spider, a financially-motivated threat group.

Google Cloud Blog