{"id":1119424,"date":"2023-11-18T19:13:24","date_gmt":"2023-11-19T00:13:24","guid":{"rendered":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/uncategorized\/scattered-spider-casino-hackers-evade-arrest-in-plain-sight-dark-reading\/"},"modified":"2023-11-18T19:13:24","modified_gmt":"2023-11-19T00:13:24","slug":"scattered-spider-casino-hackers-evade-arrest-in-plain-sight-dark-reading","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/casino-affiliate\/scattered-spider-casino-hackers-evade-arrest-in-plain-sight-dark-reading\/","title":{"rendered":"Scattered Spider Casino Hackers Evade Arrest in Plain Sight &#8211; Dark Reading"},"content":{"rendered":"<p><p>    Threat intelligence analysts, incident responders, and federal    law enforcement alike all seem to know all about the threat    group with an array of monikers  The Com, Scattered Spider,    Muddled Libra, UNC3944, Starfraud, and Octo Tempest, among    others. So why is the group (which was behind the MGM Resorts    and Caesars Entertainment hacks) still successfully attacking    US organizations with impunity, with no disruptions to date?  <\/p>\n<p>    This week, reports confirmed that federal law enforcement is    well aware of the identities of the cybercrime group, which is    made up of native English speakers, yet has not been able to    make any arrests. In fact, sources confirmed to Reuters that    law enforcement has known the identities of the Scattered Spider hacking collective for    more than six months.  <\/p>\n<p>    Cybersecurity threat hunters like CrowdStrike's president    Michael Sentonas struck a decidedly baffled tone, noting that    the fact that the ransomware group is still operational and    causing \"havoc\" is a \"failure of \"law enforcement.\"  <\/p>\n<p>    The feds did offer some response: On Nov. 16, the FBI and CISA    released an advisory on Scattered Spider, providing    indicators of compromise (IoCs) and additional details to arm    enterprise security teams with details to defend their    networks.  <\/p>\n<p>    \"FBI and CISA recommend organizations implement the mitigations    below to improve your organizations cybersecurity posture    based on the threat actor activity and to reduce the risk of    compromise by Scattered Spider threat actors,\" the advisory    said. It included a list of recommendations, including    application controls, remote access tool auditing, and    implementing FIDO\/WebAuthn authentication or public key    infrastructure (PKI)-based multifactor authentication (MFA).  <\/p>\n<p>    While helpful, if there's so much information about the group's    cybercrimes, it doesn't answer why members of the ransomware    group haven't simply been arrested, or at the very least, their    operation disrupted, some note.  <\/p>\n<p>    Like most things sitting at the intersection of corporate    America and law enforcement, many of the details remain    protected in secrecy. However, the effects of the group running    rampant through public company networks like MGM Resorts are well known.  <\/p>\n<p>    \"UNC3944is one of the most prevalent and aggressive    threat actors impacting organizations in the United States    today,\" says CharlesCarmakal, Mandiant Consulting CTO at    Google Cloud. \"They are incredibly disruptive.\"  <\/p>\n<p>    And the group appears to be committing cybercrimes with    impunity all the time, even branching out into threats of    physical violence. Microsoft researchers explained in their    analysis of the group, which they call Octo Tempest, that it uses fear for    personal safety to pressure victims into paying.  <\/p>\n<p>    \"In rare instances, Octo Tempest resorts to fear-mongering    tactics, targeting specific individuals through phone calls and    texts,\" Microsoft's Incident Response and Threat Intelligence    teams said in their report. \"These actors use personal    information, such as home addresses and family names, along    with physical threats to coerce victims into sharing    credentials for corporate access.\"  <\/p>\n<p>    The sheer volume of details published by analysts about the    group is dizzying. Scattered Spider was first flagged back in    2022 when it would leverage the Oktapus phishing kit to steal    credentials. The group successfully dallied in SIM swaps but seems to have hit    its stride in mid-2023, when it became an affiliate of the    ransomware-as-a-service provider BlackCat, aka Alphv.  <\/p>\n<p>    Steadily ramping up their skills, the group's members    eventually added a clever new social engineering angle: calling    into help desks to reset credentials and take over verified    accounts as an initial foothold into target environments.    That's the gambit the Scattered Spider crew ultimately used to    compromise MGM Resorts and hobble Las Vegas    Strip operations for more than a week, running up losses in the    hundreds of millions of dollars for MGM Resorts alone. The    group simultaneously breached Caesars and quickly    negotiated a $15 million ransom payment.  <\/p>\n<p>    Mandiant's Carmakal says that the group should see more    scrutiny in the wake of those two incidents: \"They have    recently gained a lot of attention because of their recent    targeting of hospitality and entertainment organizations.\"  <\/p>\n<p>    Federal authorities aren't sharing any details of the    investigation into Scattered Spider, but cybersecurity industry    insiders suspect traditional law enforcement entities like the    FBI are having a hard time adapting to chasing cybercriminals.  <\/p>\n<p>    \"Law enforcement is more accustomed to working groups with more    structure and organization, and are struggling with the return    of more chaotic and loosely coupled threat actors,\" Bugcrowd    founder Casey Ellis says.  <\/p>\n<p>    In fact, the FBI's inability to disrupt hacking groups like    Scattered Spider could be an issue for some time to come,    according to Callie Guenther, senior manager at Critical Start.  <\/p>\n<p>    \"The FBI's struggle to contain this group also highlights the    broader challenges faced by law enforcement in the digital    age,\" Guenther says. \"The case of 'Scattered Spider' is    indicative of a new era of cyber threats where criminal groups    employ aggressive tactics, including threats of physical    violence. This escalation in criminal strategies requires an    equally robust and innovative response from law enforcement and    cybersecurity experts.\"  <\/p>\n<p>    For now, it appears it's up to individual enterprise teams to    stop Scattered Spider from hobbling their networks. In the    meantime, the cybersecurity community will continue to collect    details on their exploits and wait for arrests.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>The rest is here: <\/p>\n<p><a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.darkreading.com\/threat-intelligence\/scattered-spider-casino-hackers-evade-arrest-plain-sight\" title=\"Scattered Spider Casino Hackers Evade Arrest in Plain Sight - Dark Reading\">Scattered Spider Casino Hackers Evade Arrest in Plain Sight - Dark Reading<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Threat intelligence analysts, incident responders, and federal law enforcement alike all seem to know all about the threat group with an array of monikers The Com, Scattered Spider, Muddled Libra, UNC3944, Starfraud, and Octo Tempest, among others. So why is the group (which was behind the MGM Resorts and Caesars Entertainment hacks) still successfully attacking US organizations with impunity, with no disruptions to date?  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/casino-affiliate\/scattered-spider-casino-hackers-evade-arrest-in-plain-sight-dark-reading\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[436512],"tags":[],"class_list":["post-1119424","post","type-post","status-publish","format-standard","hentry","category-casino-affiliate"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/1119424"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=1119424"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/1119424\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=1119424"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=1119424"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=1119424"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}