Ransomware in the Cloud: Scattered Spider Targets Financial and Insurance Sectors

The report identifies SCATTERED SPIDER, a cybercriminal group known for using voice and SMS phishing to infiltrate cloud-based environments, as a significant threat actor.

Ransomware in the Cloud: Scattered Spider Targets Financial and Insurance Sectors
The original image was generated by OpenAI's DALL-E and edited by the author. Source: OpenAI (September 2024)

Introduction

On September 10, 2024, EclecticIQ released a detailed report analyzing ransomware operations affecting cloud infrastructures within the financial and insurance sectors. The report identifies SCATTERED SPIDER, a cybercriminal group known for using voice and SMS phishing to infiltrate cloud-based environments, as a significant threat actor. Their attacks exploit cloud-native tools and vulnerabilities, making detection and mitigation challenging.

Report Overview

SCATTERED SPIDER is a cybercrime group that employs advanced social engineering tactics, such as voice phishing (vishing) and SMS phishing (smishing), to gain unauthorized access to corporate cloud environments. The group typically impersonates employees and IT personnel to manipulate multi-factor authentication (MFA) settings, tricking victims into handing over login credentials. Their primary targets are cloud services, and high-privileged user accounts within organizations, especially IT service desks and cybersecurity teams.

SCATTERED SPIDER's attacks begin by acquiring stolen credentials, often through phishing campaigns or publicly exposed code repositories like GitHub, where hardcoded credentials are accidentally leaked. They use tools to scan for cloud authentication tokens, allowing access to cloud resources such as Microsoft Entra ID, AWS EC2, and VMware Workspace ONE.

Once access is gained, the group maintains persistence by utilizing legitimate cloud features, such as creating unauthorized virtual machines or manipulating MFA configurations. SCATTERED SPIDER also leverages SIM swapping to intercept MFA codes sent via SMS, bypassing security measures on sensitive accounts. Their operations are aided by a deep understanding of Western business practices and partnerships with groups like BlackCat/ALPHV, enhancing their effectiveness in targeting organizations.

The financial and insurance sectors are particularly vulnerable to SCATTERED SPIDER's attacks. The consequences include:

  • Data breaches.
  • Unauthorized access to critical cloud systems.
  • Ransomware deployments that can severely disrupt business operations.

The group's cloud-native tools enable them to evade traditional detection methods, prolonging their access to compromised environments. Organizations using cloud-based services like Okta, AWS, and Microsoft Azure are at heightened risk, as these platforms are frequent targets.

Insights and Analysis

EclecticIQ analysts confidently assess that SCATTERED SPIDER's methods are becoming more sophisticated. Using smishing and vishing, combined with cloud-native tools, presents significant challenges for cybersecurity teams. The group's ability to manipulate MFA settings and deploy ransomware in cloud environments underlines the need for enhanced monitoring and security protocols.

To mitigate the risks posed by SCATTERED SPIDER, organizations should:

  1. Implement phishing-resistant MFA methods, such as app-based authentication instead of SMS.
  2. Regularly audit cloud access and usage to detect unauthorized virtual machine creation.
  3. Use conditional access policies to limit administrative privileges based on device compliance and geolocation.
  4. Monitor cloud environments for abnormal activities, such as excessive egress traffic or the creation of new VMs.

In summary, SCATTERED SPIDER's evolving tactics emphasize the importance of robust cloud security practices, especially for high-value industries like finance and insurance. As these threats grow more sophisticated, proactive defences and awareness are crucial to maintaining the security of cloud infrastructures.

Indicators of Compromise (IOCs)

IndicatorTypeDescription
c7497366fd0d8c9d72f96e7190632a51MD5Gosecretsdump used for credential extraction
b233ff9dcf5520d69f9b75e1424f3271MD5Sliver C2 framework observed in SCATTERED SPIDER
cc230dcea35be180e3487b53e4b2cfbaMD5BlackCat Ransomware binary
8445274c237eb83d56070e499f43641fMD5Phishing HTML template used in attacks
1d05a83a639031913574c0bbb06026a4MD5Another phishing HTML template
revolut-ticket[.]comDomainTyposquatted domain registered via registrar.eu
servicenow-help[.]comDomainTyposquatted domain registered via registrar.eu
ibexglobai[.]comDomainTyposquatted domain registered via registrar.eu

MITRE ATT&CK Techniques

TacticTechniqueIDDescription
Initial AccessPhishingT1566SCATTERED SPIDER used phishing and smishing to gain initial access to accounts.
Credential AccessCredential DumpingT1003Use of Gosecretsdump for extracting credentials.
PersistenceCreate or Modify System ProcessT1543SCATTERED SPIDER creates unauthorized virtual machines to maintain persistence.
Defense EvasionDisable or Modify ToolsT1562Threat actors disable MFA or cloud security tools to evade detection.
ImpactData Encrypted for ImpactT1486Deployment of ransomware targeting cloud infrastructure.
Privilege EscalationExploitation for Privilege EscalationT1068Use of tools to manipulate MFA settings and escalate privileges.

References

Ransomware in the Cloud: Scattered Spider Targeting Insurance and Financial Industries
EclecticIQ analysts discovered ransomware operations by SCATTERED SPIDER targeting cloud infrastructures within the insurance and financial sectors.