LetsTalkAVbyAlexis Series: Episode 5:The Most Repeated Mistake in AV Projects: Treating AV as Equipment, Not a System
A version of this article exists on rAVe [PUBS], written by @Paul Konikowski
Previously, Konikowski summarized the recent cyberattacks on MGM and Caesars’ casinos. In that article, he dropped some social engineering science and lessons learned from Scattered Spider (aka 0ktapus, UNC3944, Starfraud, Scatter Swine, Muddled Libra and most recently, Octo Tempest). He warned #AVtweeps about their aggressive social engineering Tactics, Techniques and Procedures (TTPs). And he's not the only one getting arachnophobia about Scattered Spider.
On Nov. 15, Reuters reported that the FBI struggled to disrupt the dangerous casino hacking gang Scattered Spider. Michael Sentonas, president of CrowdStrike, was quoted as saying, “For such a small group, they [Scattered Spider] are absolutely causing havoc.”
On Nov. 16, 2023, the FBI and the Cybersecurity and Infrastructure Security Agency (CISA) dropped its own science, releasing an advisory on Scattered Spider. Here are some highlights from the advisory, which you can follow to protect you and your organization from hackers like this group.
One of the most valuable takeaways is this list of normally legitimate tools used by the group. Each of these on their own is not suspect, but a combination of them is, and their usage should be closely monitored:
The advisory explains, “Scattered Spider threat actors have historically evaded detection on target networks by using living off the land techniques and allowlisted applications to navigate victim networks, as well as frequently modifying their TTPs. […]
“To determine if their activities have been uncovered and maintain persistence, Scattered Spider threat actors often search the victim’s Slack, Microsoft Teams and Microsoft Exchange online for emails [T1114] or conversations regarding the threat actor’s intrusion and any security response. The threat actors frequently join incident remediation and response calls and teleconferences, likely to identify how security teams are hunting them and proactively develop new avenues of intrusion in response to victim defenses. This is sometimes achieved by creating new identities in the environment [T1136] and is often upheld with fake social media profiles [T1585.001] to backstop newly created identities.” […]
“The FBI and CISA recommend organizations implement the mitigations below to improve your organization’s cybersecurity posture based on the threat actor activity and to reduce the risk of compromise by Scattered Spider threat actors. […]
In addition, the authoring authorities of this CISA recommend network defenders apply certain mitigations to limit potential adversarial use of common system and network discovery techniques, and to reduce the impact and risk of compromise by ransomware or data extortion actors. To learn more, click here to read the rest of Konikowski’s article on rAVe [PUBS].
A University of Central Florida double-alum with a Master’s in Digital Media, I'm a content creator who loves bringing people together over shared interests. As AVIXA's Coordinator of Digital Content, I produce articles on a myriad of technology topics. I've also worked on virtual reality projects, transforming Romanian folk tales into VR narratives.
We and selected partners, use cookies or similar technologies as specified in the cookie policy and privacy policy.
You can consent to the use of such technologies by closing this notice.
Please sign in or register for FREE
If you are a registered user on AVIXA Xchange, please sign in