The Bank Attack Reemerges as Scattered Spider

0
The Bank Attack Reemerges as Scattered Spider

According to Scattered Spider, a cybercrime outfit, their “retirement” was anything but permanent. According to fresh intelligence, they just carried out a digital incursion into a US bank, validating forecasts that they would shift their attention back to financial targets.

Images Shows Scattered Spider

In what seems to be a purposeful escalation of their actions, they compromised financial infrastructure, executive accounts, and internal systems.

An executive was the target of the first social engineering attack, which allowed them to reset passwords using a self-service account. With this footing, they used Citrix and VPN to travel sideways across the bank’s network and obtain important security and IT documents.

Additionally, they gained access to the VMware ESXi infrastructure, which enabled them to obtain employee login credentials and continue their growth within the company’s networks.

Privilege Escalation and Data Access

Once access was gained, the attackers increased rights by assuming control of administrative service accounts, which included granting Global Administrator permissions and resetting backup and service system credentials.

Image shows Scattered Spiderman

They moved important virtual computers and accessed data repositories stored on several platforms, including AWS and Snowflake.  This action suggests that their goal was not just to cause disruption but also to provide a substantial potential for data theft or extortion.

Persistence Despite “Retirement” Claims

Following criticism and publicity from the security and law enforcement groups, Scattered Spider announced earlier this year that they would stop operations. However, the gang’s tactics, equipment, and signs of compromise demonstrate consistency; it appears that they have simply changed their targets rather than ceased.

This Image Shows Scattered Spider cybercrime

Their comeback demonstrates how adaptable and tenacious these cybercrime organizations are; even when they declare their intention to disband, they frequently simply regroup or go undercover before resurfacing with more vigor.

About The Author:

Yogesh Naager is a content marketer who specializes in the cybersecurity and B2B space.  Besides writing for the News4Hackers blogs, he also writes for brands including Craw Security, Bytecode Security, and NASSCOM.

Read More:

Google Fixes Chrome Zero-Day CVE-2025-10585 as Millions Are at Risk from an Active V8 Exploit

About Author

Leave a Reply

Your email address will not be published. Required fields are marked *

en_USEnglish