Cloud Threat Landscape
  • Incidents
  • Actors
  • Techniques
  • Defenses
  • Tools
  • Targeted Technologies
  • Posters & Newspapers
  • About
  • RSS
  • STIX
  • Back to wiz.io

Made with 💙 by Wiz

Last Updated: April 3, 2025

Cloud Threat Landscape
/Incidents
Incidents
/
Scattered Spider Abuses Cloud Management Agent

Scattered Spider Abuses Cloud Management Agent

Type
Campaign
Actors
🐙0ktapus
Pub. date
August 9, 2024
Initial access
End-user compromise
Impact
Resource hijacking
Observed techniques
PhishingCredential theftValid creds abuse
Observed tools
FleetDeck
References
https://github.com/blackorbird/APT_REPORT/blob/master/summary/2024/crowdstrike-2024-threat-hunting-report.pdf
Status
Finalized
Last edited
Sep 3, 2024 10:59 AM

In May 2024, CrowdStrike observed the cyber threat group Scattered Spider establish a foothold on a cloud-hosted virtual machine (VM) using a cloud service VM management agent. The attackers compromised existing credentials through a phishing campaign to authenticate to the cloud control plane. Once authenticated, they established persistence by executing commands on the cloud-hosted VM via the management agent.

After gaining initial access, Scattered Spider used the ping command to test connectivity to various domains within and outside the target organization, likely to assess their level of access and visibility. They then ran multiple variations of the nltest command to identify domain controllers (DCs) of interest and used the wmic command to identify programs currently installed on the host.

The attackers solidified their persistence by creating a new user on the host and attempted to download FleetDeck remote access software.

The attack spanned three different operational domains: email, cloud management, and within a VM. This multi-domain approach made it difficult to detect the attack in any single domain.