Cloud Threat Landscape
  • Incidents
  • Actors
  • Techniques
  • Defenses
  • Tools
  • Targeted Technologies
  • Posters & Newspapers
  • About
  • RSS
  • STIX
  • Back to wiz.io
Cloud Threat Landscape

Scattered Spider SaaS targeting (2024)

Type
Campaign
Actors
🐙0ktapus
Pub. date
June 14, 2024
Initial access
End-user compromise
Impact
Data exfiltrationRansomOp
Observed techniques
Credential theftSIM swap scamSmishing (SMS phishing)
Observed tools
MimikatzADReconImpacket
Targeted technologies
VMware vSphere
References
https://cloud.google.com/blog/topics/threat-intelligence/unc3944-targets-saas-applications/
Status
Finalized
Last edited
Jul 23, 2024 2:12 PM

UNC3944, a financially motivated threat group linked to "0ktapus," "Octo Tempest," "Scatter Swine," and "Scattered Spider," has evolved its tactics to include data theft from SaaS applications, persistence mechanisms in virtualization platforms, and lateral movement via SaaS permissions abuse. Active since at least May 2022, the group initially focused on credential harvesting and SIM swapping before shifting to data theft extortion.

Key tactics include leveraging social engineering against corporate help desks to gain access to privileged accounts, exploiting Okta permissions for broader access, and creating virtual machines for persistent attacks. They also used cloud synchronization tools for data exfiltration and targeted Active Directory Federated Services for easier access to cloud applications.

UNC3944's shift to SaaS applications involved unauthorized access to platforms like vCenter, CyberArk, SalesForce, Azure, CrowdStrike, AWS, and GCP. They used tools like Airbyte and Fivetran for data theft and leveraged Microsoft Office Delve for quick reconnaissance within M365 environments.

Made with 💙 by Wiz

Last Updated: April 3, 2025