A new breed of cyber attackers is wreaking havoc across Western businesses, targeting IT support desks with a potent blend of technical subterfuge and psychological manipulation.
Known by security researchers as “SCATTERED SPIDER,” this group has rapidly gained notoriety for its highly effective combination of social engineering, identity-based attacks, and close partnership with DragonForce ransomware-as-a-service (RaaS) operators.
Recent months have seen major disruptions in industries from finance and healthcare to hospitality and telecommunications.
The group’s hallmark is their ability to bypass multi-factor authentication (MFA) and traditional security controls by exploiting the weakest link in any organization: its people.
Rather than solely relying on technical exploits or automated malware, SCATTERED SPIDER deploys live, phone-based impersonation posing convincingly as IT staff, executives, or locked-out employees to manipulate help desks into resetting credentials or granting access.
Inside SCATTERED SPIDER’s Attack Playbook
A multi-stage, rapid-fire approach characterizes SCATTERED SPIDER’s operations.
First, the group conducts detailed reconnaissance using open-source intelligence (OSINT) gathered from public LinkedIn profiles, press releases, and social media.
This intelligence is used to craft highly targeted vishing (voice phishing) campaigns, where attackers call IT support desks and impersonate employees with stolen or plausible personal details.
Once access is obtained, SCATTERED SPIDER exploits standard Windows administrative tools, such as PowerShell and PsExec, for lateral movement and privilege escalation.
The group’s operators have shown a particular interest in identity management infrastructure, frequently targeting Okta, Azure Active Directory, and on-premises Active Directory servers.
This focus allows them to capture highly privileged credentials and manipulate the very systems that enforce access controls within an organization.
SCATTERED SPIDER’s partnership with DragonForce RaaS further amplifies the group’s impact. DragonForce provides customizable ransomware payloads, data exfiltration modules, and dark web leak portals all accessible via an intuitive dashboard.
After exfiltrating sensitive data, SCATTERED SPIDER deploys DragonForce ransomware to encrypt critical systems, then demands payment under the threat of releasing stolen data publicly.
The Challenge of Defense
Defending against SCATTERED SPIDER requires a shift in strategy. Traditional security controls such as endpoint detection and response (EDR), antivirus scans, and network monitoring, are often too slow to detect the group’s fast-moving, human-driven attacks.
Their use of “living off the land” techniques (i.e., leveraging legitimate tools already present in the environment) leaves minimal forensic evidence, complicating incident response efforts.
Organizations are advised to implement rigorous call-back procedures for help desk requests, enforce phishing-resistant multi-factor authentication (MFA) with hardware tokens, and monitor for unusual use of administrative tools.
Security culture is key: training staff to recognize social engineering attempts, fostering a culture of skepticism, and regularly rehearsing incident response plans can make all the difference.
SCATTERED SPIDER’s blend of technical skill and psychological warfare represents a new frontier in cybercrime one where the most sophisticated attacks are powered not only by code, but by the manipulation of trust.





