In partnership with

πŸ‘‹ Welcome to Unlocked

Most breach stories start the same way: a vulnerability, a misconfiguration, an exposed server.

But Scattered Spider doesn’t need any of that.

They’re one of the most disruptive threat groups in the world right now because they specialize in something harder to patch: human trust.

This isn’t a group that β€œbreaks in.”
They talk their way in β€” then move fast, hit identity systems, and trigger chaos.

If you’re a CISO, IT leader, or security practitioner, this is one of the groups you should be planning for specifically.

πŸ•·οΈ Who is Scattered Spider?

Scattered Spider (also tracked under multiple names like UNC3944 and Octo Tempest) is known for:

They’re especially dangerous because they don’t need deep technical exploits to win.

They just need:

  • one person to trust them

  • one workflow to fail

  • one reset request approved

🎯 Why CISOs Care: Their Target is Your Identity Layer

Scattered Spider often goes after:

1) The Help Desk

They’ll impersonate employees and pressure support teams into:

  • password resets

  • MFA resets

  • device enrollment

  • account recovery

Translation: they attack the β€œemergency doors” you built for productivity.

2) Identity Providers (Okta, Entra ID, etc.)

Once they control identity, they control everything:

  • SaaS apps

  • internal systems

  • VPN

  • cloud resources

  • admin tools

3) Privileged Access

They move fast to:

  • escalate permissions

  • create persistence

  • add new MFA devices

  • create new accounts / tokens

🧠 Their Playbook (Simplified)

Here’s the pattern security teams keep seeing:

More specifically:

  1. Collect employee details (LinkedIn, breached data, OSINT)

  2. Call the help desk pretending to be the employee

  3. Push urgency (β€œI’m locked out, I’m traveling, I have a board meeting”)

  4. Get MFA reset / password reset approved

  5. Log in and enumerate apps

  6. Target admin roles and security tools

  7. Move laterally + steal data

  8. Deploy ransomware or extort without encryption

🚨 Signs You’re Being Targeted (Early Warning Signals)

These are the β€œsmall anomalies” that show up before the big breach:

Identity & Access Red Flags

  • multiple MFA reset requests in a short window

  • password resets followed by logins from unusual devices

  • repeated β€œfailed push” attempts (fatigue patterns)

  • new device enrollment right after an HR/IT request

Help Desk Red Flags

  • employees claiming β€œlost phone” repeatedly

  • requests that bypass normal ticket workflows

  • callers refusing to verify through standard steps

  • requests timed during shift changes or weekends

Admin & SaaS Red Flags

  • new OAuth app approvals that weren’t planned

  • new mailbox forwarding rules

  • suspicious access to SSO settings / identity logs

  • new privileged roles assigned unexpectedly

πŸ›‘οΈ How to Defend Against This Group (Practical Controls)

βœ… 1) Harden the Help Desk (This is the front door)

If your help desk can reset access, it needs security controls like:

  • mandatory call-back verification

  • out-of-band confirmation (not the same email they’re trying to access)

  • step-up verification for MFA resets (manager approval, HR verification, etc.)

  • flag high-risk users (finance, execs, IT admins)

Pro move: treat help desk workflows as part of your identity security perimeter.

βœ… 2) Lock Down MFA Resets + Enrollment

MFA is only strong if attackers can’t replace it.

Protect:

  • new authenticator enrollments

  • device re-registration

  • phone number changes

  • recovery methods

Require:

  • approval workflows

  • risk-based controls

  • time delays for high-risk changes

βœ… 3) Monitor for β€œIdentity Takeover Patterns”

If you have detection engineering capacity, prioritize alerts for:

  • MFA reset β†’ new login within minutes

  • new device enrollment β†’ privileged role access

  • repeated password resets across multiple users

  • login success after multiple failed attempts from different IPs

βœ… 4) Reduce Blast Radius with Least Privilege

Scattered Spider wins when one compromised user can reach too much.

Limit:

  • standing admin access

  • shared accounts

  • over-permissioned SaaS roles

  • β€œeveryone can install apps” policies

🧨 Why This Keeps Working (Even at Mature Companies)

Because it exploits something security teams rarely model correctly:

Your people are part of your authentication system.

If your identity stack is perfect but your recovery workflow is weak…
your org is still vulnerable.

πŸ‘€ Threat Groups to Watch (Quick CISO Cheat Sheet)

Here are additional threat actors worth tracking because they’re shaping what β€œmodern attacks” look like:

πŸ’‘ Unlocked Tip of the Week

Run a β€œHelp Desk Breach Drill” β€” Not a Phishing Test

Most orgs test employees with phishing simulations.

This week, test something attackers actually exploit:

Your identity recovery workflow.

πŸ“Š Poll of the Week

πŸ”₯ Final Takeaway

Scattered Spider is a reminder that the next era of cyber risk isn’t always β€œmore advanced malware.”

Sometimes it’s a better phone call.

If your organization hasn’t hardened help desk identity verification, MFA reset workflows, and identity telemetry…

This is the group that will prove why it matters.

Stay ready. Stay resilient.

Until next time,

πŸ™‹ Author Spotlight

Meet Jordan Hale - Software Developer

Jordan Hale works on backend systems, automation, and reliability tooling that support secure access and modern infrastructure. With experience across cloud-native development and security-focused engineering, Jordan helps improve telemetry, strengthen authentication workflows, and support incident response teams with clearer, more trustworthy data.

Jordan is passionate about practical security engineering and enjoys exploring how automation and AI can reduce operational risk and speed up detection. With an engineering-first mindset, Jordan focuses on clean implementation, measurable outcomes, and strong operational discipline.

About Our Sponsor

Introducing the first AI-native CRM

Connect your email, and you’ll instantly get a CRM with enriched customer insights and a platform that grows with your business.

With AI at the core, Attio lets you:

  • Prospect and route leads with research agents

  • Get real-time insights during customer calls

  • Build powerful automations for your complex workflows

Join industry leaders like Granola, Taskrabbit, Flatfile and more.



Keep Reading

No posts found