Particle.news

Download on the App Store

Scattered Spider Reemerges With U.S. Bank Intrusion as Focus Shifts to Finance

Researchers link the crew’s renewed activity to an affiliate model that blends social engineering with ransomware-as-a-service partnerships.

Overview

  • ReliaQuest reports a rise in finance-focused lookalike domains and confirms a targeted intrusion at an unnamed U.S. banking organization.
  • Initial access in the bank case relied on socially engineering an executive and triggering a Microsoft Entra ID self-service password reset.
  • Attackers moved laterally via Citrix and VPN, compromised VMware ESXi to harvest credentials, and sought deeper access across the network.
  • Privilege escalation involved resetting a Veeam service account, assigning Azure Global Administrator rights, and relocating virtual machines to avoid detection, with attempts to exfiltrate data from Snowflake and AWS.
  • NCC Group says collaborations with RaaS operators such as ALPHV, RansomHub, DragonForce and Qilin act as a force multiplier, while experts dismiss the group’s recent “retirement” claims as a likely smokescreen.