In July 2025, activity related to the Scattered Spider cybercrime group remained front and center for defenders despite a slight lull following several arrests in the United Kingdom. Law enforcement agencies in the U.S., U.K., Canada, and Australia updated their joint advisory on July 29, noting that Scattered Spider has added the DragonForce ransomware to its arsenal and continues to refine social-engineering techniques such as phishing, push-bombing, and SIM-swap attacks to steal credentials and deploy remote-access tools. cisa.gov Government partners warned that the group’s operators impersonate IT help-desk staff, tricking employees into password resets and multifactor authentication transfers, and then use legitimate remote-management tools like AnyDesk to maintain persistence. therecord.media



Several private-sector reports published during the month described how Scattered Spider widened its target set from retail and insurance to aviation and cloud-service providers. CrowdStrike observed attacks on VMware vCenter environments in which attackers created unmanaged virtual machines, attached domain controller disks to dump Active-Directory databases, and installed tunnelling tools such as Chisel, MobaXterm, ngrok, Pinggy, Rsocx, and Teleport to communicate with command-and-control servers. crowdstrike.com ExtraHop’s mid-July report highlighted that the group relies heavily on typo-squatted domains impersonating corporate portals; domains such as “7-eleven-hr[.]com,” “citrix-okta[.]com” and “pfchangs-support[.]com” were among those identified. extrahop.com Picus Security added that Scattered Spider repurposes abandoned company domains like “twitter-okta[.]com” and uses dynamic-DNS subdomains (e.g., “klv1[.]it[.]com”) to host its phishing kits. picussecurity.com.



Researchers cautioned that copycat actors already adopt Scattered Spider’s playbook and that defenders should not become complacent. The Hacker News noted that, although Mandiant had not seen new intrusions directly attributable to the group since the arrests, other actors such as UNC6040 mimicked its social-engineering tactics. thehackernews.com Accordingly, security teams are advised to ingest known indicators into their SIEMs, monitor for suspicious domain resolution, and pay close attention to help-desk interactions and MFA reset requests. Monitoring for remote-access tools (AnyDesk, TeamViewer, ScreenConnect, Teleport) and ransomware families (DragonForce, ALPHV/BlackCat, RansomHub) is also crucial. rapid7.com controlrisks.com



July's findings underscore that although Scattered Spider may experience temporary setbacks, it poses a significant risk across various industries. In response, NetWitness’s FirstWatch team has proactively integrated previously identified indicators of compromise from Scattered Spider into its Threat Feed to strengthen defenses.



Domain-based IoCs

IoC (Domain) Source
7elevenhr[.]com ExtraHop extrahop.com
activecampiagn[.]net ExtraHop extrahop.com
acwaapple[.]com ExtraHop extrahop.com
bbtplus[.]com ExtraHop extrahop.com
bellhr[.]com ExtraHop extrahop.com
bestbuycdn[.]com ExtraHop extrahop.com
birdsso[.]com ExtraHop extrahop.com
citrixokta[.]com ExtraHop extrahop.com
commonspiritcorpokta[.]com ExtraHop extrahop.com
consensysokta[.]com ExtraHop extrahop.com
corphubspot[.]com ExtraHop extrahop.com
ctscomcast[.]com ExtraHop extrahop.com
doordashsupport[.]com ExtraHop extrahop.com
duelbitscdn[.]com ExtraHop extrahop.com
freshworkshr[.]com ExtraHop extrahop.com
geminisso[.]com ExtraHop extrahop.com
guccicdn[.]com ExtraHop extrahop.com
itbitokta[.]com ExtraHop extrahop.com
iyft[.]net ExtraHop extrahop.com
klaviyohr[.]com ExtraHop extrahop.com
login.freshworkshr[.]com ExtraHop extrahop.com
aplikacijeintercom[.]com ExtraHop extrahop.com
morningstarokta[.]com ExtraHop extrahop.com
mytsl[.]net ExtraHop extrahop.com
oktaziffdavis[.]com ExtraHop extrahop.com
pfchangssupport[.]com ExtraHop extrahop.com
prntsrc[.]net ExtraHop extrahop.com
pureokta[.]com ExtraHop extrahop.com
signinnydig[.]com ExtraHop extrahop.com
simpletextingcdn[.]com ExtraHop extrahop.com
squarespacehr[.]com ExtraHop extrahop.com
sytemstern[.]net ExtraHop extrahop.com
ssoinstacart[.]com ExtraHop extrahop.com
stsvodafone[.]com ExtraHop extrahop.com
twitterokta[.]com Picus Security picussecurity.com
xngryscaleox0d[.]com ExtraHop extrahop.com
xsso[.]com ExtraHop extrahop.com
klv1[.]it[.]com Picus Security picussecurity.com
trycloudflare[.]com CrowdStrike crowdstrike.com
googlemail[.]com CrowdStrike crowdstrike.com


IoC (Tool/Malware)

IoC (Tool/Malware) Type Source
AnyDesk, TeamViewer, ScreenConnect (ConnectWise), Splashtop Legitimate remote-access tools repurposed for persistent access CISA, Rapid7 & Control Risks rapid7.com controlrisks.com
Teleport Infrastructure-access tool installed on compromised servers for persistent C2 channels Rapid7 & Rewterz rapid7.com rewterz.com
FleetDeck RMM platform abused for remote access Rapid7 rapid7.com
Chisel (communicates with trycloudflare subdomains) Protocol tunnelling tool used inside VMware environments CrowdStrike crowdstrike.com
MobaXterm, ngrok, Pinggy, Rsocx Proxy/tunnelling tools used for C2 CrowdStrike crowdstrike.com
S3 Browser Tool used to enumerate and exfiltrate AWS S3 buckets CrowdStrike crowdstrike.com
Evilginx / Evilginx2 phishing proxies Adversary-in-the-middle kit capturing session cookies and MFA tokens ExtraHop extrahop.com
Spectre RAT Custom remote-access trojan (malware-as-a-service) with enhanced obfuscation Picus Security picussecurity.com
DragonForce ransomware Ransomware family linked to Scattered Spider CISA & multiple articles cisa.gov
ALPHV/BlackCat, RansomHub, Qilin, Avaddon Ransomware families associated with Scattered Spider or affiliates Control Risks controlrisks.com
Ave Maria (Warzone RAT), Raccoon Stealer, Vidar Stealer, Ratty RAT Data-stealing malware used in campaigns The Hacker News thehackernews.com
STONESTOP/POORTRY BYOVD toolset (malicious drivers) used to disable endpoint protection Rapid7 rapid7.com
Topic: