In July 2025, activity related to the Scattered Spider cybercrime group remained front and center for defenders despite a slight lull following several arrests in the United Kingdom. Law enforcement agencies in the U.S., U.K., Canada, and Australia updated their joint advisory on July 29, noting that Scattered Spider has added the DragonForce ransomware to its arsenal and continues to refine social-engineering techniques such as phishing, push-bombing, and SIM-swap attacks to steal credentials and deploy remote-access tools. cisa.gov Government partners warned that the group’s operators impersonate IT help-desk staff, tricking employees into password resets and multifactor authentication transfers, and then use legitimate remote-management tools like AnyDesk to maintain persistence. therecord.media
Several private-sector reports published during the month described how Scattered Spider widened its target set from retail and insurance to aviation and cloud-service providers. CrowdStrike observed attacks on VMware vCenter environments in which attackers created unmanaged virtual machines, attached domain controller disks to dump Active-Directory databases, and installed tunnelling tools such as Chisel, MobaXterm, ngrok, Pinggy, Rsocx, and Teleport to communicate with command-and-control servers. crowdstrike.com ExtraHop’s mid-July report highlighted that the group relies heavily on typo-squatted domains impersonating corporate portals; domains such as “7-eleven-hr[.]com,” “citrix-okta[.]com” and “pfchangs-support[.]com” were among those identified. extrahop.com Picus Security added that Scattered Spider repurposes abandoned company domains like “twitter-okta[.]com” and uses dynamic-DNS subdomains (e.g., “klv1[.]it[.]com”) to host its phishing kits. picussecurity.com.
Researchers cautioned that copycat actors already adopt Scattered Spider’s playbook and that defenders should not become complacent. The Hacker News noted that, although Mandiant had not seen new intrusions directly attributable to the group since the arrests, other actors such as UNC6040 mimicked its social-engineering tactics. thehackernews.com Accordingly, security teams are advised to ingest known indicators into their SIEMs, monitor for suspicious domain resolution, and pay close attention to help-desk interactions and MFA reset requests. Monitoring for remote-access tools (AnyDesk, TeamViewer, ScreenConnect, Teleport) and ransomware families (DragonForce, ALPHV/BlackCat, RansomHub) is also crucial. rapid7.com controlrisks.com
July's findings underscore that although Scattered Spider may experience temporary setbacks, it poses a significant risk across various industries. In response, NetWitness’s FirstWatch team has proactively integrated previously identified indicators of compromise from Scattered Spider into its Threat Feed to strengthen defenses.
Domain-based IoCs
| IoC (Domain) | Source |
|---|---|
| 7elevenhr[.]com | ExtraHop extrahop.com |
| activecampiagn[.]net | ExtraHop extrahop.com |
| acwaapple[.]com | ExtraHop extrahop.com |
| bbtplus[.]com | ExtraHop extrahop.com |
| bellhr[.]com | ExtraHop extrahop.com |
| bestbuycdn[.]com | ExtraHop extrahop.com |
| birdsso[.]com | ExtraHop extrahop.com |
| citrixokta[.]com | ExtraHop extrahop.com |
| commonspiritcorpokta[.]com | ExtraHop extrahop.com |
| consensysokta[.]com | ExtraHop extrahop.com |
| corphubspot[.]com | ExtraHop extrahop.com |
| ctscomcast[.]com | ExtraHop extrahop.com |
| doordashsupport[.]com | ExtraHop extrahop.com |
| duelbitscdn[.]com | ExtraHop extrahop.com |
| freshworkshr[.]com | ExtraHop extrahop.com |
| geminisso[.]com | ExtraHop extrahop.com |
| guccicdn[.]com | ExtraHop extrahop.com |
| itbitokta[.]com | ExtraHop extrahop.com |
| iyft[.]net | ExtraHop extrahop.com |
| klaviyohr[.]com | ExtraHop extrahop.com |
| login.freshworkshr[.]com | ExtraHop extrahop.com |
| aplikacijeintercom[.]com | ExtraHop extrahop.com |
| morningstarokta[.]com | ExtraHop extrahop.com |
| mytsl[.]net | ExtraHop extrahop.com |
| oktaziffdavis[.]com | ExtraHop extrahop.com |
| pfchangssupport[.]com | ExtraHop extrahop.com |
| prntsrc[.]net | ExtraHop extrahop.com |
| pureokta[.]com | ExtraHop extrahop.com |
| signinnydig[.]com | ExtraHop extrahop.com |
| simpletextingcdn[.]com | ExtraHop extrahop.com |
| squarespacehr[.]com | ExtraHop extrahop.com |
| sytemstern[.]net | ExtraHop extrahop.com |
| ssoinstacart[.]com | ExtraHop extrahop.com |
| stsvodafone[.]com | ExtraHop extrahop.com |
| twitterokta[.]com | Picus Security picussecurity.com |
| xngryscaleox0d[.]com | ExtraHop extrahop.com |
| xsso[.]com | ExtraHop extrahop.com |
| klv1[.]it[.]com | Picus Security picussecurity.com |
| trycloudflare[.]com | CrowdStrike crowdstrike.com |
| googlemail[.]com | CrowdStrike crowdstrike.com |
IoC (Tool/Malware)
| IoC (Tool/Malware) | Type | Source |
|---|---|---|
| AnyDesk, TeamViewer, ScreenConnect (ConnectWise), Splashtop | Legitimate remote-access tools repurposed for persistent access | CISA, Rapid7 & Control Risks rapid7.com controlrisks.com |
| Teleport | Infrastructure-access tool installed on compromised servers for persistent C2 channels | Rapid7 & Rewterz rapid7.com rewterz.com |
| FleetDeck | RMM platform abused for remote access | Rapid7 rapid7.com |
| Chisel (communicates with trycloudflare subdomains) | Protocol tunnelling tool used inside VMware environments | CrowdStrike crowdstrike.com |
| MobaXterm, ngrok, Pinggy, Rsocx | Proxy/tunnelling tools used for C2 | CrowdStrike crowdstrike.com |
| S3 Browser | Tool used to enumerate and exfiltrate AWS S3 buckets | CrowdStrike crowdstrike.com |
| Evilginx / Evilginx2 phishing proxies | Adversary-in-the-middle kit capturing session cookies and MFA tokens | ExtraHop extrahop.com |
| Spectre RAT | Custom remote-access trojan (malware-as-a-service) with enhanced obfuscation | Picus Security picussecurity.com |
| DragonForce ransomware | Ransomware family linked to Scattered Spider | CISA & multiple articles cisa.gov |
| ALPHV/BlackCat, RansomHub, Qilin, Avaddon | Ransomware families associated with Scattered Spider or affiliates | Control Risks controlrisks.com |
| Ave Maria (Warzone RAT), Raccoon Stealer, Vidar Stealer, Ratty RAT | Data-stealing malware used in campaigns | The Hacker News thehackernews.com |
| STONESTOP/POORTRY | BYOVD toolset (malicious drivers) used to disable endpoint protection | Rapid7 rapid7.com |