The hackers who reportedly hit more than 130 organizations last year and stole the credentials of almost 10,000 employees are still targeting several tech and video game companies, according to a report obtained by TechCrunch.
The report, prepared by cybersecurity firm CrowdStrike, calls the hackers “Scattered Spider.” In a previous publicly available report, the company said this group is also known as “Roasted 0ktapus” in an apparent reference to the report published by Group-IB, another cybersecurity firm, last year.
Reports like the one obtained by TechCrunch are prepared by threat intelligence companies for their customers, with the idea of alerting them to hackers who are either targeting the customers directly, or other companies in the same sector. In the report, CrowdStrike notes that it has limited visibility into the hacking campaign given that it has no “additional forensic artifacts,” referring to data it obtained directly from targeted organizations. That’s why the company admits it has “low confidence” in its assessment that this is activity by Scattered Spider.
Two cybersecurity insiders, who asked to remain anonymous as they were not authorized to speak to the press, said that the understanding within the industry is that Scattered Spider is the same group as 0ktapus.
“Scattered Spider continued deploying numerous phishing pages in January 2023. CrowdStrike Intelligence assesses the adversary has likely expanded its target scope to include technology sector companies specializing in gaming or financial software, while maintaining a prior focus on business process outsourcing (BPO) companies and cellular providers,” read the report, which is not publicly available.
It’s unclear if this is the same group that hacked Riot Games last month, but in a list of phishing domains included in the CrowdStrike report, there’s one that was clearly made to target the video game giant given that it includes the name of the company in the URL.
Among the phishing domains, there’s also others tailored to impersonate video game makers Roblox and Zynga, email marketing and newsletter giant Mailchimp and its parent company Intuit, Salesforce, Comcast, and Grubhub. TaskUs, a contractor that provides customer service for companies, including Mailchimp, Intuit and other tech giants, was also on the list.
In January, Mailchimp disclosed that it had been hacked — the second hack against the company in six months. At the time, Mailchimp said the hackers targeted its employees via phishing. It’s unclear if this incident is tied to the activities of Scattered Spider. Mailchimp did not respond to a request for comment.
Riot declined to comment.
Salesforce spokesperson Allen Tsai said that the company is “aware of and monitor phishing campaigns industry-wide.”
“At this time, we have no indication of unauthorized access to customer data relevant to the cited report,” Tsai said in an email.
An Intuit spokesperson did not comment as they had not seen the report.
Roblox, Zynga, TaskUs, Comcast and Grubhub did not immediately respond to a request for comment.
The report said that “the majority” of the hacking group’s phishing pages were designed to mimic Okta login portals, “while a much smaller number impersonated Microsoft.”
CrowdStrike did not respond to a request for comment.
If you recently made a purchase from an overseas online store selling knockoff clothes and goods, there’s a chance your credit card number and personal information were exposed. Since January 6, a database containing hundreds of thousands of unencrypted credit card numbers and corresponding cardholders’ information was spilling onto the open web. At the time it […]
ate on Friday, Twitter announced a new policy that will remove text message two-factor authentication (2FA) from any account that won’t pay for it. In a blog post, Twitter said that it will only allow accounts that subscribe to its premium Twitter Blue feature to use text message-based 2FA. Twitter users that don’t switch to a different […]
A bug in a new centralized system that Meta created for users to manage their logins for Facebook and Instagram could have allowed malicious hackers to switch off an account’s two-factor protections just by knowing their phone number. Gtm Mänôz, a security researcher from Nepal, realized that Meta did not set up a limit of attempts when […]
Leave a Reply