The hackers who reportedly hit more than 130 organizations last year and stole the credentials of almost 10,000 employees are still targeting several tech and video game companies, according to a report obtained by TechCrunch.
The report, prepared by cybersecurity firm CrowdStrike, calls the hackers “Scattered Spider.” In a previous publicly available report, the company said this group is also known as “Roasted 0ktapus” in an apparent reference to the report published by Group-IB, another cybersecurity firm, last year.
Reports like the one obtained by TechCrunch are prepared by threat intelligence companies for their customers, with the idea of alerting them to hackers who are either targeting the customers directly, or other companies in the same sector. In the report, CrowdStrike notes that it has limited visibility into the hacking campaign given that it has no “additional forensic artifacts,” referring to data it obtained directly from targeted organizations. That’s why the company admits it has “low confidence” in its assessment that this is activity by Scattered Spider.
Two cybersecurity insiders, who asked to remain anonymous as they were not authorized to speak to the press, said that the understanding within the industry is that Scattered Spider is the same group as 0ktapus.
“Scattered Spider continued deploying numerous phishing pages in January 2023. CrowdStrike Intelligence assesses the adversary has likely expanded its target scope to include technology sector companies specializing in gaming or financial software, while maintaining a prior focus on business process outsourcing (BPO) companies and cellular providers,” read the report, which is not publicly available.
It’s unclear if this is the same group that hacked Riot Games last month, but in a list of phishing domains included in the CrowdStrike report, there’s one that was clearly made to target the video game giant given that it includes the name of the company in the URL.
Among the phishing domains, there’s also others tailored to impersonate video game makers Roblox and Zynga, email marketing and newsletter giant Mailchimp and its parent company Intuit, Salesforce, Comcast, and Grubhub. TaskUs, a contractor that provides customer service for companies, including Mailchimp, Intuit and other tech giants, was also on the list.
In January, Mailchimp disclosed that it had been hacked — the second hack against the company in six months. At the time, Mailchimp said the hackers targeted its employees via phishing. It’s unclear if this incident is tied to the activities of Scattered Spider. Mailchimp did not respond to a request for comment.
Riot declined to comment.
Salesforce spokesperson Allen Tsai said that the company is “aware of and monitor phishing campaigns industry-wide.”
“At this time, we have no indication of unauthorized access to customer data relevant to the cited report,” Tsai said in an email.
An Intuit spokesperson did not comment as they had not seen the report.
Roblox, Zynga, TaskUs, Comcast and Grubhub did not immediately respond to a request for comment.
The report said that “the majority” of the hacking group’s phishing pages were designed to mimic Okta login portals, “while a much smaller number impersonated Microsoft.”
CrowdStrike did not respond to a request for comment.
Facebook-parent Meta has launched a subscription service, called Meta Verified, that will allow users to add the coveted blue check mark to their Instagram and Facebook accounts for up to $15 a month by verifying their identity, its chief executive Mark Zuckerberg said on Sunday, tapping a new revenue channel that has returned mixed success […]
Vulnerabilities within WordPress can lead to compromise, and oftentimes known vulnerabilities are utilized to infect WordPress sites with more than one infection. It is common for out of date websites to be attacked by multiple threat actors or targeted by the same attacker using multiple different channels. We recently came across a database injection that […]
U.S. nonprofit healthcare giant Maternal & Family Health Services has confirmed hackers accessed sensitive patient, financial and medical information months earlier. In an advisory published on its website on Thursday, MFHS said a “sophisticated ransomware incident” exposed the sensitive information of current and former patients, employees and vendors. This information included names, addresses, dates of birth, Social Security numbers, […]
Leave a Reply