Wren Howell
May 2, 2025

Scattered Spider Hygiene

Posted on May 2, 2025  •  3 minutes  • 581 words

In a previous post, we discussed how threat actors evade EDR (Endpoint Detection and Response) using Living Off the Land (LoL) techniques. In this post, I want to focus on threat actors who bypass EDR completely, called Scattered Spider. This group evades EDR completely by using social engineering tactics to cause harm to many organizations and has been behind the breaches of MGM, Twilio, and, more recently, Marks & Spencer in the UK.

Some of their tactics are listed bullet points.

Impersonation and Phishing:

Bypassing Multi-Factor Authentication (MFA):

Remote Access Tools (RATs):

Looking for Passwords:

Countering Scattered Spider’s Tactics

What can organizations do to better defend against these kinds of attacks? Here are some strategies:

Domain Impersonation Detection:

FIDO2 MFA:

Remote Monitoring and Management (RMM) Tools:

Phishing Simulation Training:

Look for Exposed Passwords:

Conclusion

Scattered Spider demonstrates the growing trend of threat actors who use social engineering to bypass EDR systems. Scattered Spider shows that security is not just a technical issue, but a multifaceted issue that needs support across departments.

References

Follow me

My people say I don't bite