The FBI has issued a warning that the cybercrime group Scattered Spider is now targeting the U.S. aviation sector, using advanced social engineering tactics to breach corporate systems. Known for impersonating employees or contractors, the group tricks IT help desks into granting unauthorized access, often by adding rogue multi-factor authentication (MFA) devices. These attacks frequently bypass traditional security measures by exploiting human trust and procedural weaknesses in help desk identity verification. Cybersecurity firms like Palo Alto Networks and Mandiant have confirmed multiple incidents involving Scattered Spider, especially targeting high-ranking executives like CFOs. The group conducts detailed reconnaissance to impersonate these individuals with convincing accuracy, using personal data such as birthdates and SSNs. Once inside, they escalate access, compromise cloud and virtual environments, extract sensitive data, and disrupt operations. In one case, the attackers hijacked virtual machines, breached VPNs, and exfiltrated over 1,400 credentials from a CyberArk vault. They even engaged in a live battle with the organization’s security team for control of admin privileges—requiring Microsoft’s intervention to restore order. Experts describe Scattered Spider as a hybrid threat group, blending techniques like SIM swapping, vishing, and cloud sabotage to conduct fast, high-impact attacks. Their success lies in exploiting trust-based processes rather than just technical vulnerabilities. Security leaders now urge companies to overhaul internal processes, especially around help desk workflows, identity recovery, and MFA resets. Training staff to detect suspicious behavior and reinforcing real-time identity verification protocols are critical to defending against this evolving threat landscape.
A TOCTOU (time-of-check/time-of-use) race condition in the Windows Cloud Files minifilter driver (cldflt.sys), tracked as CVE-2025-55680, permits local authenticated users to creat...
The Jenkins project has released a major security advisory disclosing 14 vulnerabilities across multiple plugins, including several rated high severity. The most critical, CVE-2025...
The Internet Systems Consortium (ISC) has issued a security advisory regarding a high-severity denial-of-service (DoS) vulnerability in the Kea DHCPv4 server, tracked as CVE-2025-1...