Back

The ITSM Practice Podcast: Exploring Scattered Spider Cloud Attacks

Tarun Ramesh, Senior Backend Engineer at Dune Security, joined The ITSM Practice Podcast to discuss how Scattered Spider and similar threat groups exploit cloud environments using advanced social engineering and defense strategies.

Minutes to listen:
8 minutes
by Dune Research Team
22 Nov 2024
November 22, 2024

FAQs

Complete the form below to get started.

Explore Our Latest Insights

Stay updated ith our expert insights and tips
View all

Closing Out Cybersecurity Awareness Month: 5 Key Takeaways in the Fight for User Resilience

October may be over, but the fight for user resilience continues – see how Dune helped turn awareness into action this Cybersecurity Awareness Month.

Blog

Gmail Passwords Confirmed As Part Of 183 Million Account Data Leak

Earlier this year, I reported on a data leak that included a whopping 184,162,718 passwords and logins impacting the likes of Apple, Facebook and Instagram users.

Industry News
Graphic promoting Cyber Happy Hour & Panel: Deepfakes + Synthetic Media hosted by Dune Security and Reality Defender at Cooley LLP.

Dune Security and Reality Defender Team Up at Cooley LLP to Tackle the Rise of Deepfake and Synthetic Media Threats

Deepfakes have emerged as one of the most pressing enterprise threats, capable of eroding trust and triggering costly decisions in seconds. Dune Security and Reality Defender gathered industry leaders at Cooley LLP to explore how organizations can keep up with today’s most advanced threats at scale.

Blog

Key Takeaways

  • Scattered Spider targets privileged users through advanced social engineering. The group actively manipulates IT administrators and other high-access employees using tactics like phishing, vishing, push bombing, and SIM swapping. By exploiting human trust rather than technical flaws, they gain credentials and initial control of cloud environments.
  • Attackers maintain persistence by exploiting identity systems. After gaining access, they register their own MFA tokens and add federated identity providers, creating persistent backdoors that survive password resets or account removals. These tactics highlight how identity trust chains can be turned against the enterprise.
  • Legitimate cloud tools become attack infrastructure.Scattered Spider uses built-in administrative features to execute commands, move data, and maintain access without triggering alerts. Their ability to operate inside standard workflows underscores the need for behavioral detection.
  • Automation closes gaps faster than attackers can exploit them. Automated policy correction, behavioral analytics, and continuous monitoring detect anomalies in real time and immediately adjust access privileges. Dune Security’s approach applies this principle at the user layer, helping organizations identify and contain human risk before it spreads.
  • Effective defense starts with behavioral visibility. Strong MFA and regular identity audits are essential, but they only go so far. Real protection requires visibility into how users behave once they’re inside. Dune Security provides that insight by detecting abnormal actions, exposing insider and credential-based risks, and enabling precise, real-time response.

Never Miss a Human Risk Insights

Subscribe to the Dune Risk Brief - weekly trends, threat models,
and strategies for enterprise CISOs.
Thanks for submitting the form!
Oops! Something went wrong while submitting the form.

Ready to See Dune in Action?

See why leading enterprises trust our platform to pinpoint risky users, stop attackers before they strike, and build resilience where it matters most.
Book a Demo