Abacus Group and Medicus IT have merged. Learn more.
Threat Actor group Scattered Spider has been making headlines for its ruthless waves of high-profile cyberattacks spanning several industries. This relentless cybercriminal group is rapidly evolving, often exploiting social engineering tactics to deceive and manipulate their targets. On August 11th, 2025, Abacus Group and Blackpoint Cyber hosted an in-depth webinar, Inside Scattered Spider: Safeguarding Highly-Regulated Industries from Emerging Cyber Threats, that focused on who Scattered Spider is, the tactics Scattered Spider employs, and strategies organizations can follow to defend themselves against the shifting tactics of threat actors.
With expertise in frontline incident response and red team tactics, our panelists uncovered critical insights into Scattered Spider. If you missed it, learn more in the webinar summary below.
Our panel of experts—Travis DeForge, Director of Cybersecurity at Abacus Group, Michael Brunetti, Senior Director of Incident Response at Abacus Group, and Andi Ursry, Senior Threat Intelligence Analyst at Blackpoint, joined moderator Jonathan Bohrer, President of Abacus Group, to discuss Scattered Spider and why they are a unique threat in the ever-evolving cybersecurity landscape.
During the session, the speakers highlighted the group’s differentiators from other threat actors. This included not being associated with a nation state, a focus on employing social engineering tactics, and their focus on receiving ransomware payments, rather than making a political statement. The makeup of the group is unique, with most members being underage minors or young adults and consisting of native English speakers, commonly from the United States and the United Kingdom. Additionally, the speakers commented on the group’s targeted approach of overwhelming different industries, like retail or insurance, and wreaking havoc before moving on to another vertical. The industries they choose typically have three characteristics in common: high-value data such as PII, complex IT infrastructure, and/or outsourced or vulnerable help desk operations, all of which are applicable to highly-regulated industries such as financial services and healthcare.
It is estimated that victims of Scattered Spider have lost between $9.5-25 million in ransom payments since May 2025. While this number alone is impactful, it does not consider losses associated with victims’ downtime due to an attack. Other side effects discussed include SEC disclosure obligations, cyber insurance costs and coverage implications, reputational damage, and the threat of double extortion (data encryption and exfiltration).
With these numbers in mind, the panelists highlighted that all organizations could be a target of a Scattered Spider ransomware attack. While it is usually the largest companies hit making the headlines, Abacus Group’s Incident Response team has helped small and midsized businesses across industries recover from breaches.
One of the key takeaways from the discussion was that Scattered Spider deploys sophisticated social engineering techniques to target their victims. These strategies include:
After convincing the help desk to initiate a password reset and to change MFA settings, Scattered Spider deploys “remote rat” tools to establish access in the environment. Next, they audit the victim’s infrastructure to identify sensitive and proprietary information and strategic targets, like hypervisors and backups. Following this, the threat actor will exfiltrate the data, encrypt systems, and send a ransom demand.
In the event of an attack, there are several mistakes firms make within the first 48 hours, including:
In cases where an Incident Response partner such as Abacus Group was already in place, these expert vendors are able to disrupt a Scattered Spider attack before they get to the data exfiltration and ransom phase.
Our panelists pointed out an important fact – it is not necessary for organizations to have the most mature and cutting-edge security strategy; however. It’s imperative they not be the easiest target. They outlined core strategies that organizations need to have in place to stop Scattered Spider from advancing through their environment.
Initial Access: Inhibit social engineering tactics with advanced email security, phishing-resistant MFA, ongoing security awareness training, strengthened help desk protocols, and Zero Trust strategies.
Scattered Spider is an ongoing threat, and security experts are persistently working to understand their latest tactics in order to protect businesses. If you couldn’t attend the live session, you can access the webinar recording to learn more. For more insights on our cybersecurity offerings, contact us today.
If you believe you are the target of a cyberattack, email our 24x7x365 incident response team at inbound@entaracorp.com and an expert will respond within 15 minutes.
Lorem ipsum dolor sit amet, consectetur adipiscing elit
These Stories on Blog