Transcript
A (0:00)
The attack starts with the human element. Their masters, as I mentioned before in social engineering are hacking the person, often by posing as an employee and calling the IT help desk to request a password reset or MFA bypass, as we've sort of discussed. So that's basically it is that they will pose as an employee, call the IT help desk, try to get their account or the person they're posing as account reset or their MFA disabled so that they can just get access foreign.
B (0:35)
Hello and welcome to another episode of Data Security Decoded. I'm your host, Caleb Toland, and if this is your first time joining us, welcome to the show. Make sure you hit that subscribe button so you're notified when we have new episodes. And if you're already a subscriber, thanks for coming back. Give us a rating. Drop a comment below, let us know what you think about the show. Now, in this episode, we were joined again by Joe Halatic, head of Rubrik Sierra Labs. And if you recall, Joe joined us in the spring to give us a little bit of insight and information around a new report from Rubert Zero Labs. And this time he's joining us to talk about modern adversaries like Scattered Spider that his team is monitoring and what defenders can do to prepare themselves and be resilient. Let's dive in. Joe, thank you again for joining us on the podcast. How's your summer been? What have you been up to since we had you last on the show?
A (1:19)
Summer, I think, like any warm season, goes by too quickly, but overall it's been pretty great. I know then, at least in the security community, there's been a lot of different things happening. I know today we're talking about Scattered Spiders. So it's been the focus of a lot of my work over the last couple of months.
B (1:35)
No shortage of things to talk about today. So yeah, to dive directly into that, adversaries like Scattered Spider are highly organized, financially motivated criminal enterprises. Can you break down the motivation and business model for a group like Scattered Spider, especially how they use their tactics like double extortion to maximize their financial payout.
A (1:53)
So they aren't a nation state, their primary objective is financial gain. And as you had already mentioned, they're a financially motivated e crime group, so to speak. Their business model is a shift from traditional sort of smash and grab ransomware where most actors in the last several years have infiltrated different organizations and their modus operandi has been primarily around encryption, encryption of crown jewels, important assets, critical assets, sensitive data, pii, pci, that sort of thing. And also Applications and services. So if you're an E commerce company, your whole business model is around your website and retail and that sort of that's taken down, for instance, and you can't take it up because the system's been encrypted. That poses a problem. Now, the difference here is that they still do that. But first I'll talk a little bit about their business model. They become more or less a full fledged ransomware affiliate within a ransomware as a service ecosystem or RAS R aas, if you're not familiar with that, this allows them to monetize their access. So for instance, there's certain brokers out there that sell access to environments or sell exploits to undisclosed or unrealized vulnerabilities. So all these different types of sellers are part of this ecosystem. And then there's also operators that purchase from these sellers or are the buyers, but they're also the ones that execute these engagements. So the key tactic you mentioned around double extortion, it's an evolution from single payment for decryption. They now steal large amounts of sensitive data from a lot of unstructured sources like, say, SharePoint or OneDrive, and then they threaten you with the public disclosure as leverage. This gives them two potential payouts. So even if the victim or the organization refuses to pay to decrypt their assets, then they can just expose it to the world or interested parties or stakeholders that in a geopolitical or a corporate espionage type of environment may work against you. Does that make sense?
