Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

Scattered Spider: The VMware-Targeting Ransomware Group Leaving a Trail of Destruction Across North America


Scattered Spider, a notorious ransomware group, has been targeting VMware ESXi hypervisors across North America, leaving a trail of destruction in its wake. With its highly effective social engineering tactics and campaign-driven approach, this group is pushing the cybersecurity landscape to its limits.

  • Scattered Spider is a sophisticated ransomware group targeting VMware ESXi hypervisors in North America.
  • The group uses social engineering tactics to bypass security programs, relying on phone calls to an IT help desk for initial access.
  • The attacks are campaign-driven and precise, aiming at critical systems and data, with the attackers gaining control of Active Directory to pivot into the VMware environment.
  • The attack chain has five phases: initial compromise, pivoting into virtual environments, enabling SSH connections, executing disk swaps, and weaponizing access with custom ransomware binary.
  • Google advises three crucial layers of protection against Scattered Spider attacks:
  • 1. Enable vSphere lockdown mode, enforce execInstalledOnly, use vSphere VM encryption, decommission old VMs, and harden the help desk.
  • 2. Implement phishing-resistant multi-factor authentication (MFA), isolate critical identity infrastructure, and avoid authentication loops.
  • 3. Centralize and monitor key logs, isolate backups from production Active Directory, and ensure they are inaccessible to a compromised administrator.



  • The cybersecurity landscape has been left reeling in recent days, as reports have surfaced of a sophisticated ransomware group known as Scattered Spider. This notorious cybercrime group, also referred to by its aliases 0ktapus, Muddled Libra, Octo Tempest, and UNC3944, has been targeting VMware ESXi hypervisors in attacks on various sectors across North America.

    According to an extensive analysis conducted by Google's Mandiant team, the Scattered Spider group has maintained a consistent attack strategy that relies heavily on social engineering tactics. Rather than relying on software exploits, this threat actor uses a proven playbook centered around phone calls to an IT help desk. The attackers are described as being aggressive, creative, and skilled at using social engineering to bypass even mature security programs.

    The Scattered Spider group's attacks are not opportunistic; they are instead precise and campaign-driven operations aimed directly at an organization's most critical systems and data. This approach has allowed them to gain initial access to victim environments, adopt a "living-off-the-land" (LotL) strategy by manipulating trusted administrative systems, and leveraging their control of Active Directory to pivot into the VMware vSphere environment.

    The group's tactics have been found to be highly effective, bypassing security tools and leaving few traces of compromise. The attack chain unfolds over five distinct phases:

    1. Initial compromise, reconnaissance, and privilege escalation: This phase involves harvesting information related to IT documentation, support guides, organization charts, and VMware administrators, as well as enumerating credentials from password managers like HashiCorp Vault or other Privileged Access Management (PAM) solutions.

    2. Pivoting into the virtual environment using mapped Active Directory credentials to gain access to VMware vCenter Server Appliance (vCSA): After gaining control of this key system, the attackers execute a "teleport" attack to create a persistent and encrypted reverse shell that bypasses firewall rules.

    3. Enabling SSH connections on ESXi hosts and resetting root passwords: This phase involves exploiting vulnerabilities in the operating system to gain access to sensitive data and systems.

    4. Executing a "disk-swap" attack to extract NTDS.dit Active Directory database: The group's tactics involve powering off a Domain Controller (DC) virtual machine, detaching its virtual disk, and attaching it to another unmonitored VM under their control. They then copy the NTDS.dit file before reversing the process and powering on the DC.

    5. Weaponizing access by deleting backup jobs, snapshots, and repositories: By inactivating these critical recovery systems, the attackers aim to inhibit any potential recovery efforts, increasing the chances of ransom demands being met successfully.

    6. Using SSH connections to push custom ransomware binary via SCP/SFTP: Finally, the group uses their established foothold to deploy their own custom ransomware payload, leveraging their access to sensitive data and systems for maximum leverage.

    The Scattered Spider group's activities have sparked concern among cybersecurity experts and organizations across North America. As the attack landscape continues to evolve, it is essential that companies prioritize robust security measures and stay vigilant against emerging threats.

    In light of these findings, Google advises organizations to follow three crucial layers of protection:

    1. Enable vSphere lockdown mode, enforce execInstalledOnly, use vSphere VM encryption, decommission old VMs, and harden the help desk.

    2. Implement phishing-resistant multi-factor authentication (MFA), isolate critical identity infrastructure, and avoid authentication loops.

    3. Centralize and monitor key logs, isolate backups from production Active Directory, and ensure they are inaccessible to a compromised administrator.

    Google also stresses the importance of re-architecting systems with security in mind when transitioning from VMware vSphere 7, as it approaches end-of-life (EoL) in October 2025. Ransomware aimed at vSphere infrastructure poses a uniquely severe risk due to its capacity for immediate and widespread infrastructure paralysis.

    Failure to implement these recommended mitigations will leave organizations exposed to targeted attacks that can swiftly cripple their entire virtualized infrastructure, resulting in operational disruption and financial loss.



    Related Information:
  • https://www.ethicalhackingnews.com/articles/Scattered-Spider-The-VMware-Targeting-Ransomware-Group-Leaving-a-Trail-of-Destruction-Across-North-America-ehn.shtml

  • https://thehackernews.com/2025/07/scattered-spider-hijacks-vmware-esxi-to.html


  • Published: Mon Jul 28 05:11:46 2025 by llama3.2 3B Q4_K_M













    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us