By Frank Abagnale, Abagnale and Associates, Associates
In September 2023, Scattered Spider attacked MGM and fundamentally changed the threat landscape. A single call to the IT Help Desk, coupled with social engineering, SIM Swap and identity impersonation opened the door to a ransomware attack.
Since then, this technique has been used against a multitude of high-profile brands including Cartier, M&S, Harrods, Adidas, Coop, Dior, Allianz, Victoria’s Secret, Tiffany, Qantas, The North Face, Aflac, and no doubt others that have not been made public.
This whitepaper aims to share the best practices of IT Help Desks that have successfully thwarted Scattered Spider and their attack methodology.
E-commerce retailers have been fending off cyberattacks for over 25 years and have subsequently developed strategies to efficiently manage high volumes of online orders:
This strategy, employing three levels of targeted defense, provides the most optimized operation without compromising on security.
When replicated by the IT Help Desk, it can provide the most secure operation with the least amount of costs and the fastest resolution of tickets.
This layered strategy lets machines do what they do best, and humans do what they do best, in harmony. As cyber-attacks are akin to fraud attacks in their occurrence rates, this strategy is fit for purpose in both cases.
The first layer is a self-service system that operates in real-time and is available to employees 24x7x365. This is where 100% of the journeys should begin, and it should resolve over 90% of requests, such as password or MFA resets, without a call to the IT Help Desk.
By offering this as the first step you achieve the following:
The second layer is an agent-assisted system that operates in real-time and is available to employees 24x7x365. This is where 10% of the journeys should funnel to, i.e., those that do not pass self-service. Tier 1 human agents will attempt to conduct an identity verification before making the requested changes and will strive for first-call resolution. This should resolve over 90% of second-layer transactions without an escalation to a Tier 2 supervisor.
By offering this as the second step you achieve the following:
The third layer is an agent-assisted system that operates in real-time and is available to employees 24x7x365. This is where 10% of the second-layer journeys should be funneled to, and it should resolve over 90% of these transactions.
By offering this as the lasts step you achieve the following:
You will note that this model never totals to 100% as there will always be cases that can’t be resolved via the IT Help Desk.
Why do the current defense lines falter?
Many IT Help Desks are using standard operating procedures (SOPs) and best practices that were established before GenAI took off. Thus, they may completely miss the detection of hackers categorically.
Some examples of current defense lines:
If you use an IDV that scans documents but does not consider GenAI deepfakes, you may accept a fake document as a result.
If you send an SMS OTP as part of your IDV or MFA, but it does not consider SIM Swapping, you may accept a verification that is not coming from your employee. The hacker gets the message, leaving the employee unaware, and your IT Help Desk is none the wiser.
If you ask for knowledge-based authentication (KBA), much of the data has already been breached, or is subject to phishing attacks and social engineering of your employees.
If you are using IP Geolocation, but it does not consider VPNs and Apple’s Private Relay, you may prevent a good employee from completing a journey, whether it is a self-service portal or a live call with an agent.
If you use methodologies that precede Man-In-The-Middle (MITM) attacks, or do not have a way for your employees to verify that it is your IT Help Desk calling them, you are exposed.
The three-layer defense model sets up your IT Help Desk for success, lowering risk and reducing cost. Nonetheless, you need to know what to do when the transactions are handled to avoid a false sense of security.
By studying the MOs (modus operandi) of Scattered Spider, you can match your defense to their tactics. The essential reason they have been so successful to date is that they avoid detection during the call. When they impersonate employees, they rely on a combination of failures to sail through without notice.
If, for example, your current security process begins with an SMS based MFA check of the caller, this is futile if the phone number has recently been SIM-Swapped. Scattered Spider starts their attack ahead of calling the IT Help Desk. Once they learn that your security process relies on SMS, they will first target the telco, or as they are known in the industry, MNO (Mobile Network Operators), and persuade them to transfer control of the target's number – a SIM Swap attack Therefore if you do not apply a SIM Swap check before sending any SMS then you’re wide open to that attack vector.
Additionally, if you rely on traditional ID&V processes that scan a government-issued ID as part of your account recovery process, you must protect yourself with a technology that is immune to GenAI deepfakes. With the advent of GenAI it is easy for scammers to produce both static and live videos, showing convincing “employees” holding up their “ID”.
For reference:
By observing the known attack vectors and tools that cybergangs like Scattered Spider employ, you can deploy countermeasures such as:
Cybergangs like Scattered Spider, The Com, and Blackcat are now utilizing a combination of technologies and a significant level of sophistication to infiltrate your network via your IT Help Desk. To protect your enterprise from these attacks, you should mirror the threelayer strategy developed by e-commerce retailers over the last 25 years. As the threat landscape evolves constantly, now is the time to assess your capabilities against new threats and deploy countermeasures accordingly.