Register for the webinar
Register here
Register to watch on-demand
Thank you for registering!
We've received your request and will get back to you soon.

If you do not hear from us in the next 48 hours, please check your spam folder!
Back to homepage
Vectra AI Attack Labs

Threat Briefing: Scattered Spider Attacks

Join us for an in-depth briefing and exploration of one of today's most menacing cyber threats: Scattered Spider.

45 minutes
May 2, 2024
11:00AM ET | 5:00PM CET
Webinar
Vectra AI Attack Labs
On-demand Webinar

Threat Briefing: Scattered Spider Attacks

Join us for an in-depth briefing and exploration of one of today's most menacing cyber threats: Scattered Spider.

45 minutes
May 2, 2024
11:00AM ET | 5:00PM CET
Vectra AI Attack Labs

Threat Briefing: Scattered Spider Attacks

Join us for an in-depth briefing and exploration of one of today's most menacing cyber threats: Scattered Spider.

45 minutes
May 2, 2024
11:00AM ET | 5:00PM CET

Threat Briefing: Scattered Spider Attacks

Join us for an in-depth briefing and exploration of one of today's most menacing cyber threats: Scattered Spider.

45 minutes
May 2, 2024
11:00AM ET | 5:00PM CET

Threat Briefing: Scattered Spider Attacks

Join us for an in-depth briefing and exploration of one of today's most menacing cyber threats: Scattered Spider.

45 minutes
May 2, 2024
11:00AM ET | 5:00PM CET

Threat Briefing: Scattered Spider Attacks

Join us for an in-depth briefing and exploration of one of today's most menacing cyber threats: Scattered Spider.

45 minutes
May 2, 2024
11:00AM ET | 5:00PM CET
Register for a free webinar
Register for a free on-demand webinar
Thank you for registering!
We've received your request and will get back to you soon.

If you do not hear from us in the next 48 hours, please check your spam folder!
Back to homepage

Join us for an in-depth briefing and exploration of one of today's most menacing cyber threats: Scattered Spider. This elusive hacking group, also identified as Starfraud and UNC3944, excels in identity-focused attacks, infiltrating cloud environments with remarkable ease. Partnered with ALPHV Blackcat, they employ ransomware tactics combining denial of service with extortion, presenting a formidable challenge to cybersecurity teams worldwide.

During this briefing, our experts will take you through our research and expertise on this threat group, including:

  • Tactics and Techniques: Exploring the playbook of Scattered Spider, from identity exploitation to living-off-the-land attacks.
  • Ransomware as a Business Model: Analyzing the ransomware tactics employed by Scattered Spider, including denial of service and data extortion.
  • Defensive Measures: Strategies and tools to effectively defend against Scattered Spider and similar threats in the evolving hybrid attack landscape.
Share

Summary

Join us for an in-depth briefing and exploration of one of today's most menacing cyber threats: Scattered Spider. This elusive hacking group, also identified as Starfraud and UNC3944, excels in identity-focused attacks, infiltrating cloud environments with remarkable ease. Partnered with ALPHV Blackcat, they employ ransomware tactics combining denial of service with extortion, presenting a formidable challenge to cybersecurity teams worldwide.

During this briefing, our experts will take you through our research and expertise on this threat group, including:

  • Tactics and Techniques: Exploring the playbook of Scattered Spider, from identity exploitation to living-off-the-land attacks.
  • Ransomware as a Business Model: Analyzing the ransomware tactics employed by Scattered Spider, including denial of service and data extortion.
  • Defensive Measures: Strategies and tools to effectively defend against Scattered Spider and similar threats in the evolving hybrid attack landscape.
Share

Your Hybrid Attack Expert

Your Hybrid Attack Expert

Your Hybrid Attack Expert

Your Hybrid Attack Expert

Your Hybrid Attack Expert

Your Hybrid Attack Expert

David Brooks
Host
Cloud Security Architect

Vectra AI is the leader in Security AI-driven hybrid cloud threat detection and response. Only Vectra platform and services cover public cloud, SaaS applications, identity systems and network infrastructure – both on-premises and cloud-based. Organizations worldwide rely on the Vectra platform and services for resilience to ransomware, supply chain compromise, identity takeovers, and other cyberattacks impacting their organization.

For more information, visit vectra.ai

Vectra AI is the leader in Security AI-driven hybrid cloud threat detection and response. Only Vectra platform and services cover public cloud, SaaS applications, identity systems and network infrastructure – both on-premises and cloud-based. Organizations worldwide rely on the Vectra platform and services for resilience to ransomware, supply chain compromise, identity takeovers, and other cyberattacks impacting their organization.

For more information, visit vectra.ai

FAQs

Who should join the hunt?

This competition is open to all threat hunters. This is a more advanced challenge, so experience with threat hunting and investigation will set you up for success!

How long does it take to complete? Do I need to finish it in one session?

The challenge will take approximately 10 hours to complete. You can log in at any time during the 4 weeks of the challenge and pick up right where you left off.

How does scoring work?

The objective is to collect as many points as possible. Points will accumulate on the Scoreboard.

This is a jeopardy-style format. The higher the points available – the harder the challenge. Some challenges unlock additional challenges to capture more points. Most challenges do offer hints, but hints will cost you points.

Can I invite others to join?

Yes! Invite your colleagues to join in on the fun. The challenge is open to threat hunters around the world and everyone has a chance to win.