Understanding the Threat
Imagine that you’re an IT leader at a major retail company. Your systems are humming along smoothly, customers are happy, and then, seemingly out of nowhere, chaos strikes. Critical systems go down, customer data is exposed, and your brand’s reputation is on the line. The culprit? A sophisticated threat actor known as Scattered Spider – one of the most aggressive and adaptable cybercrime groups in recent history.
In 2025, Scattered Spider has ramped up its tactics, techniques, and procedures (TTPs), hitting major names like Marks & Spencer, Co-op, and Harrods in the UK. They’ve also targeted MGM Resorts, Caesars, and Transport for London in the past, making them a serious threat to both large enterprises and critical infrastructure.
In this article, you’ll learn about:
- How Scattered Spider’s TTPs have evolved in 2025
- The cutting-edge phishing kits they’re using
- Effective strategies for countering their methods
- How Push can help detect and respond to these sophisticated attacks
Let’s dive into the heart of this evolving threat.
1. Scattered Spider’s Evolving TTPs in 2025

Scattered Spider has always been known for their identity-based attacks, favouring techniques like account takeover through stolen credentials, phishing, and sophisticated social engineering. However, in 2025, they’ve stepped up their game, using MFA-bypassing AiTM (Adversary-in-the-Middle) phishing kits that make traditional defences look outdated.
Key TTP changes in 2025 include:
- Advanced MFA(Multi Factor Authentication) Bypass: Leveraging AiTM phishing kits to capture authentication tokens in real time, bypassing even hardened MFA solutions.
- Detection Evasion: Using techniques like token theft, credential stuffing, and real-time proxy phishing to slip past traditional defences.
- Cloud and On-Premise Pivots: Quickly moving from compromised identity infrastructure to core server environments for maximum impact.
2. Inside Scattered Spider’s Phishing Kits

The backbone of Scattered Spider’s recent success lies in their highly refined phishing kits. These kits are designed to trick even the most cautious employees by mirroring legitimate login pages and capturing authentication tokens on the fly.
These kits often include:
- Real-time Token Theft: Capturing authentication tokens before they reach the real service, enabling attackers to bypass MFA.
- Sophisticated Social Engineering: Leveraging help desk scams and deepfake voice technology to trick users into sharing credentials.
- Automation and Scalability: Automating large-scale attacks to maximise reach and effectiveness.
3. How to Counteract Scattered Spider’s Identity-based Methods

Defending against a group like Scattered Spider requires a layered approach, combining advanced detection, robust identity management, and employee awareness. Here are some critical steps:
- Strengthen MFA: Use phishing-resistant MFA like FIDO2/WebAuthn or passkeys, which are immune to AiTM attacks.
- Real-time Monitoring: Deploy continuous behavioural monitoring to detect unusual account activity.
- Zero Trust Architecture: Implement strict access controls, even within your internal networks.
- Employee Training: Regularly educate employees about modern phishing tactics and social engineering tricks.
4. How Push Detects and Responds to These Threats

Push has developed advanced detection and response capabilities specifically designed to counter groups like Scattered Spider. Using real-time analysis, behavioural detection, and AI-driven anomaly identification, Push can quickly detect and neutralise attacks before they escalate.
Key Push capabilities include:
- Real-time Phishing Detection: Identifying and blocking AiTM phishing attempts before they reach critical systems.
- Adaptive Authentication: Dynamically adjusting authentication requirements based on user risk profiles.
- Incident Response Automation: Rapidly isolating compromised accounts and blocking malicious access.
Conclusion: Staying Ahead of Scattered Spider

Scattered Spider has proven to be a formidable adversary, constantly adapting to overcome the latest defences. As Scattered Spider continues to evolve, so must our defences. Technology alone can’t outsmart a determined adversary. The most effective defence is a combination of cutting-edge tools, continuous learning, and highly skilled cybersecurity professionals who can think like attackers and respond in real time.
Cybersecurity is no longer just about firewalls and passwords. It’s about anticipating the next move, understanding the mindset of threat actors like Scattered Spider, and building resilient systems that can withstand even the most sophisticated attacks.
“In the battle against digital deception, knowledge is your strongest defence.”
If you’re passionate about cybersecurity, now is your time – the battle against threats like Scattered Spider needs sharp minds and bold defenders. Visit Digived Academy to learn more about our Cybersecurity Training programs and start your journey as cybersecurity professional today.
Contact Us
For more information about our courses, schedules, and enrolment process, visit our website or contact us at.
Website: www.digived.academy
Email: admission@digived.academy
Phone: +91-9019299971