Cyber Gang UNC3944’s Sinister Shift: SaaS Apps Now Under Siege

UNC3944 has shifted tactics to target SaaS applications like Salesforce and Azure. Known for credential harvesting and SIM swapping, this cyber gang now focuses on data theft extortion. Their social engineering tactics include impersonating help desk calls to reset multi-factor authentication and access sensitive information.…

Hot Take:

UNC3944 is like the Swiss Army knife of cybercriminals, constantly changing its tools and tactics to stay one step ahead. Just when you think you’ve figured them out, they pull another trick out of their black hat. SaaS applications, beware: you’re next on their hit list!

Key Points:

  • UNC3944, also known as 0ktapus, Octo Tempest, Scatter Swine, and Scattered Spider, shifts focus to targeting SaaS applications.
  • Group employs social engineering tactics, including convincing help desks to reset MFA, to gain access.
  • Threat actors use fearmongering tactics, like doxxing and threats of physical harm, when social engineering fails.
  • Attackers exploit tools like VPNs, remote desktops, and SSO to gain persistent access to victim networks.
  • Mandiant recommends robust logging and heightened monitoring of SaaS applications to detect potential compromises.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here