#1 Middle East & Africa Trusted Cybersecurity News & Magazine |

32 C
Dubai
Wednesday, July 2, 2025
HomeTopics 4Password SecurityALERT: FBI Warns Scattered Spider Is Now Targeting Airlines with Social Engineering...

ALERT: FBI Warns Scattered Spider Is Now Targeting Airlines with Social Engineering Attacks

Date:

Related stories

Google Urgently Patches CVE‑2025‑6554 Zero‑Day in Chrome 138 Stable Update

On 26 June 2025, Google rapidly deployed a Stable Channel update...

French Police Arrest Five Key Operators Behind BreachForums Data-Theft Platform

On 25 June 2025, France’s specialist cybercrime unit (BL2C) detained five...

Cybercriminals Weaponized Open-Source Tools in Sustained Campaign Against Africa’s Financial Sector

Since mid-2023, a cybercriminal cluster dubbed CL‑CRI‑1014 has been...

Critical TeamViewer Remote Management Flaw Allows SYSTEM‑Level File Deletion

A high‑severity vulnerability, CVE‑2025‑36537, has been identified in TeamViewer...
spot_imgspot_imgspot_imgspot_img

What happened, why it matters, why now:
The FBI has issued a rare airline-sector alert after observing the cybercriminal group Scattered Spider pivoting to target airlines and aviation vendors through sophisticated social engineering techniques and MFA bypass.

With disruptions already reported at Hawaiian Airlines and WestJet, this expansion signals growing threats to critical infrastructure immediately elevating urgency across the airline ecosystem, according to FBI.
Why now? Because attackers are weaponizing trust with help desk personnel to bypass traditional security controls just as air travel rebounds globally.

Scattered Spider’s New Aviation Focus

Timeline & Incident Overview

  • June 2025: The FBI notices Scattered Spider targeting airline systems via deceptive social-engineering attacks—impersonating employees or contractors to exploit help desks and install unauthorized MFA devices.
  • Also in June: Hawaiian Airlines discloses a cybersecurity incident affecting internal IT systems, likely linked to the group.
  • June 12, 2025: Canada’s second-largest airline, WestJet, confined access to internal services—later attributed by BleepingComputer to Scattered Spider via MFA bypass and password resets.
  • June 27, 2025: Mandiant’s Charles Carmakal and Palo Alto Unit 42’s Sam Rubin publicly confirm Scattered Spider’s activity in aviation.

FBI & Cybersecurity Firms Sound the Alarm

  • The FBI urges kinetic cooperation: “actively working with aviation and industry partners… share intelligence… prevent further compromise” .
  • Mandiant advises strengthening help desk identity verification prior to adding new phone numbers or MFA devices.

Technical Breakdown

Social Engineering & MFA Bypass TTPs

Scattered Spider’s attack sequence (aligned with FBI/CISA CSA):

  1. Impersonation of IT/help desk personnel via calls or SMS phishing (T1566, T1598).
  2. MFA fatigue or unauthorized MFA device registration to bypass 2FA protections (T1621, T1556.006).
  3. Self-service password resets via help desk manipulation (T1606.002, T1078.002).
  4. Use of legitimate remote tools (AnyDesk, Ngrok, Fleetdeck, etc.) for lateral movement (T1219, T1211).
  5. Data theft, extortion, ransomware using stolen access via double-extortion schemes.

MEA & Global Implications

Middle East & Africa

  • Airlines and vendors based in Dubai, Doha, Lagos, Nairobi, and Johannesburg could be targeted, especially those using outsourced IT helpdesk support.
  • Regional regulators (e.g., UAE NESA, SAFACOM, Kenya DP‑Act) may consider issuing targeted advisories.
  • Insurance-linked aviation services across MEA remain at elevated risk due to shared vendor infrastructures.

Global Comparison

  • Scattered Spider previously disrupted MGM, Caesars, MailChimp, Twilio, and UK retailers.
  • Now shifting focus to critical infrastructure, this escalates the threat landscape from commercial to national-level security.

Expert Commentary

“Organizations should be on high alert for sophisticated and targeted social engineering attacks and suspicious MFA reset requests,” warned Sam Rubin, SVP at Palo Alto Unit 42 (bleepingcomputer.com).

“These actors rely on social engineering… impersonating employees or contractors to deceive IT help desks… frequently bypassing multi‑factor authentication,” according to the FBI (thehackernews.com).

Technical Summary: MITRE TTPs Box

Initial Access:
  • T1566 – Phishing/Social Engineering
  • T1598 – Phishing via Service Desk
Execution:
  • T1556.006 – MFA Enrollment
Persistence:
  • T1606 – Account Manipulation
Privilege Escalation:
  • T1078.002 – Hijacking Service Accounts
Lateral Movement:
  • T1219 – Remote Remote Access Tools (AnyDesk, Ngrok)
Impact:
  • T1486 – Ransomware / Data Encryption
  • T1490 – Data Destruction

Actionable Takeaways

  1. Harden help desk workflows – Require secondary verification before phone/MFA changes.
  2. Enforce phishing-resistant MFA – Use FIDO2, hardware tokens.
  3. Monitor MFA logs – Alert on unexplained device enrollments.
  4. Restrict self-service password resets – Use strict identity proofing.
  5. Lock down remote-access tools – Whitelist only approved software.
  6. Segment networks – Isolate help desks from critical systems.
  7. Employee training – Raise awareness of social-engineering methods.
  8. Deploy identity‑centric monitoring – Log admin-level identity events in SIEM.

Conclusion

The FBI’s alert on Scattered Spider targeting the airline sector underscores the shift from opportunistic financial crimes to critical infrastructure threats. With airlines in MEA and beyond now on the radar, CISOs and SOC teams must tighten identity workflows and enhance help‑desk security. Staying ahead means less focus on endpoint tools and more on human‑centric defenses—because attackers already are.

Sources

For ongoing cybersecurity news, alerts, and best practices, follow CyberCory.

Ouaissou DEMBELE
Ouaissou DEMBELEhttp://cybercory.com
Ouaissou DEMBELE is a seasoned cybersecurity expert with over 12 years of experience, specializing in purple teaming, governance, risk management, and compliance (GRC). He currently serves as Co-founder & Group CEO of Sainttly Group, a UAE-based conglomerate comprising Saintynet Cybersecurity, Cybercory.com, and CISO Paradise. At Saintynet, where he also acts as General Manager, Ouaissou leads the company’s cybersecurity vision—developing long-term strategies, ensuring regulatory compliance, and guiding clients in identifying and mitigating evolving threats. As CEO, his mission is to empower organizations with resilient, future-ready cybersecurity frameworks while driving innovation, trust, and strategic value across Sainttly Group’s divisions. Before founding Saintynet, Ouaissou held various consulting roles across the MEA region, collaborating with global organizations on security architecture, operations, and compliance programs. He is also an experienced speaker and trainer, frequently sharing his insights at industry conferences and professional events. Ouaissou holds and teaches multiple certifications, including CCNP Security, CEH, CISSP, CISM, CCSP, Security+, ITILv4, PMP, and ISO 27001, in addition to a Master’s Diploma in Network Security (2013). Through his deep expertise and leadership, Ouaissou plays a pivotal role at Cybercory.com as Editor-in-Chief, and remains a trusted advisor to organizations seeking to elevate their cybersecurity posture and resilience in an increasingly complex threat landscape.

Subscribe

- Never miss a story with notifications

- Gain full access to our premium content

- Browse free from up to 5 devices at once

Latest stories

spot_imgspot_imgspot_imgspot_img

LEAVE A REPLY

Please enter your comment!
Please enter your name here