#1 Middle East & Africa Trusted Cybersecurity News & Magazine |

39 C
Dubai
Friday, September 12, 2025
HomeTopics 4RansomwareMuddled Libra Rebounds: Cybercrime Group Now Faster, Farther-Reaching, and More Impactful in...

Muddled Libra Rebounds: Cybercrime Group Now Faster, Farther-Reaching, and More Impactful in 2025

Date:

Related stories

spot_imgspot_imgspot_imgspot_img

A reinvigorated Muddled Libra, also known as Scattered Spider and UNC3944, has reemerged with evolved tactics, broader reach, and accelerated operations across key sectors worldwide in 2025. Following a string of arrests in late 2024, Unit 42 reports show the threat group is now more destructive and efficient than ever, targeting government, retail, insurance, and aviation entities.

Muddled Libra resumed operations post-November 2024 after federal indictments of five members. Since early 2025, the group has upgraded its social engineering tactics and leaned into ransomware-as-a-service (RaaS) alliances. Partnering with DragonForce, a RaaS program operated by Slippery Scorpius, they’ve encrypted victims’ systems and extorted payments.

Tactical Shifts in Social Engineering

The group has largely moved from phishing to vishing (T1566.004). Over 70% of contact attempts in 2025 leveraged Google Voice as their VoIP method. Help desks are a frequent target, with attackers impersonating users to manipulate support staff into resetting credentials and MFA setups.

They also use pretexts like system issues or lost devices to persuade victims to download remote management software. Once inside, the attackers move quickly, exploiting existing IT tools and even endpoint security platforms.

Speed: From Access to Domain Admin in 40 Minutes

According to Unit 42’s 2025 Global Incident Response Report, attackers gained full domain admin rights within 40 minutes after initial helpdesk social engineering in one case. Average containment time was 1 day, 8 hours, 43 minutes.

Sector Targeting Timeline (Jan-July 2025)

  • Jan-Mar: Government
  • Apr-Jul: Retail, Insurance, Aviation

Attackers don’t strictly sequence these campaigns and have demonstrated parallel sectoral targeting, increasing unpredictability.

Credential and Lateral Movement Techniques

  • Credential Dumping: NTDS.dit dumps to gain full AD credentials (T1003.003, T1555.005)
  • Reconnaissance: Microsoft 365 and SharePoint usage (T1114.002, T1213.002)
  • Persistence: Remote monitoring tools and cloud management platforms
  • Exfiltration: Cloud-based transfer (T1567.002)

MFA Bypass and Conditional Access Failures

Muddled Libra’s effectiveness is tied to misconfigured or absent Conditional Access Policies (CAPs). When implemented correctly (e.g., geo-blocking, on-prem requirements), CAPs drastically slow intrusions.

Expert Commentary

“Muddled Libra’s preference for living-off-the-land techniques and minimal malware use makes them uniquely difficult to detect,” said Jen Miller-Osborn, Deputy Director of Threat Intelligence at Unit 42.

“Organizations that rely solely on endpoint detection without rigorous identity access control are now high-risk targets,” noted Ryan Olson, VP of Threat Intelligence at Palo Alto Networks.

Actionable Takeaways for Defenders

  1. Implement robust CAPs using Microsoft Entra ID: geo-blocking, device management, and on-prem MFA setups.
  2. Harden helpdesk operations with strict identity verification protocols and vishing-awareness training.
  3. Deploy DNS and URL filtering to detect and disrupt command-and-control (C2) infrastructure.
  4. Monitor usage of remote admin tools (e.g., AnyDesk, TeamViewer) and restrict unless explicitly needed.
  5. Log and audit identity management events, especially password resets and MFA changes.
  6. Secure Microsoft 365 and SharePoint instances with anomaly-based monitoring.
  7. Run red-team simulations focused on social engineering and identity compromise.
  8. Segment cloud access and virtual infrastructure to contain intrusions.
  9. Adopt a zero-trust architecture that limits lateral movement.
  10. Engage in public-private threat intel sharing to spot early indicators of compromise (IOCs).

Conclusion

Muddled Libra has returned with sharper tactics and broader ambitions in 2025. Their evolution underscores the growing sophistication of socially engineered attacks. As this group continues to exploit identity gaps and bypass traditional defenses, organizations must pivot from reactive defenses to proactive, policy-driven security models. A coordinated defense across sectors-powered by threat intelligence and robust access control-remains the most effective deterrent.

Sources

For more cybersecurity news, alerts, and best practices, visit CyberCory. To strengthen your security, training, or pentesting capabilities, explore services from SaintyNet.

Ouaissou DEMBELE
Ouaissou DEMBELEhttp://cybercory.com
Ouaissou DEMBELE is a seasoned cybersecurity expert with over 12 years of experience, specializing in purple teaming, governance, risk management, and compliance (GRC). He currently serves as Co-founder & Group CEO of Sainttly Group, a UAE-based conglomerate comprising Saintynet Cybersecurity, Cybercory.com, and CISO Paradise. At Saintynet, where he also acts as General Manager, Ouaissou leads the company’s cybersecurity vision—developing long-term strategies, ensuring regulatory compliance, and guiding clients in identifying and mitigating evolving threats. As CEO, his mission is to empower organizations with resilient, future-ready cybersecurity frameworks while driving innovation, trust, and strategic value across Sainttly Group’s divisions. Before founding Saintynet, Ouaissou held various consulting roles across the MEA region, collaborating with global organizations on security architecture, operations, and compliance programs. He is also an experienced speaker and trainer, frequently sharing his insights at industry conferences and professional events. Ouaissou holds and teaches multiple certifications, including CCNP Security, CEH, CISSP, CISM, CCSP, Security+, ITILv4, PMP, and ISO 27001, in addition to a Master’s Diploma in Network Security (2013). Through his deep expertise and leadership, Ouaissou plays a pivotal role at Cybercory.com as Editor-in-Chief, and remains a trusted advisor to organizations seeking to elevate their cybersecurity posture and resilience in an increasingly complex threat landscape.

Subscribe

- Never miss a story with notifications

- Gain full access to our premium content

- Browse free from up to 5 devices at once

Latest stories

spot_imgspot_imgspot_imgspot_img

LEAVE A REPLY

Please enter your comment!
Please enter your name here