{"id":115398,"date":"2025-08-28T10:00:29","date_gmt":"2025-08-28T03:00:29","guid":{"rendered":"https:\/\/wp.eastgate-software.com\/?p=115398"},"modified":"2026-04-01T15:22:34","modified_gmt":"2026-04-01T08:22:34","slug":"scattered-spider-cybercrime-groups-target-enterprises","status":"publish","type":"post","link":"https:\/\/wp.eastgate-software.com\/de\/scattered-spider-cybercrime-groups-target-enterprises\/","title":{"rendered":"Verstreute Spider-Cyberkriminalit\u00e4tsgruppen zielen auf Unternehmen ab"},"content":{"rendered":"<p><span data-contrast=\"auto\">Eine neue Klasse von Cyberangreifern, die zusammenfassend als <\/span><i><span data-contrast=\"auto\">Verstreute Spinne<\/span><\/i><span data-contrast=\"auto\">, Diese Gruppen ver\u00e4ndern die Unternehmenssicherheit, indem sie die menschliche Psychologie anstelle traditioneller technischer Schwachstellen ausnutzen. Zu ihnen geh\u00f6ren UNC3944, Oktapus und Muddled Libra. Sie z\u00e4hlen zu den raffiniertesten und gef\u00e4hrlichsten Akteuren, die weltweit Organisationen ins Visier nehmen.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Im Gegensatz zu herk\u00f6mmlichen, durch Malware ausgel\u00f6sten Kampagnen setzt Scattered Spider auf fortgeschrittene Social-Engineering-Taktiken. Dazu geh\u00f6ren: <\/span><b><span data-contrast=\"auto\">Sprach-Phishing (Vishing), SMS-Phishing (Smishing) und KI-gest\u00fctzte Identit\u00e4tsdiebstahltechniken<\/span><\/b><span data-contrast=\"auto\">. Indem sie sich \u00fcberzeugend als Mitarbeiter oder vertrauensw\u00fcrdige Partner ausgeben, manipulieren Angreifer IT-Helpdesks. Sie nutzen zudem vertrauensbasierte Arbeitsabl\u00e4ufe aus. Dies hilft ihnen, die Multi-Faktor-Authentifizierung (MFA) durch SIM-Karten-Tausch und betr\u00fcgerische Reset-Anfragen zu umgehen.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Sobald die Gruppen Zugang erhalten haben, nutzen sie diesen. <\/span><b><span data-contrast=\"auto\">\u201cTaktiken des \u201dLebens von dem, was das Land bietet\u201c<\/span><\/b><span data-contrast=\"auto\">. Sie nutzen legitime Verwaltungstools wie PowerShell, PsExec, AnyDesk und Tools zum Sammeln von Anmeldeinformationen wie Mimikatz. Dieser minimale Malware-Ansatz erm\u00f6glicht es ihnen, von herk\u00f6mmlichen, signaturbasierten Abwehrmechanismen unentdeckt zu bleiben. Dar\u00fcber hinaus erlaubt er ihnen, dauerhaften Zugriff zu erlangen.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Zu den wichtigsten Risiken geh\u00f6ren:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Angriffsvektoren, die den Menschen in den Mittelpunkt stellen<\/span><\/b><span data-contrast=\"auto\">Ausnutzung des Vertrauens der Mitarbeiter und organisatorischer Prozesse.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"2\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">KI-gest\u00fctzte T\u00e4uschung<\/span><\/b><span data-contrast=\"auto\">: Stimmklonierung und hochgradig personalisierte Phishing-Kampagnen.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"3\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">MFA-Umgehung und SIM-Karten-Tausch<\/span><\/b><span data-contrast=\"auto\">: Untergrabung von Systemen zur Identit\u00e4tspr\u00fcfung.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"4\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Stealth-Persistenz<\/span><\/b><span data-contrast=\"auto\">: Verwendung legitimer Fernzugriffstools und Auslesen von Anmeldeinformationen.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">Die Luftfahrtbranche ger\u00e4t zunehmend ins Visier von Cyberkriminellen, doch Analysten warnen, dass keine Branche immun ist. Zu den Anzeichen f\u00fcr eine Kompromittierung z\u00e4hlen ungew\u00f6hnliche Fernzugriffsaktivit\u00e4ten, wiederholte Anfragen zur Zur\u00fccksetzung der Multi-Faktor-Authentifizierung, Warnungen vor SIM-Karten-Tausch und unautorisierte administrative Aktionen an Sicherheitskonsolen.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Experten empfehlen eine <\/span><b><span data-contrast=\"auto\">mehrschichtige Verteidigungsstrategie<\/span><\/b><span data-contrast=\"auto\"> Durch die Kombination von fortschrittlicher E-Mail- und Endpunktsicherheit, Verhaltensanalysen und kontinuierlichen Schulungen zur Sensibilisierung der Mitarbeiter zeigt sich: Wie Scattered Spider beweist, sind Menschen \u2013 nicht Maschinen \u2013 heute der wichtigste Schutzwall in der Cybersicherheit.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Diese Entwicklung verdeutlicht einen umfassenderen Wandel: <\/span><b><span data-contrast=\"auto\">Die Cyberabwehr muss \u00fcber technische Schutzma\u00dfnahmen hinausgehen und Schwachstellen in den Bereichen Identit\u00e4t, Vertrauen und Verhalten angehen.<\/span><\/b><span data-contrast=\"auto\"> um den zunehmend auf den Menschen ausgerichteten Cyberbedrohungen entgegenzuwirken.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Quelle:<\/span><\/b><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/www.techradar.com\/pro\/enterprise-security-faces-new-challenge-as-attackers-master-art-of-digital-impersonation\"><span data-contrast=\"none\">https:\/\/www.techradar.com\/pro\/enterprise-security-faces-new-challenge-as-attackers-master-art-of-digital-impersonation<\/span><\/a> <span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>A new class of cyber adversaries, collectively known as Scattered Spider, is reshaping enterprise security by exploiting human psychology rather than traditional technical vulnerabilities. These groups\u2014including UNC3944, Oktapus, and Muddled Libra\u2014have emerged as some of the most sophisticated and dangerous actors targeting organizations worldwide.\u00a0 Unlike conventional malware-driven campaigns, Scattered Spider relies on advanced social engineering [&hellip;]<\/p>","protected":false},"author":238283293,"featured_media":115400,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","inline_featured_image":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1584],"tags":[1659,1538],"class_list":["post-115398","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-enthusiast","tag-cybercrime","tag-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.4 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Scattered Spider Cybercrime Groups Target Enterprises - Eastgate Software<\/title>\n<meta name=\"description\" content=\"Scattered Spider cybercrime groups exploit human psychology with phishing, MFA bypass, and stealth tactics, posing new risks to security.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Scattered Spider Cybercrime Groups Target Enterprises\" \/>\n<meta property=\"og:description\" content=\"Scattered Spider cybercrime groups exploit human psychology with phishing, MFA bypass, and stealth tactics, posing new risks to security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/wp.eastgate-software.com\/de\/scattered-spider-cybercrime-groups-target-enterprises\/\" \/>\n<meta property=\"og:site_name\" content=\"Eastgate Software\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/EastgateSoftware\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-08-28T03:00:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-01T08:22:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/wp.eastgate-software.com\/wp-content\/uploads\/2025\/08\/Sen-news-website-19.webp?fit=1366%2C768&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"1366\" \/>\n\t<meta property=\"og:image:height\" content=\"768\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"huongnguyen253\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@EastgateSoft\" \/>\n<meta name=\"twitter:site\" content=\"@EastgateSoft\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"huongnguyen253\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"2\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/scattered-spider-cybercrime-groups-target-enterprises\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/scattered-spider-cybercrime-groups-target-enterprises\\\/\"},\"author\":{\"name\":\"huongnguyen253\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#\\\/schema\\\/person\\\/01b8220b50bd555756a737527646a79a\"},\"headline\":\"Scattered Spider Cybercrime Groups Target Enterprises\",\"datePublished\":\"2025-08-28T03:00:29+00:00\",\"dateModified\":\"2026-04-01T08:22:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/scattered-spider-cybercrime-groups-target-enterprises\\\/\"},\"wordCount\":296,\"publisher\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/scattered-spider-cybercrime-groups-target-enterprises\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/wp.eastgate-software.com\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/Sen-news-website-19.webp?fit=1366%2C768&ssl=1\",\"keywords\":[\"Cybercrime\",\"cybersecurity\"],\"articleSection\":[\"Tech Enthusiast\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/scattered-spider-cybercrime-groups-target-enterprises\\\/\",\"url\":\"https:\\\/\\\/wp.eastgate-software.com\\\/scattered-spider-cybercrime-groups-target-enterprises\\\/\",\"name\":\"Scattered Spider Cybercrime Groups Target Enterprises - Eastgate Software\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/scattered-spider-cybercrime-groups-target-enterprises\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/scattered-spider-cybercrime-groups-target-enterprises\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/wp.eastgate-software.com\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/Sen-news-website-19.webp?fit=1366%2C768&ssl=1\",\"datePublished\":\"2025-08-28T03:00:29+00:00\",\"dateModified\":\"2026-04-01T08:22:34+00:00\",\"description\":\"Scattered Spider cybercrime groups exploit human psychology with phishing, MFA bypass, and stealth tactics, posing new risks to security.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/scattered-spider-cybercrime-groups-target-enterprises\\\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/wp.eastgate-software.com\\\/scattered-spider-cybercrime-groups-target-enterprises\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/scattered-spider-cybercrime-groups-target-enterprises\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/wp.eastgate-software.com\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/Sen-news-website-19.webp?fit=1366%2C768&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/wp.eastgate-software.com\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/Sen-news-website-19.webp?fit=1366%2C768&ssl=1\",\"width\":1366,\"height\":768,\"caption\":\"Scattered Spider Cybercrime Groups Target Enterprises\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/scattered-spider-cybercrime-groups-target-enterprises\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/wp.eastgate-software.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Scattered Spider Cybercrime Groups Target Enterprises\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#website\",\"url\":\"https:\\\/\\\/wp.eastgate-software.com\\\/\",\"name\":\"Eastgate Software\",\"description\":\"A Global Fortune 500 Company&#039;s Strategic Partner\",\"publisher\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/wp.eastgate-software.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#organization\",\"name\":\"Eastgate Software\",\"url\":\"https:\\\/\\\/wp.eastgate-software.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/wp.eastgate-software.com\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/logo.svg\",\"contentUrl\":\"https:\\\/\\\/wp.eastgate-software.com\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/logo.svg\",\"width\":124,\"height\":36,\"caption\":\"Eastgate Software\"},\"image\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/EastgateSoftware\\\/\",\"https:\\\/\\\/x.com\\\/EastgateSoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#\\\/schema\\\/person\\\/01b8220b50bd555756a737527646a79a\",\"name\":\"huongnguyen253\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/21ed2e1167cb8fc59108a43023c298cbe9c81ec2b240fc3b6f8bbf05134975b1?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/21ed2e1167cb8fc59108a43023c298cbe9c81ec2b240fc3b6f8bbf05134975b1?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/21ed2e1167cb8fc59108a43023c298cbe9c81ec2b240fc3b6f8bbf05134975b1?s=96&d=identicon&r=g\",\"caption\":\"huongnguyen253\"},\"url\":\"https:\\\/\\\/wp.eastgate-software.com\\\/de\\\/author\\\/huongnguyen253\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Scattered Spider Cybercrime Groups Target Enterprises - Eastgate Software","description":"Scattered Spider cybercrime groups exploit human psychology with phishing, MFA bypass, and stealth tactics, posing new risks to security.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"de_DE","og_type":"article","og_title":"Scattered Spider Cybercrime Groups Target Enterprises","og_description":"Scattered Spider cybercrime groups exploit human psychology with phishing, MFA bypass, and stealth tactics, posing new risks to security.","og_url":"https:\/\/wp.eastgate-software.com\/de\/scattered-spider-cybercrime-groups-target-enterprises\/","og_site_name":"Eastgate Software","article_publisher":"https:\/\/www.facebook.com\/EastgateSoftware\/","article_published_time":"2025-08-28T03:00:29+00:00","article_modified_time":"2026-04-01T08:22:34+00:00","og_image":[{"width":1366,"height":768,"url":"https:\/\/i0.wp.com\/wp.eastgate-software.com\/wp-content\/uploads\/2025\/08\/Sen-news-website-19.webp?fit=1366%2C768&ssl=1","type":"image\/webp"}],"author":"huongnguyen253","twitter_card":"summary_large_image","twitter_creator":"@EastgateSoft","twitter_site":"@EastgateSoft","twitter_misc":{"Verfasst von":"huongnguyen253","Gesch\u00e4tzte Lesezeit":"2\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/wp.eastgate-software.com\/scattered-spider-cybercrime-groups-target-enterprises\/#article","isPartOf":{"@id":"https:\/\/wp.eastgate-software.com\/scattered-spider-cybercrime-groups-target-enterprises\/"},"author":{"name":"huongnguyen253","@id":"https:\/\/wp.eastgate-software.com\/#\/schema\/person\/01b8220b50bd555756a737527646a79a"},"headline":"Scattered Spider Cybercrime Groups Target Enterprises","datePublished":"2025-08-28T03:00:29+00:00","dateModified":"2026-04-01T08:22:34+00:00","mainEntityOfPage":{"@id":"https:\/\/wp.eastgate-software.com\/scattered-spider-cybercrime-groups-target-enterprises\/"},"wordCount":296,"publisher":{"@id":"https:\/\/wp.eastgate-software.com\/#organization"},"image":{"@id":"https:\/\/wp.eastgate-software.com\/scattered-spider-cybercrime-groups-target-enterprises\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/wp.eastgate-software.com\/wp-content\/uploads\/2025\/08\/Sen-news-website-19.webp?fit=1366%2C768&ssl=1","keywords":["Cybercrime","cybersecurity"],"articleSection":["Tech Enthusiast"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/wp.eastgate-software.com\/scattered-spider-cybercrime-groups-target-enterprises\/","url":"https:\/\/wp.eastgate-software.com\/scattered-spider-cybercrime-groups-target-enterprises\/","name":"Scattered Spider Cybercrime Groups Target Enterprises - Eastgate Software","isPartOf":{"@id":"https:\/\/wp.eastgate-software.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/wp.eastgate-software.com\/scattered-spider-cybercrime-groups-target-enterprises\/#primaryimage"},"image":{"@id":"https:\/\/wp.eastgate-software.com\/scattered-spider-cybercrime-groups-target-enterprises\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/wp.eastgate-software.com\/wp-content\/uploads\/2025\/08\/Sen-news-website-19.webp?fit=1366%2C768&ssl=1","datePublished":"2025-08-28T03:00:29+00:00","dateModified":"2026-04-01T08:22:34+00:00","description":"Scattered Spider cybercrime groups exploit human psychology with phishing, MFA bypass, and stealth tactics, posing new risks to security.","breadcrumb":{"@id":"https:\/\/wp.eastgate-software.com\/scattered-spider-cybercrime-groups-target-enterprises\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/wp.eastgate-software.com\/scattered-spider-cybercrime-groups-target-enterprises\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/wp.eastgate-software.com\/scattered-spider-cybercrime-groups-target-enterprises\/#primaryimage","url":"https:\/\/i0.wp.com\/wp.eastgate-software.com\/wp-content\/uploads\/2025\/08\/Sen-news-website-19.webp?fit=1366%2C768&ssl=1","contentUrl":"https:\/\/i0.wp.com\/wp.eastgate-software.com\/wp-content\/uploads\/2025\/08\/Sen-news-website-19.webp?fit=1366%2C768&ssl=1","width":1366,"height":768,"caption":"Scattered Spider Cybercrime Groups Target Enterprises"},{"@type":"BreadcrumbList","@id":"https:\/\/wp.eastgate-software.com\/scattered-spider-cybercrime-groups-target-enterprises\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/wp.eastgate-software.com\/"},{"@type":"ListItem","position":2,"name":"Scattered Spider Cybercrime Groups Target Enterprises"}]},{"@type":"WebSite","@id":"https:\/\/wp.eastgate-software.com\/#website","url":"https:\/\/wp.eastgate-software.com\/","name":"Eastgate Software","description":"Strategischer Partner eines globalen Fortune-500-Unternehmens","publisher":{"@id":"https:\/\/wp.eastgate-software.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/wp.eastgate-software.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/wp.eastgate-software.com\/#organization","name":"Eastgate Software","url":"https:\/\/wp.eastgate-software.com\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/wp.eastgate-software.com\/#\/schema\/logo\/image\/","url":"https:\/\/wp.eastgate-software.com\/wp-content\/uploads\/2023\/09\/logo.svg","contentUrl":"https:\/\/wp.eastgate-software.com\/wp-content\/uploads\/2023\/09\/logo.svg","width":124,"height":36,"caption":"Eastgate Software"},"image":{"@id":"https:\/\/wp.eastgate-software.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/EastgateSoftware\/","https:\/\/x.com\/EastgateSoft"]},{"@type":"Person","@id":"https:\/\/wp.eastgate-software.com\/#\/schema\/person\/01b8220b50bd555756a737527646a79a","name":"huongnguyen253","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/secure.gravatar.com\/avatar\/21ed2e1167cb8fc59108a43023c298cbe9c81ec2b240fc3b6f8bbf05134975b1?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/21ed2e1167cb8fc59108a43023c298cbe9c81ec2b240fc3b6f8bbf05134975b1?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/21ed2e1167cb8fc59108a43023c298cbe9c81ec2b240fc3b6f8bbf05134975b1?s=96&d=identicon&r=g","caption":"huongnguyen253"},"url":"https:\/\/wp.eastgate-software.com\/de\/author\/huongnguyen253\/"}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/wp.eastgate-software.com\/wp-content\/uploads\/2025\/08\/Sen-news-website-19.webp?fit=1366%2C768&ssl=1","jetpack_shortlink":"https:\/\/wp.me\/pf8Ne8-u1g","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/wp.eastgate-software.com\/de\/wp-json\/wp\/v2\/posts\/115398","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wp.eastgate-software.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wp.eastgate-software.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wp.eastgate-software.com\/de\/wp-json\/wp\/v2\/users\/238283293"}],"replies":[{"embeddable":true,"href":"https:\/\/wp.eastgate-software.com\/de\/wp-json\/wp\/v2\/comments?post=115398"}],"version-history":[{"count":4,"href":"https:\/\/wp.eastgate-software.com\/de\/wp-json\/wp\/v2\/posts\/115398\/revisions"}],"predecessor-version":[{"id":119842,"href":"https:\/\/wp.eastgate-software.com\/de\/wp-json\/wp\/v2\/posts\/115398\/revisions\/119842"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wp.eastgate-software.com\/de\/wp-json\/wp\/v2\/media\/115400"}],"wp:attachment":[{"href":"https:\/\/wp.eastgate-software.com\/de\/wp-json\/wp\/v2\/media?parent=115398"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wp.eastgate-software.com\/de\/wp-json\/wp\/v2\/categories?post=115398"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wp.eastgate-software.com\/de\/wp-json\/wp\/v2\/tags?post=115398"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}