EHA
Home Cyber Attack Scattered Spider Malware Attacks Klaviyo, HubSpot, and Pure Storage Services

Scattered Spider Malware Attacks Klaviyo, HubSpot, and Pure Storage Services

0

Cybersecurity researchers at Silent Push have confirmed that the notorious Scattered Spider threat group continues to refine its attack methodologies, actively targeting major SaaS providers through 2025.

Notably, recent campaigns have aimed at Klaviyo, HubSpot, and Pure Storage-three widely adopted platforms in marketing automation and cloud storage-demonstrating the group’s ongoing focus on organizations critical to enterprise operations.

Evolving Threat Tactics and High-Profile Corporate

Scattered Spider, classified as UNC3944 and operating since at least 2022, has built a reputation for deploying advanced social engineering, phishing kits, and custom malware to breach corporate defenses.

Morningstar-okta[.]com

The collective is known for its agility: Silent Push has tracked at least five unique phishing kits attributed to the actor, some with frequent code updates, and observed a marked migration away from legacy tooling toward sophisticated new methods.

In early 2025, Scattered Spider began leveraging dynamic DNS services and “publicly rentable” subdomains, as in the case of klv1[.]it[.]com-a domain used to impersonate Klaviyo’s SMS link shortener, complicating detection for security teams relying on basic regex-based brand monitoring.

Recent investigations have also uncovered a new version of the Spectre RAT (Remote Access Trojan) deployed by Scattered Spider.

The RAT, compiled for both 32- and 64-bit platforms, has expanded capabilities including enhanced system reconnaissance, persistent access, and a revamped, modular command set.

Analysis reveals the malware’s use of obfuscated strings, XOR-based encoding, and a unique mutex-based persistence mechanism, coupled with a fallback communication protocol that utilizes a hardcoded decoy C2 server to bootstrap additional dynamic endpoints.

These capabilities illustrate the group’s rapid adoption of modern malware development practices, further complicating incident response and forensic attribution.

Silent Push Analysts

The infrastructure supporting these operations shows a distinct shift: after previously relying on hosting and domain providers like Porkbun, Namecheap, and DigitalOcean, Scattered Spider has adopted privacy-centric registrars such as NiceNIC and niche hosting services including Virtuo, Njalla, and Cloudflare.

The adversary’s preference for ephemeral infrastructure-short-lived domains and immediate SSL certification-remains unchanged, but the addition of dynamic DNS presents new tracking and mitigation challenges.

According to the Report, Silent Push analysts highlight that the threat isn’t limited to direct impersonation of high-profile enterprises.

VirusTotal results

Scattered Spider’s brand mimicry spans well beyond client organizations, encompassing software vendors and service providers integrated with target networks.

In 2025 attacks, brands like Audemars Piguet, Credit Karma, Twitter/X, T-Mobile, Nike, and News Corporation were referenced, often via cleverly obfuscated or indirect domain names not easily caught by simple monitoring strategies.

Malware delivery has also shifted, with clusters of domains posing as CDN or support resources to facilitate payload drops, a tactic seen in the May 2024 campaign involving domains such as bestbuy-cdn[.]com and gucci-cdn[.]com.

Open directories and public file shares were used to distribute Spectre RAT variants, further complicating efforts by defenders to maintain visibility and control over inbound threats.

Despite several arrests of Scattered Spider members-including the alleged leader in mid-2024 and multiple co-conspirators later that year-the collective has demonstrated resilience, quickly adapting to disruptions with new tooling and infrastructure.

With ongoing development of their phishing kits and RAT malware, and a focus on dynamic and evasive hosting, Scattered Spider remains a significant risk to organizations in financial, telecommunications, and cloud technology sectors.

Indicators of Compromise (IOCs)

Domain / IOCTarget/Use CaseHosting/RegistrarLast Seen
klv1[.]it[.]comKlaviyo impersonationit.com (Dynamic DNS)Feb 2025
corp-hubspot[.]comHubSpot phishingNiceNIC2025
pure-okta[.]comPure Storage phishingNiceNIC2025
twitter-okta[.]comTwitter/X phishingNiceNICOct 2024
bestbuy-cdn[.]comMalware deliveryNiceNICMay 2024
freshworks-hr[.]comHR SaaS phishingHosting Concepts2024
okta-ziffdavis[.]comOkta SSO phishingPorkbun2024
sso-instacart[.]comInstacart phishingNiceNIC2025
sts-vodafone[.]comVodafone phishingNiceNIC2025
gemini-sso[.]comFinance SSO phishingHosting Concepts2023-2025
login.freshworks-hr[.]comLogin phishingHosting Concepts2024
simpletexting-cdn[.]comMalware CDN deliveryNiceNICMay 2024

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant updates

NO COMMENTS

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Exit mobile version