In this engaging discussion, Joe Hladik, the Head of Rubrik Zero Labs and a leading cybersecurity expert, reveals how the e-crime group Scattered Spider is reshaping the landscape of identity-based ransomware. He explores their tactics of double extortion and social engineering, which effectively bypass traditional defenses. Joe also highlights the vulnerabilities of legacy systems and the importance of cyber resilience, emphasizing recovery strategies that go beyond mere detection. Tune in for crucial insights on modern cybersecurity challenges!
12:13
forum Ask episode
web_stories AI Snips
view_agenda Chapters
auto_awesome Transcript
info_circle Episode notes
insights INSIGHT
Ransomware-as-a-Service Monetization
Scattered Spider operates as a financially motivated RaaS affiliate to monetize access and exploits.
They use double extortion by stealing data and threatening disclosure to force payment.
insights INSIGHT
Identity-Based Attacks Evade Signatures
Identity compromise plus social engineering lets attackers bypass signature-based defenses.
Attackers ‘live off the land’ and abuse legitimate admin tools to move laterally undetected.
question_answer ANECDOTE
Phone Fraud And Vulnerable Drivers
Scattered Spider uses vishing, posing as empathetic IT staff to trick help desks into resets or MFA bypasses.
They also load signed but outdated vulnerable drivers to disable EDR like CrowdStrike Falcon.
Get the Snipd Podcast app to discover more snips from this episode
Identity-based ransomware is no longer a fringe tactic; it’s becoming the playbook of today’s most dangerous adversaries. Scattered Spider, a financially motivated e-crime group, has shifted the model from smash-and-grab encryption to a far more devastating combination of double extortion, social engineering, and hypervisor encryption attacks.
In this episode of Data Security Decoded, host Caleb Tolin welcomes back Joe Hladik, Head of Rubrik Zero Labs, to unpack how Scattered Spider is evolving the ransomware playbook. From double extortion and identity compromise to hypervisor encryption and legacy system exploitation, Joe explains why these tactics succeed where traditional defenses fail and why building cyber resilience, not just detection and response, is the critical next step for security leaders.
What You’ll Learn
How Scattered Spider leverages ransomware-as-a-service and double extortion to maximize payouts
Why identity compromise and social engineering make traditional defenses ineffective
How “living off the land” techniques and vulnerable drivers bypass signature-based tools
Why legacy infrastructure and outdated backup systems are prime targets for exploitation
What cyber resilience really means and how to build recovery into your security posture
Episode Highlights: [00:30] Joe on Scattered Spider’s financial motivations and shift to double extortion [06:53] Why identity compromise and social engineering bypass traditional defenses [08:49] Disabling EDR with “living off the land” techniques and vulnerable drivers [13:06] Hypervisor encryption: how attackers can take entire backup systems offline [16:21] Cyber resilience as the future: assuming breach and restoring trusted systems