Monday, May 12, 2025
Homecyber securityScattered Spider Malware Targets Klaviyo, HubSpot, and Pure Storage Platforms

Scattered Spider Malware Targets Klaviyo, HubSpot, and Pure Storage Platforms

Published on

SIEM as a Service

Follow Us on Google News

Silent Push researchers have identified that the notorious hacker collective Scattered Spider, also known as UNC3944 or Octo Tempest, continues to actively target prominent services in 2025, including Klaviyo, HubSpot, and Pure Storage.

This group, active since at least 2022, has built a reputation for executing sophisticated social engineering attacks to harvest usernames, login credentials, and multi-factor authentication (MFA) tokens.

Their latest campaigns demonstrate an alarming evolution in tactics, techniques, and procedures (TTPs), with updated phishing kits and a new variant of the Spectre RAT (Remote Access Trojan) designed for persistent access to compromised systems.

- Advertisement - Google News

Sophisticated Phishing and RAT Campaigns

Silent Push’s analysis reveals Scattered Spider’s focus on major brands and software vendors, with 2025 targets encompassing high-profile names like Audemars Piguet, Chick-fil-A, Credit Karma, Forbes, Instacart, Louis Vuitton, Nike, T-Mobile, and Vodafone, alongside specialized platforms like Klaviyo and Pure Storage.

Their phishing operations have become more elusive, leveraging dynamic DNS vendors for subdomains such as klv1.it[.]com, which mimics Klaviyo’s SMS marketing features.

This shift to publicly rentable subdomains complicates traditional tracking methods, as these lack conventional domain registration fingerprints, making detection challenging even for advanced security tools.

Silent Push notes that such infrastructure choices, combined with hosting on privacy-focused providers like Njalla, Virtuo, and Cloudflare, indicate a deliberate move toward operational stealth.

A significant discovery in Silent Push’s research is the updated Spectre RAT, which features advanced obfuscation, a sophisticated crypter, and support for both 32-bit and 64-bit Intel architectures.

Scattered Spider Malware
Morningstar-okta[.]com

This malware enables data exfiltration, command execution, and system reconnaissance while employing XOR-based string encoding and dynamic command-and-control (C2) server configurations to evade detection.

Hardcoded C2 servers act as decoys, used only once to fetch dynamic server lists, further obscuring the threat actor’s infrastructure.

Silent Push has responded by releasing publicly available code for a Spectre RAT String Decoder and C2 Emulator on GitHub, empowering defenders to analyze and mitigate this threat through simulated environments or operational takeovers.

Silent Push Uncovers New Tactics

Scattered Spider’s phishing kits, tracked across five unique versions since 2023, also showcase adaptability.

The latest, Phishing Kit #5, detected in 2025 and hosted on Cloudflare, incorporates multiple brand templates within a single site, targeting entities like T-Mobile, Tinder, and Nike.

Scattered Spider Malware
VirusTotal results

Legacy kits impersonate Okta login portals with short-lived domains active for mere minutes to hours, often using keywords like “okta,” “sso,” or “vpn” in URLs.

This rapid deployment and abandonment strategy, paired with bulk domain registrations targeting specific sectors such as financial, retail, and telecommunications, underscores the group’s calculated approach to maximizing impact while minimizing exposure.

To aid in defense, Silent Push offers Indicators of Future Attack (IOFA) feeds for enterprise clients, alongside a free Community Edition platform for threat hunting.

Their research also highlights Scattered Spider’s historical infrastructure preferences, including registrars like NiceNIC and ASNs such as Cloudflare (AS13335) and DigitalOcean (AS14061).

Indicators of Compromise (IOCs)

Below is a sample list of Indicators of Compromise (IOCs) associated with Scattered Spider’s campaigns, providing critical data for cybersecurity teams to bolster their defenses against this persistent and evolving threat.

IndicatorType
klv1.it[.]comDomain
corp-hubspot[.]comDomain
pure-okta[.]comDomain
twitter-okta[.]comDomain
sso-instacart[.]comDomain

Setting Up SOC Team? – Download Free Ultimate SIEM Pricing Guide (PDF) For Your SOC Team -> Free Download

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Metasploit Update Adds Erlang/OTP SSH Exploit and OPNSense Scanner

The open-source penetration testing toolkit Metasploit has unveiled a major update, introducing four new...

Google Researchers Use Mach IPC to Uncover Sandbox Escape Vulnerabilities

Google Project Zero researchers have uncovered new sandbox escape vulnerabilities in macOS using an...

Cybercriminals Hide Undetectable Ransomware Inside JPG Images

A chilling new ransomware attack method has emerged, with hackers exploiting innocuous JPEG image...

Hackers Exploit Legacy Protocols in Microsoft Entra ID to Bypass MFA and Conditional Access

A sophisticated and highly coordinated cyberattack campaign came to light, as tracked by Guardz...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Metasploit Update Adds Erlang/OTP SSH Exploit and OPNSense Scanner

The open-source penetration testing toolkit Metasploit has unveiled a major update, introducing four new...

Google Researchers Use Mach IPC to Uncover Sandbox Escape Vulnerabilities

Google Project Zero researchers have uncovered new sandbox escape vulnerabilities in macOS using an...

Cybercriminals Hide Undetectable Ransomware Inside JPG Images

A chilling new ransomware attack method has emerged, with hackers exploiting innocuous JPEG image...