The Scattered Spider group used social engineering to impersonate an MGM employee, gaining IT access for a ransomware attack causing $100M in losses. This shows how attackers bypass security by logging in, not hacking. Read this blog to learn about attack methods and AI-driven behavioral detection to identify such threats.
Social engineering tactics exploit human vulnerabilities to bypass security measures. The MGM breach shows how attackers use LinkedIn impersonation and IT helpdesk manipulation to gain access, leading to ransomware deployments.
This analysis covers a $100 million attack, offering lessons for security teams. It highlights the risks of credential-based attacks and the need for robust detection. Key insights include:
· Star Fraud group’s use of social engineering
· Collaboration between access brokers and ransomware operators
· Defense strategies for detecting anomalous activity
Review the full analysis for attack vectors and measures.
Offered Free by: Abnormal AI
See All Resources from: Abnormal AI
Thank you
This download should complete shortly. If the resource doesn't automatically download, please, click here.
Thank you
This download should complete shortly. If the resource doesn't automatically download, please, click here.





