PUBlished on
September 29, 2025
updated on
November 5, 2025

Behind the Breach: Scattered Spider SaaS Attack Analysis & MITRE ATT&CK Mapping

Damien Miller-McAndrews

Obsidian recently analyzed an attack carried out by the well-known adversary group Scattered Spider, which has primarily targeted the airlines, retail, and insurance sectors. This post provides a detailed walkthrough of the attack, reconstructed from SaaS audit logs and mapped to the MITRE ATT&CK framework.

Why it matters:
This attack highlights how quickly adversaries can escalate from initial reconnaissance to full administrative access by exploiting identity workflows, helpdesk processes, and SSO-enabled SaaS environments. Understanding these tactics is critical for detecting, responding to, and preventing similar intrusions.

Key considerations while reading:

These questions frame the attack’s mechanics, relevance, and potential impact across different organizational contexts.

Note: Obsidian researchers only had access to SaaS-related logs, reflecting our platform’s focus on SaaS and AI security. However, we were able to make informed inferences about potential on-premise activity by correlating SaaS logs with publicly available breach data and patterns from similar attacks.

Who Is Scattered Spider?

Calling Scattered Spider a “group” is somewhat misleading. It’s more accurate to describe them as a community, composed of individuals, groups, associates, alliances, and insider threats. Techniques and targets are shared within the community, and actors with specialized skills are often recruited on-the-fly for activities such as SIM swapping, helpdesk social engineering, or ransomware deployment.

Hallmarks that help attribute activity to Scattered Spider include rapid attacks across multiple targets within the same industry, helpdesk social engineering and identity-focused exploitation, and a fluid, cooperative structure that accelerates campaigns.

Attack Breakdown

Before we dive into the attack details, let’s start with an overview of the techniques the threat actor used, mapped to the MITRE ATT&CK framework.

One of the most alarming aspects of this attack—and of SaaS attacks in general—was the speed: after gaining initial access, the threat actor moved from the SaaS environment to the company network in just four minutes.

With that context, we can now examine what happened, step by step: 

Reconnaissance 

Reconnaissance, as defined in the MITRE ATT&CK framework, is typically not directly observable. However, the attack path philosophy dictates that some form of information gathering must occur. Organizations can still proactively defend against reconnaissance by monitoring malicious sources for leaked data, or the attack surface for evidence of scanning.

Obsidian observed self-service password reset (SSPR) recon activity on the affected accounts from known-malicious IP addresses, a technique Obsidian detailed in a previous blog

This would indicate some form of victim identity information gathering (T1589), and can be used by an attacker to validate victim information obtained from another source, and confirm if SSPR is a valid attack vector. If an attacker validates that a phone number is indeed used for SSPR, they may be able to reset the account’s password via social engineering or a sim swap (T1451).

Attackers may also gather information such as employee names, email addresses, and job roles, which can be used when impersonating those users during a helpdesk social engineering attack.  Similarly, obtaining a victim org’s business relationships (T1591.002) can be used to target 3rd party support providers, such as outsourced helpdesk or a managed service provider.

In the case of this attack, the victim company used a 3rd party helpdesk for IT support. The following table details the likely reconnaissance techniques that were used during this attack.

Initial Access

The attackers gained initial access to the victim company’s Microsoft 365 tenant using two user accounts, Victim A and Victim B. The SSPR recon activity was shortly followed by an administrator replacing the existing phone number on the account with an attacker-controlled Google Voice VOIP number.

Of note is the fact that Victim B’s account was initially accessed ~30 minutes after Victim A. The initial malicious login to Victim B’s account was from within the company network. Other than SSPR recon activity on the account from a known-malicious IP address, all other activity observed on the account was from within the company network.

After the phone number was replaced, the attackers reset the victim account’s passwords [3] and logged into the accounts. While not typically classified under the Initial Access tactic, this is a form of account manipulation (T1098.001). 

Other relevant techniques could include trusted relationship (T1199) and spearphishing voice (T1566.004). It depends on how a company wants to classify its outsourced helpdesk, and what can be put in place for detection and prevention.

Execution

Once the attackers gained access to Victims A & B, and later additional accounts, logins to Azure AD PowerShell were observed. SaaS APIs such as AAD PowerShell, Exchange Online PowerShell, and Graph API can be abused by attackers with or without administrative permissions in order to carry out a variety of malicious activity or exploits which could fall under the tactics Discovery, Collection, Privilege Escalation, and more. 

Granular audit activity that details how an attacker utilized a given command framework is often not provided, or may be restricted to customers that pay for advanced auditing capabilities. 

Lateral Movement

While access into the victim company’s Microsoft 365 environment had successfully been obtained, this was not the adversary's end goal. 4 minutes after resetting the password to Victim A, the attacker was seen logging into a corporate remote access service with Single Sign-On enabled (T1021). SSO allowed the attacker to easily pivot internally, either via remote desktop access or a VPN connection.

Victim B, as mentioned above, was first accessed from an IP address on the company network. Malicious activity on SaaS services that occurs from trusted networks can cause issues for anomaly detection as these networks may be whitelisted to avoid false positives. 

Once the attackers had gained access to Victim B, they again pivoted into various SSO-enabled SaaS services within minutes of gaining access (T1021.001). This included movement into SharePoint and a credential management service.

Privilege Escalation

Both Victim A and B were secured within 2 hours of initial access. Ideally, this is when the incident would end. Instead, the attackers were able to hijack another account and continue their activity.

First, we’ll clear up the timeline. Victim A was compromised at 2:32 UTC. It was secured at 4:21. Victim B was first compromised at 3:01, and secured at 3:44. Victim C comes into play at 21:52. Interestingly, the first malicious activity we see is a sign on to a hybrid-joined device, which was later determined to be a jumpbox. 

Once Victim C was compromised, the account was used to reset the credentials for an additional account, Victim D.

Victim D was the service account for Azure Active Directory Sync. Victim D was also assigned the administrator roles Privileged Authentication Administrator and Privileged Role Administrator (T1098.003). Victim E, which was a service account without administrative privileges, was also accessed around this time. The account password was not reset, but the Global Administrator role was assigned to it. 

Persistence

Persistence-related activity occurred throughout the incident timeline. Resetting or adding credentials, or adding an additional MFA device, would fall under persistence. Then, as if taking over several administrative accounts wasn't enough, Victim C created another account (T1136.003), Malicious Admin, disguised as a service account. That account was also assigned administrative roles.

Additionally, Malicious Admin registered Temporary Access Passes (TAP) on several accounts of interest.

This activity allowed the threat actors to log into additional victim accounts without requiring the password, and in such a way that bypasses MFA. Threat actors will maintain access to the additional victim accounts until the TAP is revoked.

Even though TAPs were created for several accounts, only two were observed to have any malicious access occur, which was not notable.

Defense Evasion

This incident demonstrated 4 Defense Evasion techniques.

First, Malicious Admin deleted several conditional access policies (T1556.009), including ones that blocked access from specific IP addresses, required MFA for certain circumstances (administrative actions, security info registration), and one that controlled access via the IdP. This action would have been taken in order to allow the attackers to more easily work within compromised accounts.

Second, Malicious Admin was created with a naming scheme that matches other service accounts. This is a form of masquerading (T1036.010), a technique wherein something malicious is disguised as something benign in order to prolong the lifespan of the malicious artifact.

Next, though it does not traditionally fall under the Defense Evasion tactic, Victim C and Malicious Admin disabled 37 accounts and removed various administrative roles from the disabled accounts and other administrative accounts. This activity is intended to prevent or delay response to malicious activity. Mitre ATT&CK classifies this under the Impact tactic.

Finally, impersonation falls under this tactic. Existing defenses (password, MFA) were bypassed when attackers called the help desk directly in order to change authentication information. 

Credential Access

Credential access would have primarily occurred from on-premise systems. Using what artifacts are present within SaaS audit logs does give us some insight into how that credential access may have happened. This section is speculation.

The facts:

This points to Victim C’s account having been accessed due to capture of the account’s token or password hash, followed by brute-forcing to obtain a plain-text password. Perhaps the attacker was able to obtain Victim C’s on-prem password hash via Kerberoasting (T1558.003) and crack it offline between when Victims A and B were remediated and the initial access from to C happened. Or, they could have installed a keylogger or infostealer on a company computer in order to capture the typed password or extract it from files or the password store. They may have even called helpdesk and requested to know the password, which may have been stored if the account was used by multiple people.

Regardless of the method used to initially access Victim C, this account was the key to the attacker's most destructive activity.

Discovery

Due to the lack of granular audit data, it can not be known for certain what information was discovered during the incident. We can make some assumptions due to the Lateral Movement activity observed, as well as the attackers’ having pivoted into various accounts.

The movement into additional SSO-enabled SaaS services, as observed from Victim A and one of the TAP victims, is evidence of cloud service discovery, either via CLI or a dashboard. (T1526 & T1538). Login to Azure Portal is a sign of dashboard-based discovery.

Additionally, some form of account discovery must have occurred in order for the attackers to take over additional accounts. Victim D was observed logging into Microsoft_AAD_UsersAndTenants, which would allow the threat actor to view a list of accounts within Entra. The Azure Active Directory PowerShell login observed from Victim C would have also allowed the attackers to list accounts within the tenant via CLI.

Collection

We have limited information on any information that may have been collected during the incident. We were able to observe the malicious actors using Victim B’s account to access IT and infrastructure-related documentation within SharePoint (T1213.002). This documentation likely assisted the attackers with their activity within the corporate network.

Attackers also accessed the Teams accounts of Victim A, B, and the two accounts that had the TAP created. Without granular auditing we cannot see what messages were read, but Scattered Spider is known to search messaging applications for information about incident response activity. We cannot say for certain if that activity occurred during this incident.

Command and Control

Based on audit data, as well as post-incident research, we were able to determine some C2 techniques that were likely used in this incident.

When the attacker was not connected to the corporate VPN, access was observed from an IP address registered to Space Exploration Technologies Corporation, also known as SpaceX. The address type was registered as satellite, making it likely that this IP address was part of the Starlink network. This IP address was most likely used as a proxy (T1090.002) in order to disguise the threat actors’ true IP addresses. Additionally, some access was observed from commercial VPN providers Express VPN and Mullvad VPN, for the same purpose.

A significant point of interest for our research was the connection to the jump box PC. A Jump box (aka jump server or jump host) is a device that can be used to access additional devices within a restricted network. A remote admin could access a jumpbox from their home network to administer servers, avoiding the need for their remote computer to be on that specific restricted network.

We could not determine if connection to the jumpbox required VPN usage, but that does not matter considering that the attackers already had VPN access. Historical records on Shodan for the company’s public IP addresses did show evidence that RD Web or other remote access methods existed at some point.

The Bottom Line

This attack required no zero-day exploits or sophisticated malware. Within 24 hours and just two phone calls, attackers had full administrative access, locking out employees and disrupting operations. The simplicity of the attack underscores a critical truth: prevention begins at the helpdesk.

Key takeaways for prevention and response:

By focusing on the helpdesk, administrative account security, and proactive verification, organizations can significantly reduce dwell time and exposure in SaaS environments.

Want to learn more? Explore Obsidian’s research on advanced SaaS attacks to learn practical strategies for securing helpdesk workflows, managing app permissions, monitoring unusual activity, and revoking sessions to reduce risk and detect threats early.

Frequently Asked Questions (FAQs)

What is the Scattered Spider group and how do they typically operate?

Scattered Spider is less a fixed group and more a loose community of cybercriminals, including individuals, small groups, and various affiliates. They are known for rapid, coordinated attacks targeting industries like airlines, retail, and insurance. Scattered Spider commonly exploits identity workflows and social engineering, particularly through helpdesks and single sign-on (SSO) platforms, to quickly escalate privileges and disrupt operations.

How did Scattered Spider gain initial access in the analyzed attack?

In the examined incident, Scattered Spider gained initial access by leveraging self-service password reset (SSPR) workflows and performing social engineering on helpdesk processes. The attackers replaced account recovery information with attacker-controlled data, reset passwords, and logged in via both external and internal company networks. This approach exploited gaps in identity verification and helpdesk authentication, without the need for sophisticated malware or zero-day exploits.

What methods did Scattered Spider use for lateral movement and privilege escalation?

After compromising initial accounts, the attackers rapidly used SSO to move across various SaaS applications and the corporate network. They utilized both legitimate user accounts and privileged service accounts to escalate permissions—sometimes assigning administrative roles to compromised service accounts and creating disguised admin accounts. Attackers also exploited Azure AD PowerShell and SaaS APIs to further their control within the environment.

Which security weaknesses allowed the attackers to persist and evade detection?

The attackers exploited gaps in multi-factor authentication (MFA) processes, weak helpdesk verification steps, and the absence of robust detection for unusual activity from trusted networks. Techniques included adding temporary access passes (bypassing traditional MFA), deleting conditional access policies, masquerading malicious accounts as legitimate service accounts, and disabling existing user accounts and security controls to delay incident response.

You May Also Like

Get Started

Start in minutes and secure your critical SaaS applications with continuous monitoring and data-driven insights.

get a demo