Octo Tempest Flourishing with High-Pressure Social Engineering Attacks

  |  Source: 

Octo Tempest Flourishing with High-Pressure Social Engineering Attacks

To underscore the ongoing threat posed by the financially motivated Octo Tempest cyber threat actor group, Microsoft emphasizes its research findings in the fourth installment of its Cyberattack Series. Since their initial detection in March 2022, the group has markedly intensified their cyberattacks, showcasing an augmented speed in targeting organizations by August 2022. Octo Tempest employs sophisticated tactics, conducting research on organizations and strategically focusing on high-privilege users through techniques such as SIM-swapping attacks or posing as members of the company's helpdesk staff. Social engineering endeavors often convince users to alter their passwords or reset multi-factor authentication (MFA) settings. Octo Tempest's impersonation tactics extend to disguising themselves as the company's CISO or incident response entities.

The proficiency of Octo Tempest's attacks is further evident in their manipulation of privileged users and post-exploitation activities. Through extensive research into organizations' systems, IT processes, knowledge repositories, and VPN architectures, operators gain crucial insights for orchestrating their attacks. Microsoft highlights instances of Octo Tempest manipulating an organization's "authentication flow, enabling authentication as any user in the organization without requiring their credentials." Additionally, the group tampered with security monitoring solutions, such as gaining access to EDR solutions using compromised credentials to execute their ALPHV/BlackCat ransomware. Further manipulations involve adjusting inbox rules to disable notifications from security vendors and monitoring security communication channels to check if their activity has been detected by the compromised organization.

Octo Tempest's rapid and covert actions encompass data exfiltration followed by the deployment of ransomware for financial extortion. Their affiliation with ALPHV/BlackCat enables them to deploy ransomware across Windows, Linux, or VMWare ESXi servers, utilizing the ransomware gang's data leak site for extortion purposes. Notably, Octo Tempest's threat activity has overlapped with groups like 0ktapus, Scattered Spider, and UNC3944, a proficient social engineering group, prompting advisories from CISA in the previous month and Mandiant in September. In the face of the Octo Tempest threat, organizations are advised to act promptly, utilizing efficient containment, eviction, and detection capabilities. Microsoft emphasizes the implementation and enhancements to security measures, such as MFA implementation, access control strengthening, and employee education on phishing and social engineering threats.

Get trending threats published weekly by the Anvilogic team.

Sign Up Now