Site icon Check Point Blog

Exposing Scattered Spider: New Indicators Highlight Growing Threat to Enterprises and Aviation

Check Point Research identifies phishing domain patterns, offering actionable insights to proactively counter threats from the notorious cyber group behind recent airline attacks

Scattered Spider, a sophisticated cyber threat group known for aggressive social engineering and targeted phishing, is broadening its scope, notably targeting aviation alongside enterprise environments. Check Point Research has uncovered specific phishing domain indicators, helping enterprises and aviation companies proactively defend against this emerging threat.

Recent Aviation Attacks Linked to Scattered Spider

In a significant escalation, recent media reports and intelligence advisories have linked Scattered Spider to cyber-attacks on major airlines, notably the July 2025 data breach affecting six million Qantas customers. Cybersecurity analysts noted tactics such as MFA fatigue and voice phishing (vishing), closely matching Scattered Spider’s known methods.

Similar incidents involving Hawaiian Airlines and WestJet have further highlighted the urgency of addressing vulnerabilities in aviation-related third-party providers.

Key Targeting Indicators (Phishing Domains)

Check Point Research has identified a consistent pattern in the phishing infrastructure registered by Scattered Spider. These domains closely mimic legitimate corporate login portals and are designed to deceive employees into revealing their credentials.

Typical naming conventions include:

During a targeted investigation, Check Point researchers identified approximately 500 domains that follow Scattered Spider’s known naming conventions—indicating potential phishing infrastructure either in use or prepared for future attacks. While some of these domains appear to target technology, retail, and aviation organizations, others impersonate companies across a much broader set of industries, including manufacturing, medical technology, financial services, and enterprise platforms. This cross-sector targeting underscores the group’s opportunistic approach, adapting to high-value vulnerabilities rather than focusing on a specific vertical.Examples of observed domains include:

While not all domains are confirmed to be actively malicious, their alignment with known TTPs (tactics, techniques, and procedures) strongly suggests targeting intent.

These findings further highlight the importance of industry-agnostic threat monitoring and reinforce that no sector is immune from sophisticated social engineering campaigns.

Group Overview: Who Is Scattered Spider?

Publicly available intelligence outlines Scattered Spider as:

Tools & Techniques Used by Scattered Spider

Scattered Spider employs a broad range of sophisticated attack methods to infiltrate targets and maintain long-term access:

Social Engineering Methods:

Remote Access Tools:

Malware:

Ransomware:

Comprehensive Recommendations

Check Point recommends the following defensive strategies tailored for both enterprises and aviation organizations:

For Enterprises:

For Aviation Sector Organizations:

Check Point Solutions to Mitigate Scattered Spider Threats

To effectively counter these emerging risks, Check Point recommends the following security platforms:

Further Reading & Resources

Explore additional resources on Scattered Spider:

For real-time intelligence and updates, visit Check Point’s blog.

Exit mobile version