This presentation will take a two-part approach to understanding and defending against ShinyHunters and Scattered Spider.
The first half of the presentation will cover the who, what, when, where, and why of each actor, providing a concise history of their campaigns and highlighting their recent collaboration. Attendees will gain insight into the TTPs and behaviors of both groups, with emphasis on areas of overlap that inform defensive strategy.
The second half will translate intelligence into action. SOC analysts, threat hunters, and detection engineers will walk away with practical methods to improve their organization’s security posture, including:
- Running effective IOC scans to identify potential compromise
- Designing hypothesis-driven hunts informed by adversary activity
- Enabling detection engineers to build higher-fidelity alerts that reduce dwell time
- Performing structured (hypothesis-driven) AND unstructured (data-driven) threat hunts
Attendees will leave with a clearer understanding of these two prolific threat actors and concrete techniques they can immediately apply to strengthen defenses.