ONLINE TV

  • Advertise
  • Privacy & Policy
  • Contact
Saturday, July 12, 2025
  • Login
  • Register
CYBERSECURITY
  • Home
  • CybersecurityUpdates
    • All
    • Data Breaches
    • Jobs
    • Malware & Ransomware
    • News
    • Scammers
    • Threat Intelligence
    • Update and Breaches
    Microsoft SQL Server 0-Day Vulnerability Exposes Sensitive Data Over Network

    Employee Cyber Security Awareness Quiz: Weekend Special

    Fake online stores look real, rank high, and trap unsuspecting buyers

    Beware of Fake Online Stores: How to Spot and Avoid E-Shop Scams

    Train smarter, respond faster: Close the skill gaps in your SOC

    Upskill Your Security Team with TryHackMe’s Advanced Endpoint

    Microsoft Confirms Teams Outage for Users, Investigation Underway – Updated

    Microsoft Teams Outage Disrupts Users Worldwide

    XDigo Malware Exploits Windows LNK Flaw in Eastern European Government Attacks

    Strengthening Cybersecurity for Smart Grids and Substations

    Hackers Use Leaked Shellter Tool License to Spread Lumma Stealer and SectopRAT Malware

    How AI Impersonation Is Reshaping Cybersecurity

    Trending Tags

    • Cybercrime
    • cyber threat prevention
    • cyber fraud
    • cyberattack techniques
    • cyber threat intelligence
    • cybersecurity jobs
    • Cyberattacks
    • Cybersecurity
  • Shop
    • Products
    • Vendors
  • Quick Links
    • Our Profiles
  • Legal Hub
  • Browse
    • News
      • Canada News
      • World News
        • Africa
          • East Africa
          • West Africa
        • Americas
          • US
          • Canada
        • Asia
        • Australia
        • China
        • Europe
        • India
        • Middle East
        • United Kingdom
Live TV Indicator
WATCH ONLINE TV
No Result
View All Result
CYBERSECURITY
Home Menu News
Before scaling GenAI, map your LLM usage and risk zones

cyberattacks on insurance

UK and US Retail Attacks Now Targeting Insurance Industry

June 18, 2025
in News
0

Hackers linked to a recent surge of cyberattacks on UK and US retail companies are now shifting their focus toward the insurance industry, according to recent findings from Google researchers. This escalation highlights a concerning trend where threat actors, suspected to be part of the notorious group known as Scattered Spider, are broadening their targets after a string of successful intrusions. The recent attacks, including a notable incident at Erie Insurance, underscore the increasing sophistication and danger posed by organized cybercriminals targeting critical sectors.

The Rise of Scattered Spider and Its Focus on Critical Industries

The recent wave of cyberattacks by the threat group known as Scattered Spider has alarmed security experts worldwide. Initially targeting retail chains in the UK and US since April, the group has now pivoted towards the insurance sector, with multiple confirmed incidents at various insurance firms. Google Threat Intelligence Group’s chief analyst, John Hultquist, warned that these attacks bear all the hallmarks of Scattered Spider’s modus operandi, which includes highly targeted social engineering schemes.

This group’s tactics involve convincing help desks and call centers to bypass multifactor authentication (MFA) and hand over credentials, often through cleverly crafted phishing or impersonation campaigns. Their ability to focus on specific industries, often in clusters, makes them a particularly dangerous adversary capable of inflicting significant disruption.

Why the Insurance Industry Is Under Attack

Insurance companies are prime targets because they hold vast amounts of sensitive data—personal information, policy details, and financial records—that can be exploited for financial gain or further cyber espionage. The recent attack at Erie Insurance, which is currently under investigation, exemplifies this threat. Although authorities have not yet attributed the breach to any specific threat actor, Google researchers strongly suspect Scattered Spider’s involvement.

The attackers’ goal appears to be gaining access to systems to steal or manipulate data, and possibly extort or disrupt operations. The timing is strategic; the insurance sector, often seen as less protected than financial institutions, presents a lucrative target for cybercriminals seeking quick financial rewards or long-term espionage advantages.

How Threat Actors Like Scattered Spider Operate

Research from Mandiant and other cybersecurity firms reveal that groups like Scattered Spider employ highly sophisticated social engineering techniques. They often target help desks, customer support centers, and other frontline employees to bypass MFA protections and obtain access credentials. This approach relies heavily on psychological manipulation—posing as trusted insiders or external vendors—to trick staff into revealing passwords or executing malicious links.

Furthermore, their attacks are not random but focused and strategic, often targeting specific sectors in waves. For example, after attacking casino companies like MGM Resorts, the group shifted its focus to insurers, demonstrating a clear pattern of sector-focused campaigns. Their ability to adapt quickly and exploit human vulnerabilities makes them particularly challenging to defend against.

The Importance of Threat Intelligence and Proactive Defense

To combat threats like Scattered Spider, organizations must adopt a multi-layered security approach. Google’s threat intelligence team, along with guidance from Mandiant, recommends implementing strong social engineering awareness training, conducting regular security audits, and employing advanced detection tools that monitor for unusual help desk activity.

Creating a robust incident response plan is also critical. For example, Erie Insurance’s ongoing investigation highlights the importance of rapid detection and containment. Organizations should establish clear protocols for reporting suspicious activity, collaborating with law enforcement, and conducting forensic analysis to understand the scope of breaches.

Best Practices for Insurance Companies and Critical Sectors

  • Enhance Employee Training: Regularly educate staff about social engineering tactics, phishing, and impersonation schemes.
  • Implement Zero Trust Architecture: Enforce strict access controls and continuously verify user identities, especially for help desk and support staff.
  • Deploy Multi-Factor Authentication (MFA): Protect all access points, especially those involving sensitive data, with MFA.
  • Conduct Penetration Tests: Regularly test your defenses against simulated attacks to identify vulnerabilities before adversaries do.
  • Share Threat Intelligence: Engage with industry-specific information sharing platforms and government agencies to stay informed about emerging threats.

By adopting these practices, insurers and other critical sectors can significantly reduce their attack surface and improve their resilience against highly targeted social engineering campaigns.

 

Tags: cyber defensecyber threat intelligencecyberattacks insurance sectorhelp desk attacksincident responseindustry-specific threatsinsurance cybersecuritysocial engineeringtargeted intrusionthreat group UK USUKUSA
Share197Tweet123

Related Posts

Red Hat introduces Enterprise Linux for Business Developers
News

Why Human Risk Management Is Critical for Cybersecurity

July 9, 2025
Chinese Hacker Xu Zewei Arrested for Ties to Silk Typhoon Group and U.S. Cyber Attacks
News

Chinese Hacker Arrest Highlights Rising Threats in Cyber Espionage

July 9, 2025
10 Best Network Security Solutions For Chief Security Officer To Consider – 2025
News

10 Best Network Security Solutions for CSOs to Consider in 2025

July 9, 2025
AI built it, but can you trust it?
News

Trust or Risk? Securing AI-Driven Development

July 8, 2025
Subscribe
Notify of
guest
guest
0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments

Donation

Buy our author a coffee

Donate

Follow Us On Facebook

  • Trending
  • Comments
  • Latest
Top Cybersecurity Jobs Available Right Now – May 6, 2025

Top Cybersecurity Jobs Available Right Now – May 6, 2025

May 6, 2025
career

Top Cybersecurity Job Opportunities in 2025

April 30, 2025
ransomware attack

Moldovan Authorities Arrest Ransomware Hacker Linked to DoppelPaymer Attacks

May 13, 2025
Cybersecurity in Healthcare: Understanding The Risk of PC Workstations

The Covert Threat of Cyberattacks: A Look at Vulnerable PC Workstations in Healthcare

0
AI

The AI Trust Gap: Are Security Teams Ready to Hand Over the Reins?

0
vulnerability

Commvault RCE: Critical Vulnerability Exposes Data Systems

0
Microsoft SQL Server 0-Day Vulnerability Exposes Sensitive Data Over Network

Employee Cyber Security Awareness Quiz: Weekend Special

July 12, 2025
Fake online stores look real, rank high, and trap unsuspecting buyers

Beware of Fake Online Stores: How to Spot and Avoid E-Shop Scams

July 11, 2025
Train smarter, respond faster: Close the skill gaps in your SOC

Upskill Your Security Team with TryHackMe’s Advanced Endpoint

July 10, 2025

© 2024 Innocent Michael Network Inc..

 

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

  • Login
  • Sign Up
Live TV Indicator
WATCH ONLINE TV
No Result
View All Result
  • Home
  • Cybersecurity
  • Shop
    • Products
    • Vendors
  • Quick Links
    • Our Profiles
  • Legal Hub
  • Browse
    • News
      • Canada News
      • World News
Subscribe

© 2024 Innocent Michael Network Inc.

wpDiscuz
0
0
Would love your thoughts, please comment.x
()
x
| Reply