How Scattered Spider Weaponizes "Legitimate" Tools And How to Stop Them

The latest FBI/CISA advisory confirms that Scattered Spider is exploiting legitimate remote access tools, not malware, to breach organizations. Traditional security can’t see these attacks, but MagicSword’s LOLRMM intelligence and Application Control stop them at the source.

September 5, 20252 min read
MagicSword vs Scattered Spider: Visualizing how proactive application control prevents the abuse of legitimate RMM software and malicious bootloaders.

The latest FBI/CISA advisory on Scattered Spiderconfirms what defenders have suspected: traditional security tools are blind to the most dangerous attacks happening today.

The report names our open-source LOLRMM project as a resource for identifying remote access tools abused in these attacks, validating the threat intelligence we've been building as a community. It’s a clear sign that defenders can’t just look for malware anymore, we need to watch the tools we already trust. Here's what you should know.

The Scattered Spider Playbook

This threat group has perfected the art of hiding in plain sight. They don't rely on exotic malware, instead, they weaponize tools your IT team uses every day:

  • TeamViewer, AnyDesk, Splashtop for remote access
  • Tactical.RMM, Pulseway, Fleetdeck.io for system management
  • Mimikatz, Ngrok, Tailscale for credential theft and tunneling

The attack vector? Social engineering. They call your help desk, impersonate employees, and convince staff to install these "legitimate" tools. Once inside, they move laterally, steal data, and deploy ransomware, all while appearing as authorized activity to your security stack.

Why Traditional Security Fails

The advisory makes it clear: attackers are winning because your tools trust theirs. When attackers use signed, legitimate software, traditional security tools have no basis for blocking them.

The Application Control Solution

This is exactly why MagicSword built our next-generation Application Control platform. Our LOLRMM (Living Off The Land Remote Monitoring and Management) intelligence database tracks the precise tools Scattered Spider exploits.

MagicSword prevents installation and execution of unauthorized remote access software, including portable versions that bypass traditional defenses. We use native Windows security features with zero performance impact, integrating seamlessly with your existing SIEM infrastructure.

Take Action Today

The threats are evolving faster than traditional security can keep pace. Organizations need proactive controls that prevent attacks rather than just detecting them after damage is done.

Visit magicsword.io to assess your current exposure and see how Application Control can close these dangerous security gaps.

This ends with us.

Michael Haag

Written by

Michael Haag

Threat Researcher

In the intricate chessboard of cybersecurity, my role oscillates between a master tactician and a relentless hunter. As an expert in detection engineering and threat hunting, I don't just respond to the digital threats, I anticipate them, ensuring that the digital realm remains sovereign.

© 2025 MagicSword. All rights reserved.