
DATA SECURITY DECODED
Scattered Spider: the Evolution of Identity-Based Ransomware
In this episode of Data Security Decoded, host Caleb Tolin welcomes back Joe Hladik, Head of Rubrik Zero Labs, to unpack how Scattered Spider is evolving the ransomware playbook. From double extortion and identity compromise to hypervisor encryption and legacy system exploitation, Joe explains why these tactics succeed where traditional defenses fail and why building cyber resilience, not just detection and response, is the critical next step for security leaders.
What You'll Learn:
How Scattered Spider leverages ransomware-as-a-service and double extortion to maximize payouts
Why identity compromise and social engineering make traditional defenses ineffective
How “living off the land” techniques and vulnerable drivers bypass signature-based tools
Why legacy infrastructure and outdated backup systems are prime targets for exploitation
What cyber resilience really means and how to build recovery into your security posture
Episode Highlights:
Joe on Scattered Spider’s financial motivations and shift to double extortion
Why identity compromise and social engineering bypass traditional defenses
Disabling EDR with “living off the land” techniques and vulnerable drivers
Hypervisor encryption: how attackers can take entire backup systems offline
Cyber resilience as the future: assuming breach and restoring trusted systems
SERIES
Explore other episodes
NEWSLETTER
Get insights straight to your inbox