top of page
Search

CrowdStrike 2025 Threat Hunting Report – part 4: Hunting Cross-Domain Adversaries

  • Writer: Katarzyna  Celińska
    Katarzyna Celińska
  • Aug 28
  • 2 min read

Modern attackers are no longer confined to a single domain. Today’s intrusions span endpoints, identities, and cloud environments, often woven together in the same campaign. The 2025 report highlights how adversaries are increasingly blending these surfaces into complex, multi-stage operations.

 

Cross-Domain Intrusions

Groups like BLOCKADE SPIDER illustrate this evolution. Their campaigns often move across three fronts:

Endpoints → Deploying credential harvesting tools, moving laterally with admin utilities, and disrupting sensors to blind defenders

Identities → Compromising VPN accounts, escalating privileges in Active Directory, and exploiting IAM misconfigurations

Cloud → Abusing SaaS platforms, creating rogue IAM agents, and establishing persistence in virtualized environments

 

ree

Common Cross-Domain Attacks

The most widely used techniques among ransomware operators in 2025:

Remote Encryption – Punk Spider, Blockade Spider, Recess Spider

VPN Compromise – Vice Spider, Tunnel Spider, Ocular Spider affiliates

Cloud Targeting – Scattered Spider, Chatty Spider

Credential Dumping – Abuse of backup platforms for harvesting admin secrets

Unmanaged Systems – Frozen Spider, Tunnel Spider exploiting overlooked endpoints

RMM & Proxy Tools for C2 – Scattered Spider, Blockade Spider, Frozen Spider

Key Trend: Ransomware campaigns are evolving beyond encryption events. They now blend data exfiltration, lateral movement, credential theft, and cloud persistence into extended intrusion operations.

 

Defensive Insights

Defenders must establish visibility across multiple layers—endpoint, identity, and cloud—not just one.

Lateral movement across domains often occurs quickly, compressing response windows.

The most successful defense strategies focus on correlating weak signals across domains rather than treating them in isolation.

 

This section reinforces a truth I encounter often: adversaries thrive in the gaps between domains. Security teams may secure endpoints well but leave identity roles misconfigured. They may watch Active Directory but miss rogue activity in cloud environments. The only effective countermeasure is integrated defense across endpoints, identity systems, and cloud environments, with proactive hunting that anticipates these pivots.


 
 
 

Comments


Stay in touch

BW ADVISORY sp. z o.o. 

ul. Boczańska 25
03-156 Warszawa
NIP: 525-281-83-52

Privacy policy

  • LinkedIn
  • Youtube
bottom of page