The Cyber Threat Perspective

Episode 170: The Evasive Adversary

Feb 27, 2026
They unpack social engineering strikes like Chatty Spider and Scattered Spider that break in via help-desk tactics and voice phishing. They cover click-grab lures that paste PowerShell payloads and malware-free living-off-the-land intrusions. They discuss AI speeding attacks, rapid breakout timelines, zero-day edge exploits, supply-chain risks in NPM packages, and cloud identity/session theft techniques.
Ask episode
AI Snips
Chapters
Transcript
Episode notes
ANECDOTE

Rapid RMM-Based Exfiltration Example

  • Chatty Spider social-engineered a US law firm user to run Microsoft Quick Assist and began exfiltration with WinSCP within four minutes.
  • Spencer Alessi highlighted that attackers often use RMM/Quick Assist to pivot quickly and access shares as regular users do.
INSIGHT

Voice Phishing As A High Success Vector

  • Voice phishing is increasingly used as the initial vector because it's more convincing than email or SMS.
  • Tyler Roberts said their social engineering success on voice phishing engagements is effectively 100% for persuading users to install RMM tools.
INSIGHT

Click-Grab Captcha Attacks Are Rising Fast

  • Attackers shifted from fake browser-update lures to captcha/click-grab that persuades users to paste PowerShell commands.
  • Spencer Alessi noted CrowdStrike observed a 563% increase and that EDR visibility may not link the browser lure to the payload.
Get the Snipd Podcast app to discover more snips from this episode
Get the app