Defeating BLOCKADE SPIDER: How CrowdStrike Stops Cross-Domain Attacks

A case study of CrowdStrike OverWatch threat hunters disrupting eCrime adversary BLOCKADE SPIDER demonstrates the complexity of modern cross-domain attacks.

November 18, 2025

| | Endpoint Security & XDR

Cross-domain attacks exemplify adversaries’ drive for speed and stealth. In these attacks, threat actors navigate multiple domains such as endpoint, cloud, and identity systems to maximize their reach and impact. Their goal is to exploit the weaknesses in organizations’ fast-growing and complex environments.

BLOCKADE SPIDER is among the most elusive cross-domain adversaries. This financially motivated eCrime adversary, active since at least April 2024, commonly uses cross-domain techniques in its ransomware campaigns. They gain access through unmanaged systems, dump credentials, and move laterally to virtualized infrastructure to remotely encrypt files with Embargo ransomware. They’ve also demonstrated the ability to target cloud environments.

They aren’t alone. Adversaries spanning all geographies and motivations are using cross-domain techniques to accelerate their operations across hybrid environments. They target unmanaged hosts and leverage misconfigurations to break in, and then navigate systems with valid credentials, all without triggering traditional defenses. 

Here, we examine a case study in which CrowdStrike OverWatch threat hunters identified and disrupted BLOCKADE SPIDER’s cross-domain activity, and discuss how organizations can protect themselves from these evolving threats.

Disrupting BLOCKADE SPIDER

CrowdStrike OverWatch identified that BLOCKADE SPIDER had accessed a victim’s network via an unmanaged VPN appliance in early 2025. The adversary moved laterally to several managed systems, where they performed actions typically observed in big game hunting activity, including attempting to dump credentials from a configuration database and delete backup files.

BLOCKADE SPIDER made several attempts to interfere with the CrowdStrike Falcon® sensor. While these attempts failed, the adversary was not deterred, and they rapidly adapted their strategy. Tracking and disrupting this adversary quickly required additional data sources, which is where cross-domain data from identity sources and CrowdStrike Falcon® Next-Gen SIEM were critical.

CrowdStrike OverWatch used CrowdStrike Falcon® Identity Threat Protection data to trace a VPN service account as the initial source of activity. Using this bastion account, BLOCKADE SPIDER used the credential dumping technique DCSync to retrieve more account credentials and began adding compromised accounts to new Active Directory groups. CrowdStrike OverWatch was able to follow this activity through identity data and monitor for further malicious activity using these newly compromised accounts.

By leveraging log data from an identity and access management (IAM) solution ingested into Falcon Next-Gen SIEM, more actionable insights on BLOCKADE SPIDER’s interest in Active Directory manipulation quickly became available. CrowdStrike OverWatch threat hunters were also able to continuously follow and alert on the adversary’s activities as they pivoted between unmanaged on-premises systems and cloud environments. Finally, threat hunters observed BLOCKADE SPIDER successfully bypass multifactor authentication (MFA) requirements to access the victim’s IAM environment and deploy a rogue Active Directory agent.

Despite the adversary embedding themselves deeply in the victim’s on-premises and cloud infrastructure, Falcon Next-Gen SIEM data provided threat hunters with the capability to track BLOCKADE SPIDER’s activities through various data sources. The customer was ultimately able to shut down BLOCKADE SPIDER’s access to its network.

Figure 1. BLOCKADE SPIDER’s cross-domain attack path Figure 1. BLOCKADE SPIDER’s cross-domain attack path

CrowdStrike continuously monitors global threat actor activity and emerging tactics mapped to the MITRE ATT&CK® framework. This intelligence is directly integrated into the Falcon platform to help customers stay ahead of adversaries’ evolving tradecraft. With real-time intelligence informing detection and protection, organizations can anticipate attacker behavior, reduce exposure, and improve resilience across every domain.

Unified Cross-Domain Visibility

The evolution of cross-domain attacks highlights a critical reality: Detection alone is not enough. Organizations must be able to correlate activity across every domain and stop adversary movement before an attacker reaches critical assets.

To do this, they need unified visibility across endpoint, cloud, and identity environments. The Falcon platform delivers this capability through unified next-generation antivirus, endpoint detection and response, identity protection, and cloud security, all delivered via the same single sensor in a unified console. 

The Falcon platform provides defenders with a single view of activity across all domains, enabling faster investigation and response. Together, CrowdStrike Falcon® Insight XDR and Falcon Next-Gen SIEM extend these capabilities, correlate telemetry across systems, and surface high-fidelity detections that reveal the complete attack path. This unified approach allows defenders to distinguish real threats from noise and act decisively before damage occurs. Cross-domain threat hunting, provided through CrowdStrike Falcon® Adversary OverWatch™ and CrowdStrike Falcon® Complete Next-Gen MDR, detects adversary activity that spans multiple security areas including identity systems, endpoints, and cloud environments. 

▶ Watch how CrowdStrike stops cross-domain attacks

Detection to Prevention with Intelligence-Driven Defense

CrowdStrike’s protection-first approach combines behavioral analytics, machine learning, and real-time intelligence to block adversary behaviors at key stages before they cause impact. Whether adversaries are targeting Windows, Linux, or cloud workloads, the Falcon platform closes the gaps they depend on to move between domains.

The Falcon platform enables organizations to:

  • Detect and block malicious behavior across endpoints, cloud, and identities
  • Correlate activity across domains to expose the complete attack path
  • Accelerate investigation and response with AI-driven automation
  • Continuously harden defenses with actionable threat intelligence
  • Hunt for cross-domain threats spanning multiple security domains

The CrowdStrike Falcon platform flips the advantage back to defenders by unifying detection, response, and protection across every environment to provide the speed and visibility needed to stop modern adversaries.

Additional Resources