Fact-checked by Grok 2 weeks ago

Scattered Spider

Scattered Spider, tracked by cybersecurity analysts as UNC3944 and also known by aliases such as Octo Tempest and Storm-0875, is a financially motivated cybercriminal group that employs sophisticated social engineering to target large organizations, particularly their IT help desks and contracted support vendors. The group, active since at least , focuses on English-speaking countries including the , , , and , with victims spanning sectors like , , technology, and financial services. Its operations emphasize initial access via (vishing), phishing, and (MFA) fatigue attacks, often impersonating legitimate support personnel to trick employees into resetting credentials or granting remote access. Once inside networks, Scattered Spider actors leverage living-off-the-land techniques—using built-in system tools like and legitimate remote access software such as —and escalate privileges to exfiltrate sensitive data, including personally identifiable information (PII) and financial records, which they host on platforms like MEGA.nz or for extortion purposes. The group frequently deploys ransomware variants, including and affiliates of ALPHV/BlackCat, to encrypt systems and demand payments, though their primary revenue stems from data leaks on extortion sites rather than consistent recoveries. Notable incidents include disruptions to giants, contributing to operational outages and estimated losses exceeding $100 million in a single case, alongside a surge in retail targets representing up to 11% of data leak victims in 2025. Despite law enforcement disruptions and arrests of suspected members—many of whom are young English-speaking individuals—the group demonstrates resilience through transient affiliations with ransomware networks like RansomHub and adaptation to new tactics, such as targeting applications and hybrid environments. Cybersecurity advisories from agencies like the FBI and CISA highlight Scattered Spider's expertise in bypassing traditional defenses, underscoring the need for enhanced identity verification and phishing-resistant to mitigate their persistent threat to .

Group Identification

Names and Designations

Scattered Spider is the principal name for this cybercrime group, originating from tracking by cybersecurity firm , which identified the actors' dispersed operations resembling a web spun across multiple locations. The designation reflects the group's use of English-speaking operatives, often young adults from the and , conducting financially motivated intrusions. Mandiant has designated the group as UNC3944, a tracking identifier assigned to cyber threat actors based on observed tactics, techniques, and procedures (TTPs) in intrusions targeting and enterprises. Other cybersecurity firms employ distinct labels, including Octo Tempest by the U.S. Department of Health and Human Services' Health Sector Cybersecurity Coordination Center (HHS HC3), which highlights the group's affiliations and social engineering focus. ' uses Muddled Libra to denote the actors' chaotic yet persistent extortion campaigns. Aliases linked to specific operations include 0ktapus (or Roasted 0ktapus), derived from a 2022 phishing campaign impersonating authentication services to steal credentials from multiple organizations. Starfraud appears in self-referential communications, such as extortion demands, and has been corroborated by firms like and (as Storm-0971 or DEV-0971). Additional operational monikers, such as Scatter Swine, have surfaced in threat intelligence reports tracking the group's evolution toward deployment with affiliates like ALPHV/BlackCat. These designations underscore the group's adaptability, with overlaps confirmed across federal advisories from the FBI and CISA, which prioritize the Scattered Spider label for inter-agency coordination.

Organizational Structure and Demographics

Scattered Spider functions as a decentralized, loose-knit rather than a rigidly , with operations coordinated by a small core of 2-4 senior operators who drive targeting and execution. This structure leverages external affiliates for initial access brokering, deployment, and negotiations, allowing flexibility and rapid adaptation despite disruptions. The group recruits and collaborates via online hacker forums, forming ad-hoc teams for specific intrusions while maintaining anonymity through compartmentalized roles. Demographically, Scattered Spider comprises primarily English-speaking young males based in the United States and , with members often in their teens or early twenties. Some participants are reported as young as 16, reflecting a youth-driven composition motivated by financial gain through and . Arrests underscore this profile: in 2024, U.S. authorities charged , including individuals linked to over 120 breaches, while police detained four suspects, among them 19-year-old British national Thalha Jubair accused of extensive intrusions yielding $115 million in ransoms. These actions have temporarily reduced activity but highlight the group's reliance on replaceable, geographically dispersed young operatives.

Historical Development

Early Formation and Activities (Pre-2023)

Scattered Spider, a cybercriminal tracked by cybersecurity firm as UNC3944, first exhibited notable activity in late 2021 through mid-2022, primarily through the deployment of kits like EIGHTBAIT to enable SMS-based (smishing) campaigns. These initial efforts targeted employees at telecommunication providers and (BPO) firms, leveraging stolen credentials to conduct SIM swapping attacks that hijacked victims' mobile numbers for unauthorized account access. The group's early tactics emphasized social engineering over technical exploits, with actors impersonating IT personnel via phone calls to solicit password resets or bypass (MFA) prompts. pages hosted on compromised or attacker-controlled domains forwarded captured credentials to Telegram channels, facilitating rapid SIM porting requests to mobile carriers. This approach supported secondary crimes such as cryptocurrency wallet drains and personal data extortion, though direct ransomware deployment remained absent in this phase. Primarily comprising young, English-speaking operatives based in the United States and , the loose-knit group coordinated via online forums and used commercial residential IP proxies to mask operations during and execution. Their focus on telecom infrastructure reflected a foundational reliance on human-targeted intrusions, yielding initial successes in evading detection through low-volume, personalized attacks rather than mass distribution. By late 2022, these activities had infiltrated multiple organizations, setting the stage for tactical evolution while maintaining a pattern of for leverage in negotiations.

Rise to Prominence (2022-2023)

Scattered Spider, tracked as UNC3944 by , began gaining traction in 2022 through sophisticated campaigns targeting telecommunications and (BPO) firms to facilitate SIM swapping and credential theft. The group, linked to the 0ktapus , deployed phishing kits mimicking legitimate authentication pages from providers like , compromising over 130 organizations including (targeted twice), , and Signal, primarily to harvest employee credentials for further intrusions. These efforts emphasized social engineering over traditional exploits, enabling initial access via SMS (smishing) and vishing to bypass (MFA) through tactics like push bombing and manipulation. By mid-2023, Scattered Spider escalated from data theft to deployment and , introducing new kits and targeting broader sectors such as and retail. The group's tactics evolved to include creating rogue virtual machines in victim environments for persistence, using tools like and for lateral movement, and exfiltrating data to services like MEGA.nz before encrypting systems with affiliates' strains. This shift marked a departure from pure credential harvesting, amplifying their operational impact and visibility within underground forums like Telegram. Prominence peaked in September 2023 with near-simultaneous breaches of major casinos and , attributed to social engineering attacks on IT help desks. On or around September 7, attackers compromised via a third-party , leading to and a $15 million payment out of a $30 million demand. faced disruption starting , with systems outages affecting slots, reservations, and operations for over a week, as Scattered Spider claimed responsibility and issued demands without immediate deployment. These incidents, disrupting high-profile businesses and drawing regulatory scrutiny, solidified the group's reputation as a persistent threat reliant on human-targeted intrusions rather than zero-day vulnerabilities.

Operational Tactics

Social Engineering and Phishing

Scattered Spider primarily relies on social engineering rather than zero-day exploits or advanced technical vulnerabilities for initial access, targeting human elements in IT help desks and employee authentication processes. The group employs vishing—spearphishing via voice calls—to impersonate legitimate employees or executives, often using publicly available personal details from sources like to build convincing narratives when contacting help desks for password resets or (MFA) token approvals. These calls frequently involve multiple attempts to probe and learn an organization's specific reset procedures before executing the primary breach. In phishing operations, Scattered Spider deploys smishing campaigns via messages containing links to organization-specific fake domains, such as "targetsname-helpdesk[.]com," designed to harvest credentials. They utilize frameworks like Evilginx to create sites that mimic legitimate portals, capturing both credentials and session to MFA protections. Domain impersonation tactics include (e.g., "c0mpany[.]com") and subdomain spoofing (e.g., "SSO.company[.]com") to evade detection, with over 80% of such domains mimicking vendors to target (SSO), VPN, and IT support systems. To overcome MFA barriers, actors conduct push bombing by flooding victims with repeated authentication prompts, exploiting user fatigue to elicit approvals, or perform SIM swaps by socially engineering cellular carriers to port victims' phone numbers to attacker-controlled , thereby intercepting SMS-based codes. These methods enable rapid acquisition, often supplemented by purchasing initial access from illicit markets, and are executed by English-fluent operators with minimal accents to enhance credibility against Western targets in sectors like , , and .

Technical Exploitation Techniques

Scattered Spider actors frequently leverage legitimate remote monitoring and management (RMM) tools such as TeamViewer, AnyDesk, Splashtop, ScreenConnect, Ngrok, Tailscale, Pulseway, Fleetdeck.io, and Tactical.RMM for post-compromise persistence and command-and-control (C2) operations, often deploying these via user-directed installation or stolen administrative access. These tools enable remote execution without deploying custom malware, aligning with living-off-the-land (LOTL) binaries to minimize detection. For credential access, the group employs to dump credentials from memory and LSASS processes, alongside infostealers like Raccoon Stealer and VIDAR for harvesting browser-stored data and tokens. They also target privileged credential managers such as and Thycotic Secret Server using custom scripts like SecretServerSecretStealer to extract vaulted secrets, and psPAS for enumeration. In cloud environments, actors abuse AWS profiles via calls (T1526) and session managers for lateral movement, while registering stolen multifactor authentication (MFA) tokens for sustained access. Lateral movement relies on native protocols including RDP (T1021), PsExec over (T1569.002), SSH, and LDAP/SAMR requests, supplemented by tools like for remote desktop and IMPACKET for protocol abuse. Privilege escalation involves modifying (SSO) tenants to federate with attacker-controlled identity providers, self-assigning compromised accounts to applications, or deploying PCUnlocker ISO images to reset local admin passwords. Discovery phases feature enumeration with ADRecon, SharePoint searches for VPN/VDI documentation, and Microsoft 365 Delve for data source mapping. Defense evasion incorporates bring-your-own-vulnerable-driver (BYOVD) techniques, such as STONESTOP and POORTRY to disable (EDR) agents, alongside registry deletions to suppress antivirus alerts and proxy chaining via Ngrok or Teleport for obfuscated C2. Rare zero-day or unpatched exploits include CVE-2021-35464 in Access Management for authentication bypass and CVE-2015-2291 in drivers for access, though the group predominantly favors credential-based over exploitation. Data exfiltration occurs via services like .nz, Amazon S3 buckets, or extract-transform-load (ETL) tools such as Airbyte and Fivetran for staging and syncing large datasets from SaaS platforms like or . For impact, actors deploy variants including ALPHV/BlackCat, , and RansomHub, often encrypting VMware ESXi hypervisors via SSH-transferred Python scripts or targeting for widespread disruption. These methods emphasize operational efficiency, with observed adaptations in 2024-2025 toward SaaS-specific and cloud-native persistence.

Ransomware Deployment and Extortion

Scattered Spider actors typically initiate ransomware deployment after gaining initial network access through social engineering, such as vishing or , followed by lateral movement to exfiltrate sensitive for leverage. This theft enables a double- model, where victims face both system and threats of publication on leak sites unless ransoms are paid, often in . The group has partnered with ransomware-as-a-service (RaaS) affiliates, including ALPHV/BlackCat, to execute these operations, sharing proceeds from successful extortions. Deployment involves targeting virtualized environments, particularly hypervisors, to achieve rapid encryption across multiple systems, reducing detection windows from days to hours. Observed tactics include via compromised credentials, deployment of custom scripts for data enumeration, and execution of ransomware payloads like RansomHub, , and , which encrypt files and append extensions such as ".qilin" or ".rhub". In some incidents, actors have customized variants to evade detection, prioritizing high-value sectors like and for maximum disruption. Extortion demands vary by victim scale, ranging from millions in or , with negotiations conducted via encrypted channels or victim portals on RaaS leak sites. Refusal to pay prompts phased data leaks to pressure compliance, as seen in affiliations with groups publicizing stolen datasets exceeding terabytes in size. This approach exploits operational downtime costs, with encrypted systems rendering services inoperable until decryption keys are provided post-payment. notes that Scattered Spider's English-speaking operators often reference victim-specific details in demands to heighten urgency.

Major Incidents

2023 Casino Breaches

In September 2023, the cybercriminal collective known as Scattered Spider, also tracked as UNC3944, executed targeted intrusions against two major Las Vegas-based casino and hospitality operators: Caesars Entertainment and MGM Resorts International. These incidents, occurring within days of each other, relied heavily on social engineering techniques such as vishing—voice phishing—to deceive IT help desk personnel into divulging or resetting credentials, bypassing multi-factor authentication through fatigue attacks or direct manipulation. The group exploited publicly available information from platforms like LinkedIn to impersonate executives or employees, facilitating initial access to vendor systems and escalating privileges within corporate networks. Following access, Scattered Spider exfiltrated sensitive customer data, including loyalty program details with personal identifiers and partial payment information, before issuing extortion demands.

Caesars Entertainment Attack (September 2023)

On or around September 7, 2023, Scattered Spider initiated the Caesars breach by targeting a third-party IT vendor via engineering, tricking staff into providing access credentials. The intruders subsequently stole data on approximately 10.6 million customers from the , encompassing names, addresses, phone numbers, and partial details dating back to 2018. In response to the threat, paid an estimated $15 million ransom—half of the $30 million demanded—to affiliates of the ALPHV/BlackCat operation, with whom Scattered Spider collaborated for data monetization. This payment, disclosed in a September 2023 , mitigated widespread operational disruptions, allowing the company to restore systems more swiftly than in comparable incidents, though it drew criticism for incentivizing further attacks. notified affected individuals and enhanced security protocols post-breach, but the event underscored vulnerabilities in outsourced IT chains.

MGM Resorts International Attack (September 2023)

Scattered Spider gained initial access to MGM Resorts' network on September 11, 2023, again through vishing attacks on help desk resources, impersonating legitimate users to obtain system credentials. The compromise triggered ransomware deployment, encrypting systems and disrupting operations across MGM properties, including slot machines, hotel check-ins, digital keys, and reservation platforms, resulting in an estimated 10-day outage. Unlike Caesars, MGM refused to pay the ransom, leading Scattered Spider and ALPHV affiliates to leak over 100 gigabytes of stolen data—including customer PII and internal documents—on underground forums starting September 14, 2023. The attack caused financial losses exceeding $100 million in revenue and remediation costs, as reported by MGM in SEC disclosures, while prompting FBI involvement in the investigation. Full system recovery extended into late September, with lingering effects on guest services and highlighting the risks of non-payment in extortion scenarios.

Caesars Entertainment Attack (September 2023)

In early September 2023, Scattered Spider (also known as UNC3944) targeted Caesars Entertainment through social engineering, specifically by impersonating a company employee to deceive a third-party IT support vendor into providing access credentials. This vishing (voice phishing) tactic enabled initial system infiltration without widespread technical exploits. The resulted in the of sensitive from a significant portion of ' loyalty program members, including driver's license numbers and Social Security numbers (SSNs), affecting customer and exposing the company to potential risks. Scattered Spider, operating as an affiliate of the ALPHV/BlackCat ransomware-as-a-service group, threatened to publicly release the stolen unless a was paid. Caesars negotiated with the attackers and paid approximately $15 million—half of an initial $30 million demand—to secure the deletion of exfiltrated data and limit further harm, as detailed in the company's subsequent . This swift payment minimized operational disruptions, such as system outages or service interruptions, unlike peer incidents in the sector during the same period. The company disclosed the incident publicly on September 14, 2023, confirming the data theft but emphasizing no material impact on operations due to the resolution. Attribution to Scattered Spider stemmed from the group's own claims of data theft from and aligned forensic indicators, including shared tactics with contemporaneous breaches.

MGM Resorts International Attack (September 2023)

The cyberattack occurred on , 2023, when the hacking group Scattered Spider gained unauthorized access to the company's systems through social engineering tactics targeting the IT . Attackers impersonated MGM employees using details gathered from profiles and other open sources to conduct vishing attacks, convincing personnel to reset (MFA) credentials or provide one-time passwords. This initial foothold exploited weak MFA controls and password reuse, allowing escalation to privileged access in identity management and cloud environments, where attackers configured unauthorized inbound federation to maintain persistence. Following access, Scattered Spider collaborated with the ALPHV/BlackCat -as-a-service operation to deploy , encrypting approximately 100 hypervisors and exfiltrating around 6 terabytes of data, including customer information such as names, contact details, dates of birth, numbers, and records. MGM Resorts refused to pay the demanded ransom, prompting the group to publicly claim responsibility on September 14, 2023, and threaten data leaks. The intrusion caused severe operational disruptions across MGM properties, particularly in , halting slot machines, online reservations, digital room keys, elevators, and point-of-sale systems for about 10 days, forcing manual operations and affecting thousands of guests. In response, shut down affected systems to contain the , engaged cybersecurity firms and the FBI for , and incurred $100 million in third-quarter losses, including $84 million in revenue shortfalls and $10 million in remediation costs, though no confirmed evidence of customer financial data compromise emerged. The company offered affected individuals credit monitoring and protection services while committing up to $40 million to enhance IT , highlighting vulnerabilities in as a key lesson from the incident.

Snowflake Data Warehouse Compromises (2023)

In 2023, Scattered Spider (tracked as UNC3944 by ) incorporated targeting of victims' data warehouse instances as a key tactic for following initial network compromise. After gaining access via social engineering—such as vishing personnel or exploiting stolen credentials—actors performed to identify environments, enabling rapid querying and export of sensitive data without deploying persistent . This method leveraged 's native SQL capabilities, such as SELECT statements and COPY INTO for external staging, to steal terabytes of information in hours, often prioritizing customer records, financial details, and for . The U.S. (CISA), in coordination with international partners, documented this behavior in a November 3, 2023, advisory, noting its prevalence across intrusions into sectors like , , and . For instance, actors scanned compromised endpoints for Snowflake client tools like or configuration files containing authentication tokens, bypassing (MFA) gaps or network controls in many cases. While specific victim counts tied exclusively to Snowflake exfiltration remain undisclosed, the tactic aligned with Scattered Spider's 2023 campaigns, which emphasized data theft over immediate deployment to maximize leverage in negotiations. Mandiant reported potential overlaps with other actors, such as UNC5537, which exploited infostealer-compromised credentials dating back to 2020 but active into 2023; however, Scattered Spider's approach distinctly relied on live pivoting from footholds rather than credential marketplaces alone. No evidence indicates direct of 's core ; attacks targeted customer-hosted instances lacking MFA or IP allowlisting. This pattern contributed to heightened alerts, with over 165 customers later assessed for exposure risks, underscoring systemic vulnerabilities in data configurations.

Expansions into Other Sectors (2023-2025)

Following successes in the gaming industry, Scattered Spider shifted focus to organizations in early 2025, deploying to disrupt operations and exfiltrate data. In April 2025, the group compromised UK-based retailer during the weekend, encrypting virtual desktop infrastructure with and causing widespread system outages. This exemplified their use of social engineering to gain initial access, followed by lateral movement and demands. By mid-2025, Scattered Spider pivoted to the sector, exploiting vulnerabilities in help desks and environments to target financial data and policyholder information. Attacks commenced around early June 2025, with U.S. insurer disclosing a that potentially exposed sensitive customer records through credential and SIM-swapping tactics. observed this expansion as a direct evolution from campaigns, prioritizing high-value sectors with large customer bases for . The group also probed aviation and transportation firms in Q2 2025, aiming to compromise operational systems amid their reliance on third-party IT support. and reported Scattered Spider's interest in airlines, using and push-bombing to bypass and access booking or platforms. No major public disruptions were confirmed by October 2025, but the incursions highlighted risks to dependencies. noted these cross-sector escalations as part of broader adaptations, including targeting and firms for scalable access.

Impacts and Consequences

Operational Disruptions and Financial Losses

The September 2023 attack on Resorts by Scattered Spider led to approximately 10 days of widespread operational outages beginning , crippling slot machines, online booking systems, digital room keys, and point-of-sale terminals across multiple properties, which locked guests out of rooms and halted and services. refused the demand, resulting in $100 million in third-quarter losses, including $84 million from forgone revenue and additional remediation expenses. In contrast, Caesars Entertainment's concurrent breach around September 7, 2023, prompted a $15 million ransom payment—half of the $30 million demanded—to limit damage, though networks still suffered severe impairment with shorter but notable disruptions to data and operations. Scattered Spider's 2023-2025 expansions into , , and other sectors have yielded similar effects, including failures and online order processing halts at targeted retailers like , alongside incidents in mid-2025 that disrupted flight operations and booking platforms. The group's overall campaigns have secured at least $115 million in ransoms across incidents from 2022 onward, compounding victims' costs through data theft remediation and business interruptions beyond direct payments. The 2023-2024 Snowflake customer compromises, linked to Scattered Spider tactics, focused on for rather than platform-wide shutdowns, but inflicted financial burdens on affected entities through stolen records—potentially numbering in the hundreds of millions across like auto parts and lending firms—via notifications, credit monitoring, and leaked data exploitation.

Security and Policy Implications for Victims

Victims of Scattered Spider attacks, such as and in September 2023, have encountered significant vulnerabilities in operations, where social engineering tactics like vishing enabled initial access through impersonation and unauthorized credential issuance. To mitigate this, organizations must implement stringent verification protocols for password resets and (MFA) token transfers, including mandatory callbacks to known contact numbers and scrutiny of caller details beyond superficial identifiers. Training IT and personnel to detect vishing attempts—characterized by urgency, lack of standard procedures, or inconsistencies in employee profiles sourced from public platforms like —has become a critical policy shift, as weak policies allowed attackers to bypass technical controls. The group's exploitation of MFA fatigue (push bombing) and SIM swapping underscores the limitations of non-phishing-resistant methods like or app-based approvals, prompting victims to adopt hardware-based or certificate-authenticated MFA, such as FIDO2 or PKI, enforced across all remote access points including VPNs and . In the 2023 Snowflake compromises, where stolen credentials from infostealer enabled without MFA, affected entities were advised to mandate phishing-resistant MFA universally and conduct credential audits to invalidate compromised accounts. Policy implications extend to logging and monitoring interactions for anomalies, such as unusual reset volumes, and integrating these into broader identity governance frameworks to isolate privileged accounts and prevent lateral movement. Operational policies for victims also necessitate to contain breaches, regular testing of offline encrypted backups to ensure recovery without payment, and disabling legacy protocols like RDP where feasible. Post-incident, entities like MGM Resorts allocated substantial resources—reportedly $50 million in late 2024—to detection, enhancements, and employee programs, reflecting a causal link between social engineering entry points and the need for holistic resilience against double-extortion tactics. These measures address the group's evolution, where initial access facilitates deployment on hypervisors like , emphasizing proactive detection of unauthorized remote tools and real-time authentication logging to disrupt extortion chains. Overall, victims must prioritize human-centric defenses alongside technical ones, as empirical evidence from tracked incidents shows social engineering as the predominant vector, rendering traditional perimeter insufficient without policy-enforced behavioral controls.

Law Enforcement Response

Investigations and International Cooperation

The (FBI) spearheaded investigations into Scattered Spider, also known as Octo Tempest or UNC3944, following high-profile breaches such as the September 2023 attacks on and , attributing the group's tactics—including social engineering and SIM-swapping—to a loose network of English-speaking actors primarily based in the United States and . FBI efforts expanded to track the group's involvement in over 120 network intrusions worldwide by 2025, incorporating on victim systems and analysis of leaked data on forums to map operational patterns like help desks and demands exceeding $115 million in ransoms. International cooperation proved essential given the group's cross-border structure, with the FBI partnering closely with the United Kingdom's (NCA) and regional forces like to share intelligence on suspects' communications, financial flows, and physical locations, enabling coordinated surveillance and evidence collection. This collaboration facilitated parallel legal actions, such as the September 18, 2025, arrest in of a UK national charged concurrently under U.S. and British jurisdictions for conspiracies tied to Scattered Spider operations. Earlier joint efforts in 2024 supported U.S. indictments against five alleged members, drawing on UK-sourced data to link domestic actors to victims including transport systems and retailers. Broader multinational advisories underscored the cooperative framework, with the FBI contributing investigative findings up to June 2025 to joint cybersecurity alerts issued by agencies like the (CISA), highlighting Scattered Spider's tactics to aid global victim hardening without compromising ongoing probes. Such partnerships emphasized real-time intelligence exchanges over formal extradition treaties, addressing jurisdictional challenges in prosecuting a decentralized group that evaded traditional malware-focused attribution.

Arrests, Indictments, and Prosecutions (2023-2025)

Law enforcement actions against Scattered Spider members intensified in 2024, beginning with the arrest of Noah Michael Urban, a 20-year-old from , also known as "Sosa" and "Elijah," on January 10, 2024, for wire , , and aggravated related to SIM-swapping attacks that facilitated group intrusions. On November 20, 2024, the U.S. Department of Justice unsealed indictments against five alleged members in the Central District of California for a and scheme targeting corporate employees nationwide, charging them with to commit wire , aggravated , and related offenses that enabled data theft and deployment. The indicted individuals included Austin Lee Buchanan, 19, of ; Ahmed Hossam Eldin Elbadawy, 23, of (aka "AD"); Noah Michael Urban, 20, of ; Evans Onyeaka Osiebo, 20, of , Texas; and Joel Martin Evans, 25 (aka "joeleoli"), of , with Evans arrested immediately following the unsealing. Urban pleaded guilty in April 2025 to wire fraud and conspiracy charges stemming from his role in SIM-swapping over 100 victims to access accounts and , actions linked to Scattered Spider's broader operations. On August 20, 2025, he was sentenced to 10 years in and ordered to pay $13 million in restitution, marking the first major prosecution outcome tied to the group's tactics. In September 2025, U.S. and authorities coordinated arrests of key figures. A 17-year-old from , who was 15 at the time of the offenses, surrendered to authorities on September 19, 2025, facing juvenile charges for his alleged role in the September 2023 cyberattacks on and , which involved social engineering and resulted in Caesars paying approximately $15 million in demands. The juvenile was released to parental custody following a appearance on September 24, 2025, despite prosecutors' objections. Concurrently, on September 16, 2025, the UK's arrested Thalha Jubair, 19, from , and Owen Flowers, 18, from Walsall, West Midlands, initially for a cyber intrusion against , but investigations linked them to Scattered Spider's global activities. Jubair faced additional U.S. charges unsealed on September 18, 2025, including conspiracy to commit , wire fraud, and , for participating in over 120 network intrusions affecting 47 U.S. entities, including and the U.S. Courts system in October 2024 and January 2025, with victims paying at least $115 million in ransoms traced to wallets he controlled. Flowers, arrested alongside Jubair, was charged in the UK for the TfL attack and held in connection with broader Scattered Spider operations, including prior detention in September 2024 for related intrusions. These actions highlighted ongoing international efforts, though prosecutions for Jubair and Flowers remained pending as of October 2025, with U.S. authorities seizing $36 million in linked to the .

Ongoing Evolution and Threats

Adaptations in Tactics Post-Arrests

Following the arrests of multiple alleged members in late 2024 and through September 2025, including Noah Michael Urban's sentencing on August 21, 2025, for SIM-swapping schemes, and arrests of Thalha Jubair and Owen Flowers on September 17, 2025, Scattered Spider exhibited tactical resilience by refining social engineering and access techniques to evade heightened law enforcement scrutiny. The group maintained operational continuity, with observed attacks on retailers like in early 2025 demonstrating evolved methods despite claims of retirement, which U.S. prosecutors linked to ongoing conspiracies exceeding $115 million in extortions. Key adaptations included an intensified emphasis on MFA fatigue attacks—bombarding targets with authentication prompts to induce approval—and (vishing) to impersonate employees, tricking help desks into resetting credentials or MFA without full verification. This built on prior tactics but incorporated more targeted via domains mimicking victim portals, such as "victimname-sso[.]com," to capture sessions post-social engineering gains. A joint FBI-CISA advisory on July 29, 2025, highlighted these shifts, noting persistent use of legitimate remote tools like and Ngrok for command-and-control, alongside living-off-the-land techniques abusing RDP, SSH, and LDAP for lateral movement. Post-arrest, Scattered Spider integrated new malware variants for stealthier persistence, such as for , and pivoted to ransomware-as-a-service models, deploying against environments in April 2025 incidents. increasingly targeted like MEGA.nz and , enabling faster leaks to pressure victims. While core activity declined after November 2024 indictments of five members, the group's tactics proliferated among copycat actors, amplifying broader threats through shared social engineering playbooks focused on junior IT staff in tech and retail sectors.

Current Activity and Mitigation Challenges (as of 2025)

As of mid-2025, Scattered Spider, also tracked as UNC3944, continues to conduct financially motivated cyberattacks, emphasizing social engineering over traditional exploits to target help desks and IT support in sectors including , , , and technology. The group has escalated operations, with notable campaigns against retailers such as and in April-May 2025, involving for and deployment. A joint advisory from the FBI, CISA, and international partners on July 29, 2025, highlighted their use of kits, domain impersonation, and "email bombing" to overwhelm targets and facilitate account takeovers. Evolving tactics include bypassing (MFA) via SIM swapping and coercing insiders, alongside integration with affiliates like for broader "supergroup" operations blending LAPSUS$ and Scattered Spider methods. Despite arrests, such as the September 18, 2025, charging of a national linked to multiple schemes, the collective persists by recruiting via online forums and adapting to disruptions. Mitigation remains challenging due to the group's heavy reliance on human-targeted social , which evades automated defenses like endpoint detection, necessitating enhanced employee training and verification protocols that many organizations struggle to implement consistently. Their English-speaking, Western operators leverage (OSINT) for reconnaissance, complicating attribution and response across jurisdictions, while rapid tactic shifts—such as exploiting misconfigurations post-MFA hardening—outpace patches. Industry-specific targeting, including insurance firms like in June 2025, amplifies financial incentives, with demands often yielding payouts despite tools being secondary to theft. Cross-sector collaboration, as urged in August 2025 Health-ISAC guidance, is hindered by siloed defenses and underreporting of incidents to avoid regulatory scrutiny.

References

  1. [1]
    Scattered Spider - CISA
    Scattered Spider is a cybercriminal group that targets large companies and their contracted information technology (IT) help desks.
  2. [2]
    Defending Against UNC3944: Cybercrime Hardening Guidance ...
    May 6, 2025 · Proactive hardening recommendations to defend against UNC3944, aka Scattered Spider, a financially-motivated threat group.
  3. [3]
    Scattered Spider: What You Need to Know - Varonis
    Get details on a prominent threat group and defensive recommendations to keep your organization's sensitive data secure.
  4. [4]
    A Comprehensive Report on Scattered Spider - FalconFeeds.io
    Jul 3, 2025 · ... Starfraud, Scatter Swine, Roasted 0ktapus, and simply 0ktapus. The name "Scattered Spider" itself was coined by CrowdStrike, with "Spider ...
  5. [5]
    [PDF] hc3 tlp clear threat actor profile scattered spider-10-24-2024.pdf
    Oct 24, 2024 · Scattered Spider threat actors are considered experts in social engineering. Previously, on April 3, 2024,. HC3 published a Sector Alert ...
  6. [6]
    FBI shares tactics of notorious Scattered Spider hacker collective
    Nov 16, 2023 · Scattered Spider, also known as 0ktapus, Starfraud, UNC3944, Scatter Swine, Octo Tempest, and Muddled Libra, is adept at social engineering ...
  7. [7]
    FBI Lifts the Lid on Notorious Scattered Spider Group
    Nov 17, 2023 · The group (also known as 0ktapus, Starfraud, UNC3944, Scatter Swine, Octo Tempest and Muddled Libra) is thought to be responsible for big ...
  8. [8]
    US charges five Scattered Spider members - Risky Biz News
    Nov 22, 2024 · ... Star Fraud (SentinelOne), and Muddled Libra (Unit42). Scattered Spider is not a "hacking group" in the classic meaning of the word, but more ...<|control11|><|separator|>
  9. [9]
  10. [10]
    Scattered Spider laying new eggs - Sekoia.io Blog
    Feb 22, 2024 · Scattered Spider (aka UNC3944, Scatter Swine, Muddled Libra, Octo Tempest, Oktapus, StarFraud) is a lucrative intrusion set active since at ...
  11. [11]
    Four Key Players Drive Scattered Spider - Lawfare
    Jul 11, 2025 · A small number of key individuals are organizing the activities of the group known as Scattered Spider, according to researchers at security firms.Missing: structure demographics
  12. [12]
    A Group of Young Cybercriminals Poses the 'Most Imminent Threat ...
    Jul 2, 2025 · The Scattered Spider hacking group has caused chaos among retailers, insurers, and airlines in recent months. Researchers warn that its ...
  13. [13]
    Who are Scattered Spider? How the notorious hackers linked to ...
    May 2, 2025 · M&S may have been hacked by a group of notorious cyber-criminals known as Scattered Spider, some of whom are believed to be English-speaking teenagers.<|control11|><|separator|>
  14. [14]
    120 Breaches: 2 Teens Arrested for 'Scattered Spider' Hacking Spree
    Sep 18, 2025 · The US has charged one of the suspects, 19-year-old UK national Thalha Jubair, for his alleged involvement in at least 120 intrusions while ...
  15. [15]
    Pair of Suspected Scattered Spider Hackers Charged by UK, US ...
    Sep 18, 2025 · One of the teenage suspects is accused of involvement in at least 120 attacks, resulting in $115m in ransom payments.Missing: names | Show results with:names
  16. [16]
    Why Are You Texting Me? UNC3944 Leverages SMS Phishing ...
    Sep 14, 2023 · The following sections organize UNC3944's TTPs by the stages of the Mandiant attack lifecycle model and focus on activity observed during ...
  17. [17]
    'Power, influence, notoriety': The Gen-Z hackers who struck MGM ...
    Sep 22, 2023 · About a year ago, the U.S. security firm Palo Alto Networks began to hear from a flurry of companies that had been hacked in ways that ...
  18. [18]
    0ktapus phishing campaign has attacked over 130 companies
    Aug 26, 2022 · Organizations, including Twilio, DoorDash, and Signal, have been potentially compromised by hackers, with login credentials belonging to ...Missing: Spider | Show results with:Spider
  19. [19]
    The rise and fall of the 'Scattered Spider' hackers - TechCrunch
    Nov 23, 2024 · The prolific hacking group broke into Caesars Entertainment, Coinbase, DoorDash, Mailchimp, Riot Games, Twilio (twice), and dozens more.
  20. [20]
    MGM Resorts breached by 'Scattered Spider' hackers: sources
    Sep 13, 2023 · A hacking group named Scattered Spider brought down the systems of the $14 billion gaming giant MGM Resorts International (MGM.N) this week.
  21. [21]
    An Overview of the MGM Cyber Attack
    ### Timeline of the MGM Cyber Attack (September 2023)
  22. [22]
    A Look Back at the MGM and Caesars Incident
    The MGM Resorts International and Caesars Entertainment cyberattacks in September 2023 serve as a cautionary tale for those in the cyber world.
  23. [23]
    Scattered Spider weaves web of social-engineered destruction
    social engineering and phishing — makes it difficult for most threat hunters to attribute ...
  24. [24]
    Scattered Spider: Rapid7 Insights, Observations, and ...
    Jul 3, 2025 · Scattered Spider is a cybercrime group known for targeting enterprises via social engineering. Learn their TTPs, defenses, and more in our ...
  25. [25]
    Scattered Spider Targets Tech Companies for Help-Desk Exploitation
    Jun 5, 2025 · Metadescription: A new wave of cyber attacks from Scattered Spider use coordinated social engineering, phishing, and domain impersonation.
  26. [26]
    Inside Scattered Spider: Evolving TTPs Exposed - Darktrace
    Jul 24, 2025 · Untangling the web: Darktrace's investigation of Scattered Spider's evolving tactics. Learn about a recent Scattered Spider attack observed by ...
  27. [27]
    An Analysis of Tactics and Techniques Attributed to Scattered Spider
    Jun 12, 2024 · This report provides additional insight into an aggressive and sophisticated threat actor and threat group that continues to attack and extort organizations ...
  28. [28]
    UNC3944 Targets SaaS Applications | Google Cloud Blog
    Jun 13, 2024 · ... Scattered Spider" and has been observed adapting its tactics to include data theft from software-as-a-service (SaaS) applications to ...
  29. [29]
    SCATTERED SPIDER Escalates Attacks Across Industries
    Jul 2, 2025 · CrowdStrike Services details SCATTERED SPIDER techniques used in attacks targeting the aviation, insurance, and retail sectors and shares guidance for ...
  30. [30]
    [PDF] Scattered Spider & BlackCat Ransomware: Mitigation Guidance
    The threat actor initially gained notoriety by obtaining Okta identity credentials and multifactor authentication. (MFA) codes to conduct supply chain attacks ...
  31. [31]
    Scattered Spider: The Group Behind Major ESXi Ransomware Attacks
    Jul 9, 2025 · Scattered Spider (aka UNC3944, 0ktapus, & Muddled Libra) is one of the most dangerous threat clusters in operation.<|control11|><|separator|>
  32. [32]
    Scattered Spider Adopts RansomHub and Qilin Ransomware for ...
    Jul 17, 2024 · Microsoft reveals Scattered Spider's use of RansomHub and Qilin ransomware. Learn about the evolving cybercrime landscape and new ransomware ...
  33. [33]
    MSPs & IT Vendors Targeted by Scattered Spider Threat Group
    Jun 10, 2025 · Last month, Scattered Spider conducted two DragonForce ransomware attacks on the UK retailers Marks & Spencer and Harrods. While investigating ...
  34. [34]
    Scattered Spider Ransomware Group: Activity, TTPs, & More
    Jun 24, 2025 · ... Starfraud1) is a highly active and increasingly sophisticated attack group. Operational since at least 2022, Scattered Spider has been ...
  35. [35]
    Scattered Spider Ramps Up Ransomware in 2025 Cyber Alert - Cyble
    Aug 4, 2025 · Global agencies warn of Scattered Spider's new ransomware tactics, identity hijacking, and data theft in a July 2025 advisory.
  36. [36]
    [PDF] This PHISH Cost one casino $100 Million - Cyber Security in Delaware
    The hotel and casino company first disclosed it had been targeted by a large-scale cyberattack on September 11. The cyberattack, which was days later claimed by ...Missing: cybercrime | Show results with:cybercrime
  37. [37]
    MGM, Caesars Entertainment hacked by 'Scattered Spider ... - Reuters
    Sep 13, 2023 · The FBI said it was investigating the MGM hack. The rating agency Moody's warned the incident could negatively impact MGM's credit rating.
  38. [38]
    An Overview of the MGM Cyber Attack - Netwrix
    Feb 14, 2025 · If you have ever been to a Las Vegas casino, then you know that they are literally money-making machines as people bet money on a variety of ...
  39. [39]
    Understanding the MGM and Caesars Cyberattacks: Lessons Learned
    Scattered Spider gained entry to Caesars' system by deceiving a third-party IT support vendor. The group impersonated a Caesars employee and convinced the ...Missing: tactics | Show results with:tactics
  40. [40]
    Caesars Entertainment says social-engineering attack behind ...
    Oct 9, 2023 · Scattered Spider is suspected of working with a group called AlphV/BlackCat, using a voice-phishing technique to trick IT support or call center ...
  41. [41]
    Hackers say they stole 6 terabytes of data from casino giants MGM ...
    Sep 14, 2023 · 7 hackers took data on a significant number of its loyalty program members, including "driver's license numbers and/or social security numbers." ...
  42. [42]
    Caesars paid millions in ransom to cybercrime group prior to MGM ...
    Sep 14, 2023 · Casino operator Caesars paid out a ransom worth $15 million to a cybercrime group that managed to infiltrate and disrupt its systems.
  43. [43]
    Caesars Entertainment Reportedly Pays Ransom to Attackers
    Sep 14, 2023 · Hotel and casino giant Caesars Entertainment paid approximately half of an initial $30 million ransom demand to attackers who infected its ...
  44. [44]
    Threat Actors UNC3944 Responsible for MGM Cyber Attack
    Sep 21, 2023 · MGM Resorts, along with Caesars Entertainment, were among five Okta clients targeted by a threat actor known as UNC3944, also referred to as Scattered Spider, ...
  45. [45]
    The MGM Resorts Attack: Initial Analysis - CyberArk
    Sep 22, 2023 · In this blog post, we will dive into the details of the attack based on the information currently available, analyze its root causes and discuss key takeaways.<|separator|>
  46. [46]
    [PDF] M-Trends 2025 Report - Google
    Organizations identified the first evidence of malicious activity internally in 31% of Mandiant investigations in the JAPAC region in 2024. External ...
  47. [47]
    Over 165 Snowflake customers didn't use MFA, says Mandiant
    Jun 11, 2024 · "Mandiant is investigating the possibility that a member of UNC5537 collaborated with UNC3944 on at least one past intrusion in the past six ...
  48. [48]
    UNC5537 Targets Snowflake Customer Instances for Data Theft and ...
    Jun 10, 2024 · UNC5537 is systematically compromising Snowflake customer instances using stolen customer credentials, advertising victim data for sale on ...
  49. [49]
    5 of the biggest cyber attacks of 2025 (So far)
    Jun 30, 2025 · During the Easter weekend in April, the retailer Marks & Spencer (M&S) suffered a major cyberattack, attributed to the gang Scattered Spider.Missing: 2023-2025 | Show results with:2023-2025
  50. [50]
    Data Breaches 2025: Biggest Cybersecurity Incidents So Far
    Sep 2, 2025 · In May 2025, M&S suffered a major cyberattack attributed to the “Scattered Spider” group, deploying DragonForce ransomware to encrypt virtual ...
  51. [51]
    Shoplifting 2.0: When it's Data the Thieves Steal | SANS Institute
    May 21, 2025 · Reports indicate that the attacks can be attributed to Scattered Spider with DragonForce ransomware being deployed to encrypt data and disrupt operations.
  52. [52]
    Scattered Spider, fresh off retail sector attack spree, pivots to ...
    Jun 16, 2025 · Mandiant Consulting CTO Charles Carmakal said Scattered Spider's attacks targeting the insurance sector started about a week and a half ago.Missing: healthcare telecom<|control11|><|separator|>
  53. [53]
    Scattered Spider Cyber Criminals Turn to Insurance Companies as ...
    Jun 23, 2025 · U.S. supplemental insurance vendor Aflac disclosed that it experienced a cyberattack earlier this month that potentially affected the ...
  54. [54]
    Tech firms warn 'Scattered Spider' hacks are targeting aviation sector
    Jun 27, 2025 · Tech companies Google and Palo Alto Networks are sounding the alarm over the "Scattered Spider" hacking group's interest in the aviation sector.
  55. [55]
    Scattered Spider expands its roster of tactics in recent hacks
    Jul 16, 2025 · Microsoft researchers warn they are seeing changing patterns as the cybercrime group has started trying to hack airlines and other industriesMissing: expansions 2023-2025
  56. [56]
    [PDF] MGM/CAESARS CYBER INCIDENT ANALYSIS - Guy Carpenter
    The alleged attackers—Scattered Spider/APLHV—were able to damage networks of both companies severely and, in MGM's case, lead to operational outages lasting 10.
  57. [57]
    MGM loses $100M, refused to pay ransom to end cyberattack
    Oct 6, 2023 · The 10-day cyberattack that crippled MGM Resorts' operations is reportedly set to cost the hospitality behemoth more than $100 million.
  58. [58]
    Scattered Spider's Relentless Campaign - ExtraHop
    Jul 15, 2025 · These incidents often resulted in significant operational disruptions. Aviation (Late June - July 2025): Most recently, the FBI issued a formal ...Missing: examples | Show results with:examples
  59. [59]
    DOJ: Scattered Spider took $115 million in ransoms, breached a US ...
    Sep 19, 2025 · The Scattered Spider cybercriminal operation was able to extort at least $115 million in a three-year spree that also included the breach of ...Missing: collected | Show results with:collected
  60. [60]
    The Snowflake Attack May Be Turning Into One of the Largest Data ...
    Jun 6, 2024 · A hack against customers of the cloud storage company Snowflake looks like it may turn into one of the biggest-ever data breaches.
  61. [61]
    5 Lessons From the MGM and Caesars Casinos Cyberattacks | Built In
    Oct 17, 2023 · Social engineering can overcome weak help desk policies. · Voice phishing (vishing) is on the rise. · Multi-factor authentication isn't infallible ...
  62. [62]
    Cyber Attack & Breach on the MGM Resort Explained. Details of the ...
    Scattered Spider also claimed responsibility for a near-simultaneous hack on Caesars Entertainment, another Las Vegas casino giant. Subsequent reporting ...<|control11|><|separator|>
  63. [63]
    Scattered Spider Isn't a Glitch, It's a Warning - Splunk
    Jul 18, 2025 · Scattered Spider uses social engineering to exploit identity systems and disrupt business operations. Boards must act urgently to close ...
  64. [64]
    United Kingdom National Charged in Connection with Multiple ...
    Sep 18, 2025 · “Jubair is alleged to have participated in a sweeping cyber extortion scheme carried out by a group known as Scattered Spider, which committed ...
  65. [65]
    Two charged for TfL cyber attack - National Crime Agency
    Sep 18, 2025 · Two men have been charged as part of the National Crime Agency investigation into a cyber attack on Transport for London (TfL).Missing: cooperation | Show results with:cooperation
  66. [66]
    US charges five in 'Scattered Spider' hacking scheme - Reuters
    Nov 20, 2024 · US prosecutors unveiled criminal charges on Wednesday against five alleged members of Scattered Spider, a loose-knit community of hackers suspected of breaking ...
  67. [67]
    Feds Tie 'Scattered Spider' Duo to $115M in Ransoms
    Sep 24, 2025 · U.S. prosecutors last week levied criminal hacking charges against 19-year-old U.K. national Thalha Jubair for allegedly being a core member ...
  68. [68]
    SIM-Swapper, Scattered Spider Hacker Gets 10 Years
    Aug 20, 2025 · Noah Michael Urban of Palm Coast, Fla. pleaded guilty in April 2025 to charges of wire fraud and conspiracy. Florida prosecutors alleged Urban ...Missing: origins | Show results with:origins
  69. [69]
    Scattered Spider Hacker Gets 10 Years, $13M Restitution for SIM ...
    Aug 21, 2025 · Noah Michael Urban pleaded guilty to charges related to wire fraud and aggravated identity theft back in April 2025. News of Urban's ...
  70. [70]
    5 Defendants Charged Federally with Running Scheme that ...
    Nov 20, 2024 · Law enforcement today unsealed criminal charges against five defendants who allegedly targeted employees of companies nationwide with phishing text messages.
  71. [71]
    Five alleged members of Scattered Spider cybercrime group ...
    Nov 20, 2024 · Ahmed Hossam Eldin Elbadawy, 23, of College Station, Texas; · Noah Michael Urban, 20, of Palm Coast, Florida; · Evans Onyeaka Osiebo, 20, of ...<|separator|>
  72. [72]
    Scattered Spider Hacker Sentenced to Prison - SecurityWeek
    Aug 21, 2025 · The individual, Noah Michael Urban, 20, of Palm Coast, Florida, was arrested in January 2024 and indicted in November 2024. Earlier this year, ...Missing: prosecutions | Show results with:prosecutions<|separator|>
  73. [73]
  74. [74]
    Las Vegas police arrest minor accused of high-profile 2023 casino ...
    Sep 22, 2025 · Officials accused the teenage boy of working with Scattered Spider, which attacked MGM Resorts and Caesars Entertainment in 2023.
  75. [75]
    Teen charged in Vegas casino cyberattacks ordered released | Courts
    Sep 24, 2025 · A teen accused of participating in 2023 cyberattacks against two major Las Vegas resort operators was released to his parents on Wednesday.
  76. [76]
  77. [77]
    U.K. Arrests Two Teen Scattered Spider Hackers Linked to August ...
    Sep 19, 2025 · It's worth noting that Flowers was initially arrested for his alleged involvement in the TfL attack in September 2024, but was subsequently ...
  78. [78]
    UK arrests 2 more alleged Scattered Spider hackers over London ...
    Sep 18, 2025 · In July, the NCA arrested four apparent members of Scattered Spider, ranging in age from 17 to 20, for allegedly hacking the British retailers ...
  79. [79]
    Scattered Spider tactics continue to evolve, warn cyber cops
    Jul 30, 2025 · Scattered Spider surged back to prominence earlier in 2025, at first with a round of cyber attacks on UK retailers Marks & Spencer, Co-op Group ...
  80. [80]
    Scattered Spider Activity Drops Following Arrests, but Others ...
    Jul 30, 2025 · According to Google Cloud, Scattered Spider's activity has dropped recently, but the same attack strategies have been observed in incidents ...
  81. [81]
    Scattered Spider Email Bombing: A Ruthless Hacker's Playbook
    Sep 2, 2025 · ... Scattered Spider. Known for their clever social engineering and relentless tactics, these hackers have been using email bombing (a flood of ...
  82. [82]
    How Scattered Spider TTPs are evolving in 2025 - Push Security
    May 6, 2025 · The notorious Scattered Spider cyber criminal group are evolving their TTPs in 2025 to bypass security controls like MFA and take over accounts on internet ...Missing: 2023-2025 | Show results with:2023-2025
  83. [83]
    Scattered Spider: Still Hunting for Victims in 2025 - Silent Push
    Apr 8, 2025 · Silent Push researchers are tracking five unique Scattered Spider phishing kits, which have been used since at least 2023. Some of these kits ...
  84. [84]
    Organizations Must Update Defenses to Scattered Spider Tactics ...
    Sep 22, 2025 · Organizations must urgently update their defenses to protect against tactics deployed by the Scattered Spider hacking collective this year, ...
  85. [85]
    Reducing Legal Risks From Ransomware Attacks - Mayer Brown
    Jul 30, 2025 · According to the FBI and CISA, Scattered Spider actors have sought out a victim's cloud-based data platform to exfiltrate large volumes of ...
  86. [86]
    Cross-Sector Mitigations: Scattered Spider - Health-ISAC
    Aug 1, 2025 · It targeted US and UK retailers in April and May 2025, then shifted its focus to the financial sector, particularly insurance firms, and the ...