Scattered Spider

Scattered Spider is a financially motivated threat actor known for its sophisticated use of social engineering, identity abuse, and high-impact ransomware attacks. Active since early 2022, the group has evolved rapidly, targeting a wide range of industries across multiple countries.

Is Your Organization Safe from Scattered Spider's Attacks?

The origin of Scattered Spider

Scattered Spider, also known by aliases such as Storm-0875, LUCR-3, Octo Tempest, Roasted 0ktapus, Scatter Swine, and UNC3944, is a prolific eCrime adversary active since early 2022. Believed to operate primarily out of Western countries, SCATTERED SPIDER is known for its high-impact financial attacks, particularly against high-revenue organizations. Their operations evolved from credential theft and SIM swapping to high-profile ransomware deployments, often with extortion as the final objective.

Early campaigns were focused on customer relationship management (CRM) and business-process outsourcing (BPO) firms. However, by April 2023, their operational scope broadened with the adoption of ransomware as their primary monetization tool. Despite arrests of suspected teenage members in 2024 by UK and U.S. law enforcement, the group remains active.

Countries targeted by

The group targets numerous countries across multiple continents. Notable examples include:

  • United States, Canada, and Brazil in the Americas.
  • United Kingdom, Germany, Italy, France, and Switzerland in Europe.
  • South Korea, Japan, Singapore, India, and Australia in the Asia-Pacific region.

Industries targeted by Scattered Spider

Scattered Spider is notable for the breadth of industries it targets. These include:

  • Telecommunications and Technology, particularly in its earlier campaigns.
  • Retail, Financial Services, and Consumer Goods, which saw increased targeting as ransomware became central to their operations.
  • A wide array of other sectors such as Manufacturing, Hospitality, Legal, Healthcare, Energy, and Cryptocurrency, indicating a non-discriminatory “big game hunting” approach focused on profitability.

Scattered Spider's Victims

While many victims remain unnamed due to the sensitive nature of incidents, it is confirmed that SCATTERED SPIDER primarily impacts:

  • Fortune 500 companies
  • High-revenue organizations
  • Firms with access to sensitive user data and enterprise-scale infrastructure
Attack Method

Scattered Spider's attack method

A shadowy figure casting a wide net over a digital landscape filled with various devices such as computers, smartphones, and tablets. The net symbolizes the attacker's attempts to find vulnerabilities or use phishing techniques to gain unauthorized access.

Achieved through advanced social engineering tactics like smishing, vishing, and impersonation of IT helpdesks. Attackers exploit user trust to bypass authentication and gain entry.

A digital ladder extending upwards from a basic user icon towards a crown symbolizing administrative privileges. This represents the attacker's efforts to gain higher-level access within the system.

They target accounts with elevated privileges, often focusing on IT, security, and C-suite personnel.

A chameleon blending into a digital background, with zeroes and ones flowing around it. This represents the attacker's ability to avoid detection by security measures, changing tactics to blend in with normal network traffic.

Use of custom malware (e.g., CS-Paralyzer), safe mode reboots, registry modification, and custom UEFI bootkits (like BlackLotus) to disable or bypass EDR/AV tools.

A thief with a lockpick toolkit working on a giant keyhole shaped like a login form, representing the attacker's efforts to steal user credentials to gain unauthorized access.

Harvested via phishing kits, Mimikatz, secretsdump.py, DCSync, and RAM captures.

A magnifying glass moving over a digital map of a network, highlighting files, folders, and network connections. This image represents the phase where attackers explore the environment to understand the structure and where valuable data resides.

Utilize legitimate tools and internal documentation to map the environment.

A series of interconnected nodes with a shadowy figure moving stealthily between them. This illustrates the attacker's movements within the network, seeking to gain control of additional systems or spread malware.

Through RDP, SSH, PSExec, and Azure commands; they exploit internal trust relationships.

A large vacuum sucking up files, data icons, and folders into a bag held by a shadowy figure. This image symbolizes the process of gathering valuable data from the target network.

Exfiltrate data from SharePoint, GSuite, internal file shares, and email repositories.

A command prompt window open in front of a digital background, with malicious code being typed out. This represents the phase where attackers execute their malicious payload within the compromised system.

Deployment of malware or RMM tools like AnyDesk, ScreenConnect, and TightVNC.

A series of files being funneled through a covert channel out of a computer to a cloud labeled with a skull, symbolizing the unauthorized transfer of data to a location controlled by the attacker.

Leverage tools like Chisel and Plink to tunnel data to remote servers or Telegram channels.

A cracked screen with a digital cityscape in chaos behind it, symbolizing the destructive impact of the cyberattack, such as service disruption, data destruction, or financial loss.

Encrypts data with ransomware like Alphv, DragonForce, Qilin, and RansomHub. Sometimes engages in double extortion.

A shadowy figure casting a wide net over a digital landscape filled with various devices such as computers, smartphones, and tablets. The net symbolizes the attacker's attempts to find vulnerabilities or use phishing techniques to gain unauthorized access.
Initial Access

Achieved through advanced social engineering tactics like smishing, vishing, and impersonation of IT helpdesks. Attackers exploit user trust to bypass authentication and gain entry.

A digital ladder extending upwards from a basic user icon towards a crown symbolizing administrative privileges. This represents the attacker's efforts to gain higher-level access within the system.
Privilege Escalation

They target accounts with elevated privileges, often focusing on IT, security, and C-suite personnel.

A chameleon blending into a digital background, with zeroes and ones flowing around it. This represents the attacker's ability to avoid detection by security measures, changing tactics to blend in with normal network traffic.
Defense Evasion

Use of custom malware (e.g., CS-Paralyzer), safe mode reboots, registry modification, and custom UEFI bootkits (like BlackLotus) to disable or bypass EDR/AV tools.

A thief with a lockpick toolkit working on a giant keyhole shaped like a login form, representing the attacker's efforts to steal user credentials to gain unauthorized access.
Credential Access

Harvested via phishing kits, Mimikatz, secretsdump.py, DCSync, and RAM captures.

A magnifying glass moving over a digital map of a network, highlighting files, folders, and network connections. This image represents the phase where attackers explore the environment to understand the structure and where valuable data resides.
Discovery

Utilize legitimate tools and internal documentation to map the environment.

A series of interconnected nodes with a shadowy figure moving stealthily between them. This illustrates the attacker's movements within the network, seeking to gain control of additional systems or spread malware.
Lateral Movement

Through RDP, SSH, PSExec, and Azure commands; they exploit internal trust relationships.

A large vacuum sucking up files, data icons, and folders into a bag held by a shadowy figure. This image symbolizes the process of gathering valuable data from the target network.
Collection

Exfiltrate data from SharePoint, GSuite, internal file shares, and email repositories.

A command prompt window open in front of a digital background, with malicious code being typed out. This represents the phase where attackers execute their malicious payload within the compromised system.
Execution

Deployment of malware or RMM tools like AnyDesk, ScreenConnect, and TightVNC.

A series of files being funneled through a covert channel out of a computer to a cloud labeled with a skull, symbolizing the unauthorized transfer of data to a location controlled by the attacker.
Exfiltration

Leverage tools like Chisel and Plink to tunnel data to remote servers or Telegram channels.

A cracked screen with a digital cityscape in chaos behind it, symbolizing the destructive impact of the cyberattack, such as service disruption, data destruction, or financial loss.
Impact

Encrypts data with ransomware like Alphv, DragonForce, Qilin, and RansomHub. Sometimes engages in double extortion.

MITRE ATT&CK Mapping

TTPs used by Scattered Spider

TA0001: Initial Access
T1566
Phishing
T1190
Exploit Public-Facing Application
T1133
External Remote Services
T1078
Valid Accounts
TA0002: Execution
T1204
User Execution
TA0003: Persistence
T1547
Boot or Logon Autostart Execution
T1078
Valid Accounts
T1053
Scheduled Task/Job
TA0004: Privilege Escalation
T1548
Abuse Elevation Control Mechanism
T1547
Boot or Logon Autostart Execution
T1078
Valid Accounts
T1053
Scheduled Task/Job
TA0005: Defense Evasion
T1548
Abuse Elevation Control Mechanism
T1036
Masquerading
T1027
Obfuscated Files or Information
T1562
Impair Defenses
T1078
Valid Accounts
TA0006: Credential Access
T1056
Input Capture
T1003
OS Credential Dumping
TA0007: Discovery
T1082
System Information Discovery
T1046
Network Service Discovery
TA0008: Lateral Movement
T1563
Remote Service Session Hijacking
T1021
Remote Services
TA0009: Collection
T1213
Data from Information Repositories
TA0011: Command and Control
No items found.
TA0010: Exfiltration
T1537
Transfer Data to Cloud Account
T1041
Exfiltration Over C2 Channel
TA0040: Impact
T1561
Disk Wipe
T1486
Data Encrypted for Impact
Platform Detections

How to Detect Scattered Spider with Vectra AI

List of the Detections available in the Vectra AI Platform that would indicate a ransomware attack.

FAQs

What makes Scattered Spider different from other threat groups?

How do Scattered Spider gain initial access?

What kind of malware or tools do Scattered Spider use?

Are Scattered Spider's operations fully automated?

Can traditional MFA protect against Scattered Spider?

What detection techniques can help?

What are signs of compromise (IoCs)?

How do Scattered Spider maintain persistence?

Do Scattered Spider use ransomware every time?

What are the best defenses against Scattered Spider?