Aliases#

  • UNC3944 (Google Mandiant)
  • The Com/The Community
  • Octo Tempest (Microsoft)
  • Oktapus (Group-IB)
  • Muddled Libra (Palo Alto Unit 42)
  • Scatter Swine (Okta)
  • StarFraud
  • Storm-0875

Profiling#

Image of convicted Scattered Spider member Noah Urban.

Image of convicted Scattered Spider member, Noah “King Bob” Urban.

Demographics: Primarily young operators (assessed ages: 13–25 years old), predominantly fluent/native English speakers.

Structure: Not a fixed “group” but a loose collective of individuals operators.

Expertise: Highly adaptive, “cloud-savvy” attackers, skilled in abusing Identity and Access management (IAM) misconfigurations and MFA bypass techniques rather than traditional perimeter exploits. Has demonstrated a repeatable ability to pivot into VMware ESXi environments, aligning with RaaS partners to deploy ransomware or exfiltrate workloads directly from the hypervisor layer.

Social Engineering: Heavy reliance on vishing, smishing, and SIM swapping.

 

Motivation#

Financial gain via data theft, extortion, and ransomware.

 

Timeline#

2022 – Emergence#

  • Scattered Spider (UNC3944 / Octo Tempest) appears, targeting telecoms with SIM swaps, MFA fatigue, and SMS phishing.

2023 – Casino Hacks & RaaS Entry#

  • September: Breaches MGM Resorts (100M) and Caesars Entertainment (Caesars reportedly paid ~$15M).
  • Partners with ALPHV/BlackCat to deploy ransomware.

2024 – New RaaS Partnerships#

  • October: Shifts alliances to RansomHub and Qilin affiliates for deployment-based attacks.

2025 – Retail Hit & Industry Expansion#

  • February: Breaches Marks & Spencer via DragonForce ransomware, disrupting 1,049 stores and dropping stock ~7%.
  • Upgrades phishing kits to target Klaviyo, HubSpot, Pure Storage, Nike, Instacart, and more.
  • FBI warns of expanded targeting: airlines, retail, insurance, and IT contractors.

Current Status (Sep 2025)#

  • Operator Noah “King Bob” Urban sentenced to 10 years for SIM-swap and crypto theft.
  • Group remains active, leveraging RattyRAT and DragonForce ransomware against VMware ESXi servers.

 

Tactics & Techniques#

Image of phishing sites used by Scattered Spider.

Scattered Spider phishing pages.

Initial Access #

  • Smishing/Vishing/Phishing (T1566, T1566.002/T1566.004), SIM Swap (T1451), Push Bombing/MFA Fatigue (T1621), AiTM pages via Evilginx (T1557), etc.

Lateral Movement/Privilege Escalation #

  • Account Takeover (ATO) on IdP platforms (i.e., Entra, Okta, etc.) (T1078.004 / T1133), Domain Admin escalation and credential dumping (T1068 / T1003)

Attack Execution #

  • Final pivoting into VMWare environment, and deploy ransomware (via RaaS entities) and/or data exfiltration for extortion (T1210 / T1486 / T1041)

 

Preventative Measures#

Defending against Scattered Spider requires both strong identity controls and visibility deeper in the stack:

  • Identity and Access Hardening – Enforce phishing-resistant MFA, monitor for SIM-swap attempts, and apply least privilege across cloud IdPs and remote entry points.
  • Network Segmentation and Monitoring – Restrict lateral movement opportunities and monitor for abnormal admin tool usage.
  • Patch and Configuration Management – Keep IdP, hypervisor, and guest OS environments updated to limit exploitable misconfigurations.

Hypervisor-Layer Defense with ZeroLock®#

While these controls raise the bar, Scattered Spider’s proven ability to pivot into ESXi environments highlights the need for defenses directly at the hypervisor:

  • SSH MFA Enforcement: ZeroLock blocks weak or misconfigured remote entry at the host.
  • Lockdown Rules: Prevents unauthorized system changes that enable ransomware staging.
  • Application Filtering: Restricts native ESXi utilities from being abused for lateral movement or stealth.
  • AI-Behavioral Detection: Surfaces attacker activity before encryption or exfiltration.

 

Attack Chain Ecosystem#

Figure 3: Visual representation of Scattered Spider’s attack chain ecosystem.

References#

CISA. (2025, July 29). Scattered Spider. www.cisa.gov. https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-320a

Kelly, P. (2025, June 9). Scattered Spider: Still Hunting for victims in 2025. Silent Push. https://www.silentpush.com/blog/scattered-spider-2025/

Mirage Security – Scattered Spider Attacks: timeline, tactics, and defense tips. (n.d.). https://www.miragesecurity.ai/blog/scattered-spider-a-retrospective

Oluoch, P. (2023, August 17). Scattered Spider: The Modus Operandi. Trellix.com. https://www.trellix.com/blogs/research/scattered-spider-the-modus-operandi/

Parisi, T. (n.d.). Not a SIMulation: CrowdStrike investigations reveal intrusion campaign targeting telco and BPO companies. https://www.crowdstrike.com/en-us/blog/analysis-of-intrusion-campaign-targeting-telecom-and-bpo-companies/

Robb, B. (2025, July 24). Scattered Spider’s expanding web of ransomware attacks. BlackFog. https://www.blackfog.com/scattered-spider-expanding-ransomware-attacks/

Scattered Spider | Cohesity. (2025, July 27). Cohesity. https://www.cohesity.com/blogs/scattered-spider-attack-what-you-need-to-know-about-the-uk-retail-threat/

Scattered Spider: Threat Actor Profile – Cyble. (2025, August 26). Cyble.

Scattered Spider: Three things the news doesn’t tell you. (2025, June 3). BleepingComputer. https://www.bleepingcomputer.com/news/security/scattered-spider-three-things-the-news-doesnt-tell-you/

Shaking up the ransomware game: Introducing Scattered Spider | SANS Institute. (2025, July 7). SANS Institute. https://www.sans.org/blog/shaking-up-ransomware-game-introducing-scattered-spider

U.S. Department of Health and Human Services. (2024). HC3: Threat Actor Profile – Scattered Spider. In HC3: Threat Actor Profile (pp. 1–11) [Report]. https://www.aha.org/system/files/media/file/2024/10/hc3%20tlp%20clear%20threat%20actor%20profile%20scattered%20spider-10-24-2024.pdf