top of page

Understanding Scattered Spider: The New Face of Cybercrime

  • GK
  • Sep 26, 2025
  • 4 min read

Updated: Dec 22, 2025

The cybersecurity landscape is evolving rapidly. One group has forced defenders to rethink their assumptions about where the true perimeter lies. That group is Scattered Spider, also known as UNC3944. This financially motivated cybercrime gang is notorious for bold social engineering, advanced identity exploitation, and disruptive ransomware campaigns.


In recent years, Scattered Spider has transformed from niche SIM-swap fraudsters to one of the most infamous enterprise intruders. They’ve been linked to high-profile attacks against casinos, airlines, retailers, and insurers. Often, they use little more than a phone call and deep knowledge of corporate identity systems to break in.


A recent Google Cloud / Mandiant threat intelligence report offers fresh recommendations for defending against UNC3944. In this article, we’ll explore who they are, how they operate, why they matter, and what organizations can do to defend themselves.


An Indian IT company (TCS) conducted an internal investigation to determine whether it was the gateway for the cyber-attack on Marks & Spencer. They also provide services to Co-op, Harrods, and own Jaguar Land Rover (TATA).

Who Is Scattered Spider?


Scattered Spider (UNC3944) is a loosely affiliated but highly skilled cybercrime group first observed around May 2022. Known for their adaptability, they operate under multiple aliases, including Octo Tempest, Muddled Libra, and 0ktapus. Initially, they specialized in SIM swapping and credential theft.


Over time, their tactics matured into help desk impersonation, MFA bypass, and large-scale enterprise intrusions. Their campaigns have since escalated to data exfiltration, extortion, and ransomware deployment.


Key Traits That Set Them Apart


  • Human-first targeting: They exploit people, not just systems. Their methods include phishing, vishing, and calling IT help desks to bypass security controls.

  • Identity mastery: Their deep focus on MFA, SSO, and identity providers makes them especially dangerous in today’s cloud-first environments.

  • High-value targeting: They have hit casinos, airlines, retailers, and tech providers. These industries are particularly vulnerable due to their reliance on customer-facing identity systems.



How Scattered Spider Attacks


UNC3944’s campaigns are structured, disciplined, and heavily reliant on social engineering. A typical attack lifecycle looks like this:



1. Reconnaissance


They gather data from LinkedIn, company websites, and even dark web leaks to build employee profiles and understand IT processes.


2. Social Engineering Entry


Impersonating an employee, they contact help desks to request MFA resets, password changes, or new device enrollments.


3. Credential Capture


Once inside, they use phishing kits, MFA interception, or session cookie theft to secure persistent access.


4. Privilege Escalation & Lateral Movement


Using built-in tools like PowerShell and RMM software, they move across networks, escalate privileges, and establish persistence.


5. Impact Phase


Depending on the campaign, they may exfiltrate data for extortion or deploy ransomware. Sometimes, they directly target VMware ESXi hypervisors to maximize disruption. Their reliance on legitimate workflows—such as password resets, MFA enrollment, and help desk tickets—makes their activity harder to spot and stop.



Mitre Att@ck Framework Methods




Why UNC3944 Matters



Scattered Spider isn’t just another ransomware gang. They represent a shift in the threat model:


  • Identity is the new perimeter. Firewalls and antivirus don’t matter if the attacker convinces IT support to “let them in.”

  • Supply chain impact. By hitting MSPs, identity providers, or shared service vendors, one compromise can cascade to many downstream victims.

  • Relentless innovation. They constantly refine phishing domains, social engineering scripts, and infrastructure to stay ahead of defenses.

  • Sector-wide disruption. Attacks on airlines, casinos, and insurers demonstrate the economic and reputational stakes—services disrupted, customers locked out, and millions lost.



Proactive Hardening Recommendations


Identity Protection


  • Strong help desk verification: Require callbacks, pre-registered contact methods, or challenge-response verification before granting resets.

  • Phishing-resistant MFA: Prefer hardware tokens (FIDO2, YubiKey) or app-based number matching over SMS or push-only MFA.

  • Lock down MFA enrollment: Restrict where and how new devices can be added; alert on suspicious reset requests.

  • Role separation: Isolate help desk, admin, and service accounts; apply least privilege at every level.


Endpoint & Device Security


  • Keep systems patched and minimize installed software.

  • Block unsigned drivers and monitor kernel-level activity.

  • Apply application allowlisting to limit what can run.


Application & Identity Infrastructure


  • Audit SSO and identity provider configurations.

  • Monitor service principal activity and third-party app permissions.

  • Segment critical applications away from general user access zones.


Network Controls


  • Apply zero-trust segmentation to limit lateral movement.

  • Restrict outbound traffic and monitor unusual external connections.

  • Harden remote access (VPN, RDP) with MFA and access controls.


Detection & Response


  • Collect logs across identity, endpoint, and network layers.

  • Use behavioral analytics to flag anomalies (new devices, failed MFA, strange login times).

  • Hunt for spoofed domains mimicking corporate SSO/help desk portals.

  • Maintain rapid response playbooks to disable accounts, kill sessions, and isolate endpoints quickly.





Conclusion: Identity Is the Battlefield


Scattered Spider / UNC3944 exemplifies a new generation of cybercriminals who exploit human workflows as much as technology gaps. Their campaigns highlight a hard truth: in the cloud era, identity is the true perimeter.


The best defenses are layered, identity-centric, and proactive:

  • Harden help desk procedures.

  • Enforce phishing-resistant MFA.

  • Monitor relentlessly for anomalies.

  • Practice incident response drills.


Organizations that treat identity as a critical attack surface—and not just an IT convenience—will be far better positioned to withstand groups like Scattered Spider.


Comments


bottom of page