Introduction: What is Scattered Spider?
Scattered Spider is a decentralized cybercriminal collective active since 2022. Also known by aliases like UNC 3944, Roasted Octopus, and Scattered Swine, this group defies the typical, monolithic cybercriminal structure. They’re agile, hard to trace, and primarily composed of native English speakers—a trait that makes them dangerously convincing in social engineering attacks.
“They’ve proved their social engineering chops with successful compromises on large companies like Twilio, DoorDash, and LastPass.”
Their Motivation
At the heart of their operations lies a simple motive: money. Their typical approach includes:
- Data exfiltration
- Extortion: “We have your data—pay up or it gets leaked.”
- Ransomware: Joining the AlphV ransomware-as-a-service affiliate program
Primary targets:
Sector | Examples |
---|---|
Customer Service | Contact centers, support firms |
Telecom | Mobile and internet providers |
Tech & BPO | SaaS, outsourcing firms |
Finance & Insurance | Expanding into global sectors |
Tactics and Techniques
Initial Access
Scattered Spider relies heavily on social engineering:
- Smishing (SMS phishing)
- SIM Swapping
- MFA Fatigue Attacks
- Help Desk Impersonation
“People fall for that, unfortunately.”
Lateral Movement & Evasion
They “live off the land,” using legitimate tools already installed on victims’ systems to avoid detection. Common methods include:
- Remote Access Tools like TeamViewer, Pulseway
- Domain impersonation (lookalike login pages, spoofed branding)
- Capturing MFA codes via SIM swaps or phishing
Attack Vectors Summary
Technique | Description |
Smishing | SMS messages tricking users into revealing info |
SIM Swapping | Cloning victim’s SIM for MFA access |
Impersonation | Acting as help desk or employee |
MFA Fatigue | Spamming login requests until user clicks “Approve” |
Living Off The Land | Using legit software to evade detection |
Key Takeaways (So Far)
- Scattered Spider is not your average ransomware group.
- Their English fluency and social engineering skills make them more dangerous.
- Their toolset is diverse, but many attacks start with user manipulation.

How to Stay Safe: Mitigation & Defense
1. Kill the SIM Swapping Risk
- Disable SMS and phone-based MFA
- Avoid email OTPs from compromised devices
“You can’t steal an MFA code if it’s not being sent to the phone.”
2. Use Phishing-Resistant MFA
Three key methods:
Method | Strengths |
Windows Hello for Business | Out-of-the-box, device-bound authentication |
Passkeys (502-based) | Software/hardware-based; secure token storage |
Certificate Authentication | Strong but hard to deploy for BYOD |
Tip: Most companies already have Windows Hello enabled via Intune/Entra.
3. Secure Session Tokens
- Use Conditional Access Policies (CA) to:
- Limit token lifetimes
- Block logins from high-risk regions (VPN, Tor, foreign IPs)
- Flag risky users/sign-ins
“You need to stay on top of this going forward.”
4. Train & Empower Your Help Desk
- Train to spot social engineering
- Implement out-of-band user verification
- Escalation protocols if something feels off
Example Protocol:
- Caller asks for reset.
- Help desk calls user’s manager to confirm.
- Use video call or other verification methods.
5. Restrict Remote Access Tools
- Allowlist known tools only
- Block all other remote control apps by category
6. Brand Protection & Threat Intelligence
- Register with brand protection services
- Use dark web monitoring
- Deploy honeytokens on public websites (detect cloning)
Final Checklist: Secure Your Organization
✅ Remove phone/SMS/email-based MFA options
✅ Use phishing-resistant authentication methods
✅ Implement conditional access policies
✅ Train IT/help desk staff on attack recognition
✅ Restrict remote access tooling
✅ Monitor for cloned websites & domain impersonation
✅ Invest in EDR/MDR, backup systems & test recovery plans
Conclusion
Scattered Spider is a fluid, smart, and rapidly evolving threat actor. By focusing on identity, authentication security, and user training, organizations can mitigate their most powerful weapon: social engineering.