REPORTAGE: Who are Scattered Spider? – The Notorious Hackers Behind Major Cyberattacks
May 10, 2025Helping Keep Small Business CYBERSafe
Málaga: Saturday, 10th May 2025 at 12:00 CEST
REPORTAGE: Who are Scattered Spider? – The Notorious Hackers Behind Major Cyberattacks
By Iain Fraser/Reportage & Andy Jenkinson CIP
via SMECYBERInsights – The UK Small Business Cybersecurity Network
#SMECyberInsights #SMECyberSecurity #SMECyberAwareness #CyberSafe #SME #SmallBusiness
In the shadowy world of cybercrime, Scattered Spider has emerged as one of the most formidable threat actors in recent years. As Marks & Spencer grapples with a significant cyberattack, security experts are examining possible connections to this notorious hacking group. But who exactly is Scattered Spider, and what makes them such a dangerous digital adversary?
Origins and Identity
Scattered Spider, also known as UNC3944 or 0ktapus, first gained significant attention in 2022. Unlike state-sponsored hacking groups, Scattered Spider is believed to be a financially motivated criminal collective composed primarily of English-speaking individuals from the United States and United Kingdom. What makes them particularly unusual is their youth—many members are reportedly in their late teens or early twenties.
Security researchers have noted that the group evolved from the online SIM-swapping community, where hackers gain control of victims’ phone numbers to bypass two-factor authentication. This social engineering expertise has become their hallmark.
Modus Operandi: Masters of Social Engineering
What distinguishes Scattered Spider from other cybercriminal groups is their exceptional proficiency in social engineering rather than sophisticated technical exploits. Their typical attack pattern follows a consistent methodology:
1.Reconnaissance: They gather extensive information about target organizations and their employees through social media, corporate websites, and other public sources.
2.Initial Access: The group gains entry through sophisticated social engineering, often posing as IT staff to trick employees into revealing credentials or installing remote access tools.
3. Privilege Escalation: Once inside, they move laterally through networks to gain administrator access to critical systems.
4. Data Exfiltration and Extortion: They extract sensitive data and deploy ransomware, demanding substantial payments for decryption keys and to prevent public release of stolen information.
Their attacks frequently target identity and access management systems like Okta, which serve as gateways to numerous corporate applications and data repositories.
High-Profile Victims
Scattered Spider has built a notorious reputation by successfully breaching major corporations. Their targets have included technology giants, telecommunications companies, and retail organizations. Notable victims include MGM Resorts, Caesars Entertainment, and Okta itself. These attacks have resulted in hundreds of millions of dollars in damages and operational disruptions.
The M&S Connection: Assessing the Likelihood
While official attribution for the M&S cyberattack remains pending, several factors suggest Scattered Spider’s potential involvement:
The timing aligns with the group’s recent surge in activity targeting retail organizations. The reported attack methodology—focusing on identity management systems and using social engineering as an entry point—matches Scattered Spider’s established tactics. Additionally, the group has been increasingly active in targeting UK-based businesses.
However, definitive attribution in cyberattacks is notoriously challenging. Several other cybercriminal groups employ similar tactics, and premature attribution can be misleading.
As M&S works to contain and investigate the breach, cybersecurity experts continue monitoring for the telltale signatures of Scattered Spider’s involvement. Regardless of who is ultimately responsible, the incident underscores the critical importance of robust security awareness training for employees and multi-layered authentication protocols to defend against today’s sophisticated social engineering attacks.
UK Small Business Owner? Join SMECyber Free Now! & Access the SME Cyber Forum – Read, Learn, Engage, Share …
The Latest SME Cybersecurity News, Threat Intelligence & Analysis, Timely Scam Alerts, Best-practice Compliance, Mitigation & Resources specifically curated for UK Based SMEs in a Single Weekly Email direct to your Inbox or Smart Device together with Unrestricted Free Access to our entire SME Cyber Knowledge & Tutorial Library.

About Andy Jenkinson
Group CEO CIP. Fellow Cyber Theory Institute. Director Fintech & Cyber Security Alliance (FITCA) working with Governments. Recognised Expert in Internet Asset & DNS Vulnerabilities.
Andy Jenkinson is a senior and seasoned innovative Executive with over 30 years’ experience as a hands-on lateral thinking CEO, coach, and leader.















