Scattered Spider cybercrime gang shifts from SIM-swapping to more advanced techniques

Scattered Spider cybercrime gang shifts from SIM-swapping to more advanced techniques

The notorious cybercrime group Scattered Spider has upgraded its arsenal, incorporating advanced social engineering and domain impersonation tactics, according to a recent report by cybersecurity firm ReliaQuest.

The collective, also known as UNC3944 or Octo Tempest, is believed to be behind recent cyber-attacks on major British retailers including Marks & Spencer and Harrods. According to ReliaQuest’s report, the group has evolved from a simple SIM-swapping operation into a “global threat” using sophisticated credential-harvesting campaigns.

Analysis of over 600 domains linked to the group between early 2022 and 2025 revealed that 81% of them impersonate major tech vendors, particularly targeting identity providers (like Okta), VPN services, and IT support systems. The fake domains are designed to harvest credentials from high-level employees, including system administrators and executives.

In the recent M&S breach, experts found that compromised credentials from IT outsourcing firm Tata Consultancy Services (TCS) were leveraged to gain unauthorized access. TCS also provides services to the Co-op, which was hit by a separate cyberattack, although a direct link has not been confirmed.

The gang uses a phishing tool called ‘Evilginx’ capable of bypassing multifactor authentication (MFA). Originally created for ethical hacking, Evilginx has been co-opted by cybercriminals to steal login credentials and session cookies. Its latest version, Evilginx 3.0, released in April 2024, has been used in 60% of Scattered Spider’s phishing campaigns targeting tech vendors.

Additionally, ReliaQuest found increasing collaboration between Scattered Spider and ransomware-as-a-service (RaaS) groups such as DragonForce and BlackCat/ALPHV targeting managed service providers (MSPs) to exploit their access to multiple clients in a single attack.

Back to the list

Latest Posts

Cyber Security Week in Review: June 20, 2025

Cyber Security Week in Review: June 20, 2025

In brief: the Langflow, TP-Link and Zyxel flaws exploited in the wild, Russian hackers use ASPs to infiltrate victims’ email accounts, and more
20 June 2025
Russian-linked hackers exploit Google App passwords in email espionage campaign

Russian-linked hackers exploit Google App passwords in email espionage campaign

Victims were tricked into creating and sharing ASPs under the mistaken belief that they are enabling secure communication with the US Department of State.
19 June 2025
FBI-wanted member of ransomware gang arrested in Ukraine, extradited to the US

FBI-wanted member of ransomware gang arrested in Ukraine, extradited to the US

Using custom-developed malware, including ransomware such as LockerGoga, MegaCortex, HIVE and Dharma, the hackers encrypted data on corporate networks.
18 June 2025