Skip Navigation

May 16, 2025 |

Scattered Spider shifts focus to US targets

Loading table of contents...

Security researchers are warning that Scattered Spider, also referred to as UNC3944 or Octo Tempest, has shifted its focus from UK retailers to targeting retail chains in the United States. This group, known for its aggressive and sophisticated tactics, has a history of concentrating on specific sectors, and the retail industry appears to be its current focus.

Scattered Spider has been linked to several high-profile cyberattacks in the UK, including a ransomware attack on Marks & Spencer (M&S) where virtual machines on VMware ESXi hosts were encrypted using the DragonForce encryptor. Other UK retailers such as Co-op and Harrods have also experienced cyber incidents attributed to this group, involving data theft and attempted network infiltrations.

ThreatRoundUp_SignUp_Simplifiedx2

Stay on top of emerging threats.

Sign up to receive a weekly roundup of our security intelligence feed. You'll be the first to know of emerging attack vectors, threats, and vulnerabilities. 

Sign up

The group's tactics often involve sophisticated social engineering techniques to gain initial access, followed by the deployment of ransomware to encrypt systems and demand payment. In the case of M&S, attackers reportedly extracted sensitive data, including user credentials, before deploying ransomware. These methods have proven effective in disrupting operations and extracting valuable information from targeted organizations.

Source: Bleeping Computer

Analysis

Scattered Spider is a cybercriminal group that has garnered significant attention for its sophisticated social engineering tactics and high-profile attacks. Comprised primarily of young individuals from the United States and the United Kingdom, the group has been active since at least 2022. Their operations have targeted a range of industries, including telecommunications, finance, and retail, with notable breaches involving companies like MGM Resorts and Caesars Entertainment.

In response to the escalating threat posed by Scattered Spider, the Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) released a joint Cybersecurity Advisory (CSA) in November 2023. This advisory aimed to disseminate information about the group's tactics, techniques, and procedures (TTPs) to help organizations bolster their defenses. The CSA highlighted the group's adept use of social engineering methods, such as phishing and SIM swapping, to gain unauthorized access to systems. Additionally, Scattered Spider has been associated with the deployment of ransomware variants like BlackCat/ALPHV to extort victims.

The CSA provided detailed recommendations for organizations to mitigate the risks associated with Scattered Spider's activities. Key suggestions included:

  • Implementing phishing-resistant multi-factor authentication
  • Enforcing strict password policies in line with NIST standards
  • Maintaining comprehensive data backup strategies

The advisory also emphasized the importance of employee training to recognize and respond to social engineering attempts, as well as the need for organizations to report incidents promptly to facilitate coordinated responses.

Despite these efforts, Scattered Spider has continued to evolve its techniques and expand its target list. The group's decentralized structure and the youth of its members have posed challenges for law enforcement agencies.

However, recent developments indicate progress in disrupting their operations. In November 2024, U.S. authorities charged five individuals connected to Scattered Spider with offenses including wire fraud and identity theft, marking a significant step in holding the group accountable and underscoring the ongoing commitment of law enforcement to combat cyber threats and protect critical infrastructure.

Given the group's shift in focus to US retailers, organizations in this sector should take proactive measures to enhance their cybersecurity defenses. Implementing robust security protocols, conducting regular system updates, and educating employees about social engineering tactics are essential steps in mitigating the risk posed by Scattered Spider and similar threat actors.

Mitigation

Field Effect’s elite team of Security Intelligence professionals constantly monitor the cyber threat landscape for threats stemming from sophisticated threat actors like Scattered Spider. Field Effect MDR users are automatically notified if threat-related activity is detected in their environment and are encouraged to review these AROs as quickly as possible via the Field Effect Portal.

Related Articles