Security

Cyber-crime

Look out, Scattered Spider. FBI pumps 'significant' resources into snaring data-theft crew

Absence of arrests doesn't mean nothing's happening, cyber-cops insist


The FBI is applying "significant" resources to find members of the infamous Scattered Spider cyber-crime crew, which seemingly attacked a couple of high-profile casinos a few months ago and remains active, according to a senior bureau official.

The gang, a loose-knit group of teens and early-20s males thought to be based in the US and UK, is believed to be responsible for network intrusions at Caesars Entertainment and MGM Resorts.

Scattered Spider, like other online extortionists, breaks into the IT environments of victims, exfiltrates as much valuable data as possible, and then demands payment to keep a lid on that info and not leak or sell it.

MGM Resorts, which refused to pay the gang's ransom demand, suffered days of system outages and disrupted operations as a result of the intrusion, costing the corporation about $100 million. Caesars reportedly paid about $15 million, and didn't appear to suffer the same level of downtime as its fellow casino giant.

Scattered Spider has broken into at least 100 other organizations as of September 2023, according to Mandiant.

While the FBI wouldn't specify how many organizations have been caught in Scattered Spider's web, a senior FBI official told reporters during a Thursday press briefing that the agency is making “a significant effort on our part to address them, and we're putting significant resources against it."

"We urge organizations to share any information they may have on Scattered Spider, such as communication with actor groups, or benign samples of encrypted files, and report cyber intrusions," a senior US Cybersecurity and Infrastructure Security Agency (CISA) official said during the call with reporters. "It enables CISA and the FBI to assess the intrusion to identify techniques and share anonymous details broadly to help other organizations protect against this threat."

Also on Thursday, the FBI and CISA issued a joint advisory in response to the arachnid crew's criminal activity observed as recently as this month.

The advisory details social engineering tactics Scattered Spider uses to gain initial access to companies' networks. These include posing as IT or help-desk staff using phone calls or text messages to obtain login credentials from staffers or trick employees into running tools that grant the miscreants remote access to corporate computers.

Also in the guise of IT staff, the crew has convinced employees to reset their multi-factor authentication and pulled off repeated SIM swapping scams that convince cellular networks to transfer a target's phone number to a SIM card controlled by Scattered Spider. Once the gang controls that number, it can access MFA prompts and more easily compromise victim accounts.

Once the gang gains network access, the criminals use legitimate tools to find and exfiltrate sensitive info. Samples of the stolen data are then offered to the victim as evidence of the theft, with the intent of extorting seven-figure sums to stop the spread of the pilfered files. Earlier this year, the crew began deploying ransomware malware in victims' environments, and at this point they may be an affiliate of the ALPHV/BlackCat ransomware-as-a-service operation.

Victim reporting is critically important

"And the only way that we're able to push this information out is when we get it from victims," the senior FBI official said. "Victim reporting is critically important for our ability to take enforcement action against actors such as these."

Both the advisory and the press briefing come as the FBI faces criticism for not moving fast enough to arrest the criminals despite many of them being based in the US, and their identities potentially known to law enforcement, according to a Reuters report.

The FBI official declined to comment on the ongoing investigation into Scattered Spider gang members.

"Just because you don't see actions being taken, it doesn't mean that there aren't actions that are being taken," the official said, citing recent takedowns against the Hive ransomware gang, Genesis Market, BreachForums, and Qakbot.

"There's a lot of things that we do behind the scenes," the official said. ®

Send us news
4 Comments

Five Eyes nations warn Moscow's mates at the Star Blizzard gang have new phishing targets

The Russians are coming! Err, they've already infiltrated UK, US inboxes

Uncle Sam probes cyberattack on Pennsylvania water system by suspected Iranian crew

CISA calls for stronger IT defenses as Texas district also hit by ransomware crew

Fancy Bear goes phishing in US, European high-value networks

GRU-linked crew going after our code warns Microsoft - Outlook not good

Hershey phishes! Crooks snarf chocolate lovers' creds

Stealing Kit Kat maker's data?! Give me a break

Scores of US credit unions offline after ransomware infects backend cloud outfit

Supply chain attacks: The gift that keeps on giving

Belgian man charged with smuggling sanctioned military tech to Russia and China

Indictments allege plot to shift FPGAs, accelerometers, and spycams

Rogue ex-Motorola techie admits cyberattack on former employer, passport fraud

Pro tip: Don't use your new work email to phish your old firm

'Serial cybercriminal and scammer' jailed for 8 years, told to pay back $1.2M

Crook did everything from SIM swaps to fake verified badge scams

Someone else has a go at reforming US Section 702 spying powers – and nope, no warrant requirement

Back to plan A, then, eh?

Dump C++ and in Rust you should trust, Five Eyes agencies urge

Memory safety vulnerabilities need to be crushed with better code

Mirai malware infects routers and cameras for new botnet

Akamai sounds the alarm – won't name the manufacturers yet

MOVEit victim count latest: 2.6K+ orgs hit, 77M+ people's data stolen

Real-life impact of buggy software laid bare – plus: Avast tries to profit from being caught up in attacks