UK Arrests Four in ‘Scattered Spider’ Ransom Group
10 Articles
10 Articles
UK Arrests Four in ‘Scattered Spider’ Ransom Group
Authorities in the United Kingdom this week arrested four people, including suspected members of the “Scattered Spider” data theft and extortion group whose recent victims include multiple airlines and the U.K. retail chain Marks & Spencer. The U.K.’s National Crime Agency (NCA) declined verify the names of those arrested, saying only that they included two males aged 19, another aged 17, and 20-year-old female. The NCA said the defendants were …
Check Point Research (CPR) warns of a growing threat from the notorious hacker group Scattered Spiders. Security researchers recently reported in May 2025 how the group allegedly associated with the Dragonforce Ransomware cartel attacked the British retail trade. Now, CPR has identified over 500 phishing domains targeted at companies and especially the aviation industry. In the past [...] The post Phishing domains of Scattered Spiders threaten a…
Anatomy of a Scattered Spider attack: A growing ransomware threat evolves
Scattered Spider is increasingly making headlines of late, evolving its techniques and broadening the scope of its criminal activities against a wider array of enterprises. Active since at least May 2022, the financially motivated cybercriminal group initially targeted telecommunications and entertainment companies, including MGM Resorts and Caesars Entertainment, through SIM-swapping and ransomware operations. [ See also: How CISOs can defend a…
Three male teenagers and a young woman were arrested, mainly for attacks on British retailers Marks & Spencer, Co-Op and Harrods.
Anatomy of a Scattered Spider attack: A growing ransomware threat evolves | #ransomware | #cybercrime - National Cyber Security Consulting
“On several occasions, the group assigned additional roles to compromised users, including the Exchange Administrator role,” according to ReliaQuest. “This role was used to monitor the inboxes of high-profile employees, enabling the attackers to stay ahead of the security team and maintain their control over the environment.” Ensuing battle over IT resources Despite the stealth […]
Coverage Details
Bias Distribution
- 100% of the sources are Center
To view factuality data please Upgrade to Premium