ETDA สำนักงานพัฒนาธุรกรรมทางอิเล็กทรอนิกส์
Electronic Transactions Development Agency
Home > List all groups > Subgroup: Scattered Spider

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link APT group: Subgroup: Scattered Spider

NamesScattered Spider (CrowdStrike)
UNC3944 (Mandiant)
0ktapus (Group-IB)
Muddled Libra (Palo Alto)
Scatter Swine (Okta)
Storm-0875 (Microsoft)
Octo Tempest (Microsoft)
LUCR-3 (Permiso)
MotivationFinancial gain
First seen2022
DescriptionAn affiliate group of ALPHV, BlackCat Gang

(Mandiant) UNC3944 is a financially motivated threat cluster that has persistently used phone-based social engineering and SMS phishing campaigns (smishing) to obtain credentials to gain and escalate access to victim organizations. At least some UNC3944 threat actors appear to operate in underground communities, such as Telegram and underground forums, which they may leverage to acquire tools, services, and/or other support to augment their operations. This activity overlaps with activity that has been reported in open sources as '0ktapus,' 'Scatter Swine,' and 'Scattered Spider.' Since 2022 and through early 2023, UNC3944 appeared to focus on accessing credentials or systems used to enable SIM swapping attacks, likely in support of secondary criminal operations occurring outside of victim environments. However, in mid-2023, UNC3944 began to shift to deploying ransomware in victim environments, signaling an expansion in the group's monetization strategies. These changes in their end goals signal that the industries targeted by UNC3944 will continue to expand; Mandiant has already directly observed their targeting broaden beyond telecommunication and business process outsourcer (BPO) companies to a wide range of industries including hospitality, retail, media and entertainment, and financial services.
ObservedCountries: Worldwide.
Tools usedADRecon, AnyDesk, DCSync, FiveTran, FleetDeck, gosecretsdump, Govmomi, Hekatomb, Impacket, LaZagne, LummaC2, Mimikatz, Ngrok, PingCastle, ProcDump, PsExec, Pulseway, Pure Storage FlashArray, RedLine, Rsocx, RustDesk, ScreenConnect, SharpHound, Socat, Spidey Bot, Splashtop, Stealc, TacticalRMM, Tailscale, TightVNC, VIDAR, WinRAR, WsTunnel, Living off the Land.
Operations performedSep 2023MGM Resorts shuts down IT systems after cyberattack
Sep 2023Caesars Entertainment confirms ransom payment, customer data theft
Sep 2023Hackers who breached casino giants MGM, Caesars also hit 3 other firms, Okta says
Sep 2023‘Scattered Spider’ group launches ransomware attacks while expanding targets in hospitality, retail
Sep 2023Luxury Hotels Remain Major Target of Ongoing Social Engineering Attack
Jan 2024Muddled Libra’s Evolution to the Cloud

Last change to this card: 22 April 2024

Download this actor card in PDF or JSON format

Previous: ALPHV, BlackCat Gang
Next: Anchor Panda, APT 14

Digital Service Security Center
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1227
E-mail [email protected]