Cybercrime , Fraud Management & Cybercrime , Social Engineering

Feds Indict 5 Suspects Tied to Scattered Spider Cybercrime

FBI Ties Suspects to at Least 45 Attacks and Theft of Cryptocurrency Worth Millions
Feds Indict 5 Suspects Tied to Scattered Spider Cybercrime
Image: Shutterstock

The U.S. government on Wednesday unsealed criminal charges against five suspected members of "a loosely organized, financially motivated cybercriminal group" tied to numerous high-profile and devastating hack attacks.

See Also: OnDemand | 2024 Phishing Insights: What 11.9 Million User Behaviors Reveal About Your Risk

An unsealed federal grand jury indictment, filed under seal on Oct. 8, charges the five men with conspiracy, wire fraud and identity theft crimes, committed while operating as part of a hacking group.

"We allege that this group of cybercriminals perpetrated a sophisticated scheme to steal intellectual property and proprietary information worth tens of millions of dollars," said Martin Estrada, U.S. attorney for the Central District of California, where the case is being prosecuted.

The suspects were allegedly part of the criminal group known as "Scattered Spider," which has been tied to attacks using "social engineering techniques to target enterprise call centers, extensive SMS phishing campaigns and various other more sophisticated techniques to compromise major organizations," according to Google Cloud's Mandiant.

Suspects named in the indictment included Ahmed Hossam Eldin Elbadawy, 23, a.k.a. "AD," of Texas; Noah Michael Urban, 20, a.k.a. "Sosa" and "Elijah," of Florida; Evans Onyeaka Osiebo, 20, of Texas; and Joel Martin Evans, 25, a.k.a. "joeleoli," of North Carolina.

The FBI arrested Evans on Tuesday in North Carolina; Urban was already detained as part of a separate federal case. The government didn't state whether Elbadawy and Osiebo remain at large. Aside from the indictment, as of Thursday, all other case records remained sealed.

Authorities on Wednesday also unsealed a partially redacted criminal complaint against Tyler Robert Buchanan, a 22-year-old man from Scotland, dated May 25. He's charged with conspiracy to commit conspiracy, wire fraud and aggravated identity theft.

Spanish police arrested Buchanan on May 31. On June 21, the U.S. Attorney's Office filed a request for his extradition.

Scattered Spider has been tied to attacks against over 130 different organizations mostly through social engineering. The group has also worked with the Russia-based ransomware group Alphv, a.k.a. BlackCat, oftentimes targeting Western victims.

"These individuals, and other actors that they have collaborated with, have caused so much pain and financial harm to organizations across North America through their disruptive intrusions," said Charles Carmakal, CTO of Google Cloud's Mandiant.

"This is a nice win for law enforcement that over time has significantly hampered the group's fast-paced tempo this year," Carmakal said.

FBI Ties Suspects to at Least 45 Attacks

The FBI said it has tied these five suspects to the targeting of at least 45 companies based in the U.S. and abroad, including Canada, the U.K. and India. The group's victims or attempted victims included "dozens of companies" in the U.S. spanning numerous sectors, including social media, venture capital, interactive entertainment, telecommunications and technology, consultancies, cloud providers, and virtual currency, according to court documents.

The defendants have also been charged with stealing virtual currency worth at least $11 million from 29 victims.

The suspects have been charged with running phishing attacks from at least September 2021 to April 2023, oftentimes sending mass SMS text messages to employees of targeted firms. The messages typically purported to be from the company, or else a trusted IT or business supplier, and "often stated that the employees' accounts were about to be deactivated and provided links to phishing websites that were designed to look like legitimate websites of the victim companies or their contracted suppliers and lure the recipient into providing confidential information, including account login credentials," said the Department of Justice.

The FBI said the attackers' phishing toolkits included the ability to trick victims into not just entering their username and password but any one-time code they might receive as part of a two-factor authentication request.

Prosecutors have accused the suspects of using the stolen authentication information to access victims' networks and "confidential information, including confidential work product, intellectual property and personal identifying information, such as account access credentials, names, email addresses and telephone numbers."

The group allegedly also used information - leaked sets of data and other sources - obtained through these intrusions "to gain unauthorized access to numerous individuals' cryptocurrency accounts and wallets and steal millions of dollars' worth of virtual currency," the DOJ said.

Scotland Seized Suspect's Devices

While prosecutors need not detail in full in an indictment all of their evidence pertaining to a case, a U.S. extradition request filed with Spain contains extra details about evidence gathered in the course of a separate Scottish law enforcement investigation.

The extradition request said Police Scotland in April 2023 searched Buchanan's residence in Dundee, seizing around 20 digital devices - including desktop and laptop computers, external storage devices, and phone - and shared digital forensic copies of them with the FBI, from November 2023 to January 2024.

In the browser search history of devices seized by Police Scotland, the FBI said it found multiple visits to phishing service management consoles, attempts to log into victim companies, usernames and passwords for employees of U.S. firms, and messages, including screenshots of Telegram chats, referencing "SIM-swapping and social engineering" schemes used to harvest cryptocurrency worth at least $3 million from victims.

The bureau said one of the systems seized from Buchanan contained a phishing kit, described as being "a software program designed to capture information coming into a phishing website (such as usernames and passwords) and then transmitted that information to another database that could be accessed by attackers." Investigators said they believe that the Telegram channel was accessed by an unnamed coconspirator.

The installed phishing kit had the same hash value as the phishing kits hosted on virtual private servers used to launch the phishing attacks, it said.

The FBI said a blockchain "shortcut" found on Buchanan's system referenced a cryptocurrency address - which it believes he controlled - via which 391 bitcoins, currently worth $30 million, were transferred in or out from October 2022 to February 2023.


About the Author

Prajeet Nair

Prajeet Nair

Assistant Editor, Global News Desk, ISMG

Nair previously worked at TechCircle, IDG, Times Group and other publications, where he reported on developments in enterprise technology, digital transformation and other issues.

Mathew J. Schwartz

Mathew J. Schwartz

Executive Editor, DataBreachToday & Europe, ISMG

Schwartz is an award-winning journalist with two decades of experience in magazines, newspapers and electronic media. He has covered the information security and privacy sector throughout his career. Before joining Information Security Media Group in 2014, where he now serves as the executive editor, DataBreachToday and for European news coverage, Schwartz was the information security beat reporter for InformationWeek and a frequent contributor to DarkReading, among other publications. He lives in Scotland.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.