
SCARS Institute’s Encyclopedia of Scams™ Published Continuously for 25 Years

Scattered Spider SIM Swapping Attacks Allow Scammers To Completely Take Over Your Phone And Then All Of Your Accounts!
Scattered Spider is a financially motivated cybercriminal group that has gained notoriety for its sophisticated SIM-swapping attacks.
Scattered Spider’s SIM swapping attacks are particularly concerning due to their high level of sophistication and the group’s ability to evade detection. The group has been known to target high-net-worth individuals, cryptocurrency holders, and business executives, causing significant financial losses and reputational damage.
Who is the Scatetred Spider Cybercriminal Collective
Scattered Spider: A Notorious Cybercrime Syndicate
Scattered Spider, also known as 0ktapus, Starfraud, UNC3944, Scatter Swine, Octo Tempest, and Muddled Libra, is a financially motivated cybercrime group that has gained notoriety for its sophisticated SIM-swapping attacks. Operating since at least 2020, the group has targeted high-net-worth individuals, cryptocurrency holders, and business executives, causing significant financial losses and reputational damage.
Scattered Spider’s operations are not confined to a specific geographical region. They have targeted individuals and businesses across the globe, demonstrating their ability to adapt and evade detection. The group’s global reach highlights the interconnectedness of the digital landscape and the need for enhanced cybersecurity measures worldwide.
Law enforcement agencies have been actively investigating Scattered Spider’s activities. In 2022, the FBI issued an advisory warning about the group’s tactics and urged potential victims to take precautionary measures. Cybersecurity firms have also provided valuable insights into Scattered Spider’s infrastructure and methods.
What is a SIM Swap Attack
A SIM swap cyberattack, also known as SIM jacking or SIM card hijacking, is a type of social engineering attack that involves tricking a victim’s mobile carrier into transferring their phone number to a SIM card controlled by the attacker. This allows the attacker to intercept all calls, text messages, and even two-factor authentication (2FA) codes sent to the victim’s phone number.
How SIM Swapping Works
SIM swapping attacks typically involve a multi-step process:
-
Information Gathering: The attacker gathers personal information about their target through various means, including social media, data breaches, and phishing attacks.
-
Social Engineering: Using the gathered information, the attacker contacts the victim’s mobile carrier and impersonates the victim. They may provide convincing details about the victim’s identity, account information, and recent transactions to gain the carrier’s trust.
-
SIM Swap Execution: Once the carrier is convinced, the attacker requests a SIM swap, transferring the victim’s phone number to a SIM card they control.
-
Financial Gain: With control of the victim’s phone number, the attacker can intercept 2FA codes and access the victim’s online financial accounts, initiating fraudulent transactions and draining their funds.
According to the FBI & CISA
Scattered Spider SUMMARY The Federal Bureau of Investigation (FBI) and Cybersecurity and Infrastructure Security Agency (CISA) are releasing this joint Cybersecurity Advisory (CSA) in response to recent activity by Scattered Spider threat actors against the commercial facilities sectors and subsectors. This advisory provides tactics, techniques, and procedures (TTPs) obtained through FBI investigations as recently as November 2023. Scattered Spider is a cybercriminal group that targets large companies and their contracted information technology (IT) help desks. Scattered Spider threat actors, per trusted third parties, have typically engaged in data theft for extortion and have also been known to utilize BlackCat/ALPHV ransomware alongside their usual TTPs. The FBI and CISA encourage critical infrastructure organizations to implement the recommendations in the Mitigations section of this CSA to reduce the likelihood and impact of a cyberattack by Scattered Spider actors.
For more see the PDF below.
The Impact of Scattered Spider Attacks
Scattered Spider’s attacks have had a significant impact on individuals and businesses:
-
Financial Losses: Victims have suffered substantial financial losses due to unauthorized transactions, cryptocurrency theft, and identity theft.
-
Reputational Damage: Businesses that have fallen victim to Scattered Spider’s attacks have faced reputational damage and loss of customer trust.
-
Psychological Distress: Victims have experienced emotional distress and anxiety due to the violation of their privacy and the financial losses they have incurred.
An Example of a high-profile Scattered Spider Attack:
Target: A cryptocurrency investor
Method: SIM swapping
Outcome: $1 million in cryptocurrency stolen
Details:
In 2022, Scattered Spider targeted a cryptocurrency investor by tricking the investor’s mobile carrier into transferring the investor’s phone number to a SIM card controlled by the group. With control of the investor’s phone number, Scattered Spider was able to intercept 2FA codes and access the investor’s cryptocurrency wallet. The group then stole $1 million in cryptocurrency from the investor’s wallet.
This attack highlights the sophisticated nature of Scattered Spider’s SIM-swapping attacks and the potential for significant financial losses. Cryptocurrency investors are particularly vulnerable to these attacks, as their digital assets can be easily stolen if attackers gain access to their wallets.
Here are some additional details about the attack:
-
- The attackers spent months gathering information about the investors, including their phone numbers, social media profiles, and online activity.
- The attackers used this information to impersonate the investor when they contacted the investor’s mobile carrier.
- The attackers were able to convince the carrier to transfer the investor’s phone number to them by providing convincing details about the investor’s identity and account information.
- Once they had control of the investor’s phone number, the attackers were able to intercept 2FA codes sent to the investor’s phone.
- The attackers used these 2FA codes to access the investor’s cryptocurrency wallets and steal their funds.
This attack is a reminder of the importance of taking steps to protect yourself from SIM-swapping attacks. These steps include:
-
- Using strong and unique passwords for all online accounts.
- Enabling two-factor authentication (2FA) wherever possible.
- Being cautious about sharing personal information online.
- Contact your mobile carrier directly if you suspect your SIM card has been compromised.
How to Protect Yourself from SIM Swapping Attacks
To protect yourself from SIM-swapping attacks, you can take the following steps:
-
Use Strong Passwords and 2FA: Use strong and unique passwords for all online accounts, especially for financial accounts and email. Enable two-factor authentication (2FA) wherever possible. This adds an extra layer of security by requiring a code from your phone or a separate authentication app to log in, even if someone has your password.
-
Avoid Oversharing Personal Information: Be cautious about sharing personal information online, especially on social media. This information can be used by attackers to gather intelligence about you and your accounts.
-
Contact Mobile Carrier Directly: If you suspect your SIM card has been compromised, contact your mobile carrier directly and request to freeze your account. This will prevent the attacker from using your phone number for malicious purposes.
-
Stay Informed: Keep up-to-date on the latest SIM swapping tactics and security best practices to stay ahead of evolving threats.
-
Consider Porting to a More Secure Mobile Carrier: Some mobile carriers offer enhanced security measures and protocols specifically designed to protect against SIM swapping attacks.
By following these steps, you can significantly reduce your risk of falling victim to a SIM-swapping attack.
Scattered Spider FBI/CISA Alert
More:
- Scattered Spider | CISA
- Scattered Spider Casino Hackers Evade Arrest in Plain Sight (darkreading.com)
- Scattered Spider Hops Nimbly From Cloud to On-Prem in Complex Attack (darkreading.com)
- SIM Swapping Attacks | New Jersey Cybersecurity & Communications Integration Cell (nj.gov)
- OTP-Based Fraud – Scam Basics (romancescamsnow.com)
- Choices: A Cybersecurity Learning Lesson – Guest Editorial by Brett Johnson (romancescamsnow.com)
- Octo Tempest Cybercrime Gang – Organized Criminal Enterprise Profile (romancescamsnow.com)
Do You Need Support?
Get It Now!
SCARS provides the leading Support & Recovery program for relationship scam victims – completely FREE!
Our managed peer support groups allow victims to talk to other survivors and recover in the most experienced environment possible, for as long as they need. Recovery takes as long as it takes – we put no limits on our support!
SCARS is the most trusted support & education provider in the world. Our team is certified in trauma-informed care, grief counseling, and so much more!
To apply to join our groups visit support.AgainstScams.org
We also offer separate support groups for family & friends too.
Become a
SCARS STAR™ Member
SCARS offers memberships in our STAR program, which includes many benefits for a very low annual membership fee!
SCARS STAR Membership benefits include:
- FREE Counseling or Therapy Benefit from our partner BetterHelp.com
- Exclusive members-only content & publications
- Discounts on SCARS Self-Help Books Save
- And more!
To learn more about the SCARS STAR Membership visit membership.AgainstScams.org
To become a SCARS STAR Member right now visit join.AgainstScams.org
-/ 30 /-
What do you think about this?
Please share your thoughts in a comment below!
Article Rating
Table of Contents
POPULAR ARTICLES
ARTICLE META
RATE THIS ARTICLE?
LEAVE A COMMENT?
Recent Comments
On Other Articles
on SCARS INSTITUTE SCAM WARNINGS – 2025: “This list is astounding! This just shows the general public has no idea the lengths the criminals will go to…” Jul 12, 10:17
on Nigeria – [EFCC] Economic & Financial Crimes Commission: “Thank you for your comment, but this is patently false. China is the source for the most scammers. Brazil has…” Jul 9, 06:20
on Nigeria – [EFCC] Economic & Financial Crimes Commission: “NIgeria has produced more scammers than the whole world produced. Seems like their law enforcement is pretty incompetent.” Jul 8, 02:51
on Self-Pity & Scam Victim Recovery: “I like how this article incorporates gratitude as an antidote to self-pity. I also like how the writer corelates that…” Jul 7, 19:48
on Victim Psychology – Managing Your Emotional 5 Saboteurs: “It is so possible to stand in our own way during our recovery. That self-doubt about what happened, even feeling…” Jul 5, 12:51
on Romance Scams – Crime Typology Overview / Victim Impact Analysis – 2025: “Excellent compendium of knowledge on romance scams . Thank you Dr. Tim” Jul 5, 07:43
on Romance Scams – Crime Typology Overview / Victim Impact Analysis – 2025: “Dr. Tim, in the couple of hours you took to pull this information together into a victim impact analysis, is…” Jul 4, 18:56
on The Normalcy Bias: Understanding the Cognitive Bias that Can Put You in Danger – 2022 [UPDATED 2025]: “The article has been reviewed and updated. Thank you.” Jul 2, 07:31
on Victims As Activists & Why Many Scam Victims Should Delay Or Not Become One: “This article is clear in the ways that survivors can put themselves off track trying to help before they are…” Jul 1, 20:05
on Victim Vulnerability After The Scam – Physical Risks: “Thank you for this article. I had no idea that after a crime we walk differently, or use smaller gestures.…” Jul 1, 19:41
Important Information for New Scam Victims
- Please visit www.ScamVictimsSupport.org – a SCARS Website for New Scam Victims & Sextortion Victims
- Enroll in FREE SCARS Scam Survivor’s School now at www.SCARSeducation.org
- Please visit www.ScamPsychology.org – to more fully understand the psychological concepts involved in scams and scam victim recovery
If you are looking for local trauma counselors please visit counseling.AgainstScams.org or join SCARS for our counseling/therapy benefit: membership.AgainstScams.org
If you need to speak with someone now, you can dial 988 or find phone numbers for crisis hotlines all around the world here: www.opencounseling.com/suicide-hotlines
A Note About Labeling!
We often use the term ‘scam victim’ in our articles, but this is a convenience to help those searching for information in search engines like Google. It is just a convenience and has no deeper meaning. If you have come through such an experience, YOU are a Survivor! It was not your fault. You are not alone! Axios!
A Question of Trust
At the SCARS Institute, we invite you to do your own research on the topics we speak about and publish, Our team investigates the subject being discussed, especially when it comes to understanding the scam victims-survivors experience. You can do Google searches but in many cases, you will have to wade through scientific papers and studies. However, remember that biases and perspectives matter and influence the outcome. Regardless, we encourage you to explore these topics as thoroughly as you can for your own awareness.
Statement About Victim Blaming
Some of our articles discuss various aspects of victims. This is both about better understanding victims (the science of victimology) and their behaviors and psychology. This helps us to educate victims/survivors about why these crimes happened and to not blame themselves, better develop recovery programs, and to help victims avoid scams in the future. At times this may sound like blaming the victim, but it does not blame scam victims, we are simply explaining the hows and whys of the experience victims have.
These articles, about the Psychology of Scams or Victim Psychology – meaning that all humans have psychological or cognitive characteristics in common that can either be exploited or work against us – help us all to understand the unique challenges victims face before, during, and after scams, fraud, or cybercrimes. These sometimes talk about some of the vulnerabilities the scammers exploit. Victims rarely have control of them or are even aware of them, until something like a scam happens and then they can learn how their mind works and how to overcome these mechanisms.
Articles like these help victims and others understand these processes and how to help prevent them from being exploited again or to help them recover more easily by understanding their post-scam behaviors. Learn more about the Psychology of Scams at www.ScamPsychology.org
Psychology Disclaimer:
All articles about psychology and the human brain on this website are for information & education only
The information provided in this article is intended for educational and self-help purposes only and should not be construed as a substitute for professional therapy or counseling.
While any self-help techniques outlined herein may be beneficial for scam victims seeking to recover from their experience and move towards recovery, it is important to consult with a qualified mental health professional before initiating any course of action. Each individual’s experience and needs are unique, and what works for one person may not be suitable for another.
Additionally, any approach may not be appropriate for individuals with certain pre-existing mental health conditions or trauma histories. It is advisable to seek guidance from a licensed therapist or counselor who can provide personalized support, guidance, and treatment tailored to your specific needs.
If you are experiencing significant distress or emotional difficulties related to a scam or other traumatic event, please consult your doctor or mental health provider for appropriate care and support.
Also read our SCARS Institute Statement about Professional Care for Scam Victims – click here to go to our ScamsNOW.com website.
Thank you for your comment. You may receive an email to follow up. We never share your data with marketers.