web analytics

Feds Indict 5 Suspects Tied to Scattered Spider Cybercrime – Source: www.databreachtoday.com

Rate this post

Source: www.databreachtoday.com – Author:

Cybercrime , Fraud Management & Cybercrime , Social Engineering

FBI Ties Men to at Least 45 Attacks and Theft of Cryptocurrency Worth Millions Prajeet Nair (@prajeetspeaks) , Mathew J. Schwartz (euroinfosec) • November 21, 2024    

Feds Indict 5 Suspects Tied to Scattered Spider Cybercrime
Image: Shuttertock

The U.S. government on Wednesday unsealed criminal charges against five suspected members of “a loosely organized financially motivated cybercriminal group” tied to numerous high-profile and devastating hack attacks.

See Also: OnDemand | 2024 Phishing Insights: What 11.9 Million User Behaviors Reveal About Your Risk

An unsealed federal grand jury indictment, filed under seal on Oct. 8, charges the five men with conspiracy, wire fraud and identity theft crimes, committed while operating as part of a hacking group.

“We allege that this group of cybercriminals perpetrated a sophisticated scheme to steal intellectual property and proprietary information worth tens of millions of dollars,” said Martin Estrada, U.S. Attorney for the Central District of California, where the case is being prosecuted.

The suspects were allegedly part of the criminal group known as “Scattered Spider”, which has been tied to attacks leveraging “social engineering techniques to target enterprise call centers, extensive SMS phishing campaigns, and various other more sophisticated techniques to compromise major organizations,” according to Google Cloud’s Mandiant incident response group.

Suspects named in the indictment: Ahmed Hossam Eldin Elbadawy, 23, a.k.a. “AD,” of Texas; Noah Michael Urban, 20, a.k.a. “Sosa” and “Elijah,” of Florida; Evans Onyeaka Osiebo, 20, of Dallas; and Joel Martin Evans, 25, a.k.a. “joeleoli,” of North Carolina.

The FBI arrested Evans Tuesday in North Carolina; Urban was already detained as part of a separate federal case. The government didn’t state whether Elbadawy and Osiebo remain at large. Aside from the indictment, as of Thursday all other case records remained sealed.

Authorities on Wednesday also unsealed a partially redacted criminal complaint against Tyler Robert Buchanan, a 22-year-old man from Scotland, dated May 25. He’s charged with conspiracy to commit wire fraud, conspiracy, wire fraud and aggravated identity theft.

Spanish police arrested Buchanan on May 31. On June 21, the U.S. Attorney’s Office filed a request for his extradition.

Scattered Spider has been tied to attacks against over 130 different organizations mostly through social engineering. The group has also worked with the Russia-based ransomware group Alphv, aka BlackCat, oftentimes targeting Western victims.

“These individuals, and other actors that they have collaborated with, have caused so much pain and financial harm to organizations across North America through their disruptive intrusions,” said Charles Carmakal, CTO of Google Cloud’s Mandiant Consulting group.

“This is a nice win for law enforcement that over time has significantly hampered the group’s fast-paced tempo this year,” Carmakal said.

FBI Ties Suspects to at Least 45 Attacks

The FBI said it has tied these five suspects to the targeting of at least 45 companies based in the U.S. and abroad, including Canada, the United Kingdom and India. The group’s victims or attempted victims included “dozens of companies” in the U.S. spanning numerous sectors, including social media, venture capital, interactive entertainment, telecommunications and technology, consultancies, cloud providers and virtual currency, according to court documents.

The defendants have also been charged with stealing virtual currency worth at least $11 million for 29 victims.

The suspects have been charged with running phishing attacks from at least September 2021 to April 2023, oftentimes sending mass SMS text messages to employees of targeted firms. The messages typically purported to be from the company, or else a trusted IT or business supplier, and “often stated that the employees’ accounts were about to be deactivated and provided links to phishing websites which were designed to look like legitimate websites of the victim companies or their contracted suppliers and lure the recipient into providing confidential information, including account login credentials,” said the Department of Justice.

The FBI said the phishing toolkits included the ability to trick victims into not just entering their username and password, but any one-time code they might receive as part of a two-factor authentication request.

Prosecutors have accused the suspects of using the stolen authentication information to access victims’ networks and “confidential information, including confidential work product, intellectual property, and personal identifying information, such as account access credentials, names, email addresses and telephone numbers.”

The group allegedly also used information obtained through these intrusions, leaked sets of data and other sources, “to gain unauthorized access to numerous individuals’ cryptocurrency accounts and wallets and steal millions of dollars’ worth of virtual currency,” the DOJ said.

Scotland Seized Suspect’s Devices

While prosecutors needn’t detail in full in an indictment all of their evidence pertaining to a case, a U.S. extradition request filed with Spain contains extra details about evidence gathered in the course of a separate Scottish law enforcement investigation.

The extradition request said Police Scotland in April 2023 searched Buchanan’s residence in Dundee, seizing about 20 digital devices – including desktop and laptop computers, external storage devices and phone – and shared digital forensic copies of them with the FBI, from November 2023 to January 2024.

The FBI said it found in the browser search history of devices seized by Police Scotland multiple visits to phishing service management consoles, attempts to log into victim companies, usernames and passwords for employees of U.S. firms, and messages, including screenshots of Telegram chats, referencing “SIM-swapping and social engineering” schemes used to harvest cryptocurrency worth at least $3 million from victims.

The bureau said one of the systems seized from Buchanan contained a phishing kit, described as being “a software program designed to capture information coming into a phishing website (like usernames and passwords) and then transmit that information to another database that could be accessed by attackers.” Investigators said they believe that Telegram channel was accessed by an unnamed coconspirator.

The installed phishing kit had the same hash value as phishing kits hosted on virtual private servers used to launch phishing attacks, it said.

The FBI said a blockchain “shortcut” found on Buchanan’s system referenced a cryptocurrency address – which it believes he controlled – via which 391 bitcoins, currently worth $30 million, were transferred in or out from October 2022 to February 2023.

Original Post url: https://www.databreachtoday.com/feds-indict-5-suspects-tied-to-scattered-spider-cybercrime-a-26870

Category & Tags: –

Views: 0

LinkedIn
Twitter
Facebook
WhatsApp
Email

advisor pick´S post