Protect and secure your data from cyber attacks
Data Protection
Data Security
Data Insights
The 5 Steps to Cyber Resilience
Cloud & SaaS
Enterprise
Industries
Several British retail companies, including Harrods and Marks & Spencer, appear to have had their operations disrupted by the group.
Popular British retailer Marks & Spencer was hit by a costly cyberattack this past Easter weekend. The retailer has been forced to shut down its online operations. According to an April 23 Marks & Spencer press release, “We are working hard to restore our services and minimise disruption and are being supported by industry-leading experts.” I recently saw mostly empty shelves at the Marks & Spencer at Heathrow Airport. An online ransomware gang, Scattered Spider, appears to be behind the attack. Below, I outline:
The rising number of cyberattacks—particularly in retail—was among the topics covered recently when Cohesity CEO and President Sanjay Poonen spoke with CNBC Squawk Box Europe. (You can watch that embedded video below.)
The 2023 MGM Resorts cyberattack was claimed by the ALPHV/Black Cat ransomware gang. However, the initial access was gained by a British-speaking hacker who socially engineered MGM’s helpdesk to reset an employee’s password. The Cohesity Data Security Alliance partner CrowdStrike dubbed this group “Scattered Spider.” Scattered Spider was also responsible for the attack on Caesar’s Entertainment, where the company paid the group at least half of a $30 million ransom to the group to obtain decryption keys and prevent the release of data stolen during the attack.
Scattered Spider’s origins lie in a group known as “The Community,” AKA “The Com.” Rather than a single, homogenous group, The Com is more like a distributed cybercriminal social network whose members can form into groups to collaborate on particular cyber actions. The Com has also been implicated in a variety of unsavoury activities outside of ransomware, such as cyberbullying, stalking, and harassment of vulnerable teenagers—forcing them into filming themselves physically harming themselves, killing their pets, and producing child sex exploitation material. The implications of a group with such warped morals moving into the ransomware criminal marketplace should not be underestimated.
One member of Scattered Spider, who went by the moniker Holy, was a British 17-year-old arrested by the West Midlands Police for his part in the attack on MGM. As is common with members of cybercriminal groups, Holy was involved in other groups before joining Scattered Spider, most notably LAPSUS, whose leaked chat logs showed they had been involved in attacks on technology companies such as Electronic Arts Games, Microsoft, NVIDIA, Okta, Samsung, and T-Mobile.
Other groups affiliated with The Com were involved in the 2023 theft of large amounts of data from customer accounts of the Snowflake cloud AI data platform. Many large enterprises had uploaded huge quantities of sensitive and regulated data to the Snowflake platform, without protecting it with strong authentication. This group trawled cybercrime forums for details of stolen Snowflake credentials. It used the technique of credential stuffing to gain access to and steal data from over 160 accounts from high-profile businesses, including AT&T, TicketMaster, Lending Tree, Advance Auto Parts, Neiman Marcus, and Santander Bank.
Cohesity Data Security Alliance Partner Mandiant named this group UNC5537 and reported that these companies had been approached to pay a ransom to prevent the publication of the stolen data. A member of the UNC5537 group was frequently featured on The Com list of the “100 richest SIM-swappers,” a technique used to gain initial access to systems that can be later either leveraged to deploy ransomware, or sold to ransomware operators by organisations known as “Initial Access Brokers.” This user had previously been a member of a cybercriminal group known as Beige. Beige has been implicated in voice phishing attacks (“vishing”) during the COVID-19 pandemic and an attack on GoDaddy that redirected traffic from tens of thousands of its customers to a cryptocurrency scam.
In 2023, overlaps between the activities of the largely English-speaking Scattered Spider and The Com communities and the Russian speaking ransomware gang ALPHV/BlackCat were starting to become clear. In an attack on Reddit, the tools, techniques, and procedures for initial access common to Scattered Spider were being seen to facilitate access to a ransomware attack later claimed by ALPHV/BlackCat. This would imply that Scattered Spider was operating as an Initial Access Broker for an ALPHV/BlackCat affiliate or as an affiliate of the ALPHV/BlackCat Ransomware-as-a-Service platform itself.
Watch Cohesity CEO and President Sanjay Poonen on CNBC Squawk Box Europe*, below:
Scattered Spider exists in the broader cybercriminal community, where members from different groups collaborate, migrate, or align. There was a lull in Scattered Spider’s activity after the attacks on MGM and Caesar in May 2022. Instead, they provided support to other criminal gangs. But in April 2025, several British retail companies, including Harrods and Marks & Spencer, appeared to have had their operations disrupted by the group. In the Marks & Spencer’s attack, it appears that initial access was gained in February 2025, after which the contents of the company’s Active Directory were stolen. The adversaries dwelled for months before eventually deploying the DragonForce ransomware encryptor on 24th April.
One of the most notable things about Scattered Spider is their adeptness at social engineering, defence evasion, and advanced persistence mechanisms.
Evasion of cybersecurity tools like Endpoint Detection and Response (EDR) is commonplace in most Ransomware-as-a-Service platforms, rendering organisations blind to new and ongoing attacks. A common technique used by the group includes Bring-Your-Own-Vulnerable-Device-Driver (BYOVD), where a signed device driver that operates at the layer between hardware and the operating system is used to gain SYSTEM-level access and to terminate the processes of security solutions.
Scattered Spider’s capabilities in evasion extend beyond those common to other ransomware gangs and include targeting weak implementations of Identity & Access Management and Single-Sign On solutions, including Okta. Scattered Spider has been known to socially engineer mobile phone helpdesks or SIM replacement portals so they can conduct a “SIM Swapping” attack by taking control of the target’s phone number. This enables them to access the target’s SMS messages, including Two-Factor Authentications codes. Scattered Spider is known to send bulk phishing links via SMS posing as SSO login portals to capture valid credentials.
Once inside a victim’s infrastructure, Scattered Spider has highly proficient skills in “living off the land” in enterprise Windows environments, all major cloud providers, and virtualized infrastructure. They use the organisation’s own IT capabilities to mask the progression of the attack and ensure they maintain persistence if an organisation reverts to a backup snapshot without sufficient investigation and remediation of the threats found.
The graphic above shows MITRE ATT&CK stages and techniques used by Scattered Spider.
One striking thing about Scattered Spider that is worth calling out is the degree to which they go to hamper incident response and recovery efforts. They will often search the victim organisations, Exchange (T1114), Teams, and Slack conversations (T1213.005) looking for evidence of the discovery of their intrusion and the steps the victim organisation is taking to investigate and evict them. They have even been known to eavesdrop on calls and teleconferences conducted by the incident response and recovery teams, allowing them to gain insight into how security teams are progressing in their investigation and allowing them to proactively develop new avenues of intrusion in response.
Ensure your organisation has backed up critical data and protected that backup with multiple layers of defence to mitigate the risk from advanced and adaptive criminal adversaries, such as Scattered Spider, that have the capabilities to compromise administrative accounts. This includes the immutability, separation of duties, least privilege, strong authentication and vaulting capabilities of modern data management platforms like Cohesity DataProtect.
*©2025 CNBC, All rights reserved, used with permission
Written By
James Blake
Global Cyber Resiliency Strategist