Netcrook Logo
👤 AUDITWOLF
🗓️ 20 Sep 2025   🌍 North America

Spider in the Web: How Scattered Spider Looted $115 Million and Breached US Courts

Inside the audacious cybercrime spree that shook corporate giants and even the federal judiciary - unmasking a teenage mastermind and exposing a global web of digital extortion.

Fast Facts

  • Scattered Spider extorted at least $115 million in ransoms from over 120 cyberattacks since 2022.
  • A US federal court system was breached, with personnel data stolen and searched for subpoenas on the hackers.
  • UK national Thalha Jubair, 19, was arrested in London and faces up to 95 years in US prison if convicted.
  • Authorities traced servers and cryptocurrency wallets to Jubair using clues from gaming accounts, food deliveries, and Telegram chats.
  • The group’s tactics relied on social engineering - tricking help desks for password resets to seize control of high-level accounts.

Cracking the Court: A Cyber Heist Unfolds

Imagine a spider weaving its web not in the shadows of a basement, but across the humming wires of the world’s most sensitive networks. That’s the story behind Scattered Spider, a cybercriminal syndicate whose three-year rampage netted at least $115 million in ransom payments and left a trail of digital carnage stretching from Fortune 500 companies to the corridors of US federal courts.

This week, the Justice Department unmasked one of the operation’s alleged architects: Thalha Jubair, a 19-year-old from the UK. Arrested in London, Jubair faces a litany of charges in the US, including computer fraud and money laundering. Prosecutors tie him to at least 120 attacks, with 47 targeting American organizations - among them, the US Courts’ own network.

Social Engineering: Old Tricks, New Prey

Scattered Spider’s methods weren’t high-tech wizardry so much as high-stakes con artistry. The group’s signature move? Calling a company’s help desk and persuading staff to reset passwords on privileged accounts. With those keys in hand, the hackers would slip inside, loot sensitive data, and then lock up computers with ransomware - demanding multi-million dollar ransoms to restore access.

In one extraordinary breach, prosecutors allege Jubair gained access to US federal court accounts, rifled through personnel records, and even searched a judge’s inbox for subpoenas that might be closing in on the group. The attackers tried to cover their tracks, but left digital footprints everywhere - from browser histories to cryptocurrency trails.

The Digital Manhunt: Following the Crypto Crumbs

Law enforcement’s pursuit was part detective work, part digital forensics. Investigators linked Jubair to the servers and crypto wallets used in the attacks by tracing everything from Telegram handles to orders for pizza and gaming credits. One crypto wallet alone held $36 million - some of it traced to ransomware victims, some spent on gift cards for food delivery and online games tied to Jubair’s personal accounts.

The international chase involved agencies from the US, UK, Canada, Australia, Romania, and the Netherlands, highlighting the borderless nature of digital crime. The evidence was a patchwork: Telegram chats boasting of ransom hauls, IP addresses shared by gaming and hacking accounts, and even a food delivery to Jubair’s apartment.

Why It Matters: A New Era of Cybercrime

Scattered Spider’s audacity is a warning: the barrier to launching devastating cyberattacks is lower than ever. Their blend of social engineering and digital extortion echoes infamous gangs like LAPSUS$, who similarly breached tech giants with little more than charm and cunning. The breach of the US Courts underscores the vulnerability of even the most protected institutions, and the global reach of teenage hackers armed with little more than a phone and a plan.

As law enforcement closes in, cybercriminals scatter - often regrouping under new names, in new forums. But the web they weave grows ever more tangled, pulling in victims from every corner of the digital world.

Scattered Spider may be unraveling, but their legacy is a stark reminder: in the digital age, the next breach could begin with nothing more than a phone call and a convincing story.

WIKICROOK

  • Ransomware: Ransomware is malicious software that encrypts or locks data, demanding payment from victims to restore access to their files or systems.
  • Social Engineering: Social engineering is the use of deception by hackers to trick people into revealing confidential information or providing unauthorized system access.
  • Help Desk Attack: A Help Desk Attack is when hackers trick support staff into resetting passwords or giving access to sensitive accounts using social engineering.
  • Cryptocurrency Wallet: A cryptocurrency wallet is a digital tool or app used to securely store, send, and receive cryptocurrencies like Bitcoin by managing cryptographic keys.
  • Telegram: Telegram is an encrypted messaging app known for privacy, often used by hackers to share information, make announcements, and coordinate activities.

AUDITWOLF AUDITWOLF
Cyber Audit Commander
← Back to news