Cybersecurity

Inside the Scattered Spider Playbook: Anatomy of an SMS Phishing and SIM Swap Attack

2026-05-18 15:37:56

Overview

The cybercrime group known as Scattered Spider—also tracked as UNC3944 or Scattered Spider—has been responsible for a series of devastating social engineering attacks against major technology companies and cryptocurrency investors. Its senior member, Tyler Robert Buchanan (a.k.a. “Tylerb”), recently pleaded guilty to wire fraud conspiracy and aggravated identity theft, admitting his role in a summer 2022 SMS-based phishing campaign that compromised at least a dozen firms including Twilio, LastPass, DoorDash, and Mailchimp. This guide dissects the exact methodology used by Buchanan and his co-conspirators to steal millions in cryptocurrency, providing security professionals, incident responders, and curious readers with a detailed, step‑by‑step walkthrough of the attack chain.

Inside the Scattered Spider Playbook: Anatomy of an SMS Phishing and SIM Swap Attack
Source: krebsonsecurity.com

Prerequisites for the Attack

Before launching the campaign, Scattered Spider assembled a specific set of skills and tools:

Step‑by‑Step Execution

Step 1: Target Reconnaissance

Scattered Spider identified two types of victims:

  1. Corporate employees at technology companies – They gathered names, job titles, and contact details of IT helpdesk staff and high‑value users via OSINT (open‑source intelligence).
  2. Cryptocurrency investors – They scraped social media, forums, and blockchain analytics to find individuals with large wallets.

Step 2: Phishing Domain Setup

Buchanan and his team registered dozens of lookalike domains. According to the FBI, the same username and email address were used to register the domains, and NameCheap logs showed a login from a UK IP address leased to Buchanan weeks before the campaign. Example domains might have been:

Step 3: SMS Phishing Wave

In summer 2022, the group sent tens of thousands of SMS messages claiming to be from the target company’s IT department, warning of “suspicious login attempts” or “account verification required.” Each message contained a link to the fraudulent domain. A typical message read:

“Twilio: Unusual sign‑in detected. Verify your identity now: [http://twilio‑auth.com/verify]”

When the recipient clicked the link, they were presented with a replica of the company’s login page. Entering credentials sent them directly to the attackers.

Step 4: Corporate Account Takeover

With stolen credentials, Scattered Spider logged into corporate systems (e.g., Twilio’s customer portal or LastPass’s admin panel). They then:

Step 5: SIM Swapping

The data stolen from corporations enabled the gang to perform SIM‑swapping attacks against individual cryptocurrency investors. The process:

Inside the Scattered Spider Playbook: Anatomy of an SMS Phishing and SIM Swap Attack
Source: krebsonsecurity.com
  1. Collect victim’s phone number and personal details (from corporate breaches or third‑party leaks).
  2. Contact the victim’s mobile carrier (e.g., T‑Mobile, Verizon) pretending to be the victim, claiming they lost their SIM card.
  3. Provide verification info – Using the stolen data to answer security questions (mother’s maiden name, last 4 digits of SSN, etc.).
  4. Carrier activates new SIM – The attacker’s device now receives all SMS and calls for the victim’s number.

Step 6: Cryptocurrency Theft

With control over the victim’s phone number, the attackers:

Buchanan admitted to stealing at least $8 million in virtual currency from victims across the United States.

Common Mistakes

Mistakes Made by Scattered Spider

Mistakes Made by Victims

Summary

The Scattered Spider operation demonstrated a textbook hybrid attack: phishing corporations for data, then pivoting to SIM swaps to drain cryptocurrency. Their downfall came from poor operational security (reusing accounts, using home IPs). Tyler Buchanan now faces over 20 years in prison. For defenders, the key takeaways are: never rely on SMS as a sole authentication method, implement phishing‑resistant MFA, and educate employees to verify suspicious messages through a separate channel. The playbook is public now—but so are the lessons to stop it.

Explore

Google's Bug Bounty Shifts: Chrome Cuts, Android Boosts, and AI's Role 10 Critical Security Updates from April 2026 Patch Tuesday You Need to Know Your Guide to the Relocated Python Insider Blog: Q&A How to Protect Your Crypto Exchange from State-Sponsored Attacks: Lessons from the Grinex $15M Heist 20 Years of Cybersecurity Insights: Lessons from Dark Reading's Pioneers