By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Scattered Spider retail attacks spreading to US, says Google | Computer Weekly
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > News > Scattered Spider retail attacks spreading to US, says Google | Computer Weekly
News

Scattered Spider retail attacks spreading to US, says Google | Computer Weekly

News Room
Last updated: 2025/05/14 at 10:52 PM
News Room Published 14 May 2025
Share
SHARE

Retailers in the United States are now coming under attack from Scattered Spider, the English-speaking hacking collective that is suspected of being behind a series of DragonForce ransomware attacks on high street stores Marks & Spencer (M&S) and Co-op, according to Google’s Threat Intelligence Group (GTIG).

GTIG and its cohorts at Google Cloud’s Mandiant threat intel unit said the cyber attacks are still under investigation, and for reasons of privacy the researchers have not yet named any victims in the US. The team also held back from providing any formal attribution at this time.

“The US retail sector is currently being targeted in ransomware and extortion operations that we suspect are linked to UNC3944, also known as Scattered Spider,” GTIG chief analyst John Hultquist told Computer Weekly via email this afternoon.

“The actor, which has reportedly targeted retail in the UK following a long hiatus, has a history of focusing their efforts on a single sector at a time, and we anticipate they will continue to target the sector in the near term. US retailers should take note,” said Hultquist.

Hultquist described Scattered Spider as aggressive, creative, and highly adept at circumventing even the most mature security programmes and defences.

“They have had a lot of success with social engineering and leveraging third parties to gain entry to their targets. Mandiant has provided a hardening guide based on our experience with more details on their tactics and steps organisations can take to defend themselves,” said Hultquist.

Identity, authentication the first line of defence

When defending against Scattered Spider, hardening identity verification and authentication practices are of utmost importance, said Mandiant.

The gang has proven highly effective at using social engineering techniques to impersonate users contacting its victims’ IT helpdesks, so as a first step, helpdesk staff will need additional training to positively identify inbound contacts, using methods such as on-camera or in-person verification, government ID verification, or challenge and response questions.

Security teams may also want to look into temporarily disabling, or enhancing validation, for self-service password resets, and routing both these and multifactor authentication resets through manual helpdesk workflows for the time being. Employees should also be made to authenticate prior to changing authentication methods, such as adding a new phone number.

Security teams can also implement additional safeguards such as requiring changes to be made from trusted office locations, or using out-of-band verification, such as a call back to an employee’s registered mobile number, before proceeding with a sensitive request.

It may also be worth considering taking steps such as banning SMS, phone call or email as authentication controls, using phishing-resistant MFA apps, and using FIDO2 security keys for privileged identities. Ultimately, said Mandiant, the goal should be transition to passwordless authentication if possible.

More widely, non-IT staff should be taught to avoid relying on publicly available data for verification, such as dates of birth, or the last four digits of US Social Security Numbers.

With no US retailers yet publicly-named as victims of Scattered Spider’s campaign, Nic Adams, co-founder and CEO at 0rcus, a security automation platform, said the identities of victims were largely irrelevant given the commoditisation of the threat chain.

“Whether DragonForce, Scattered Spider, or a shared affiliate ring executed the intrusion is irrelevant. Who the hell cares. An overlap in TTPs proves the industrialisation of compromise. Threat actors don’t need advanced exploits. Simply put, organisational blindness to behavioral anomalies, lax identity workflows, IT helpdesks that treat social engineering as a customer service moment. I call this the breach-point. Continuing to focus on malware or ransomware only further validates trust flow mismanagement,” said Adams.

“Phishing, cred abuse, Cobalt Strike, LOTL movement, SystemBC tunnels, Mimikatz extractions, data staging to MEGA is now a commodity kill chain. What came after was orchestration: full access, lateral expansion, data exfiltration, selective encryption, ransom leverage. The payload was just a press release because the campaign had already succeeded long before that binary detonated.”

Adams called on organisations to start thinking like threat actors. “The next breach will follow the same path. One-click, credential, absent defence layer. Another billion in market cap evaporated,” he said. 

“Oranisations that survive what’s coming will be those that embed threat logic at the protocol level, assign root access to operators who know what adversaries build, and stop misleading everyone by asserting compliance equals control. You can’t outsource this. You can’t automate this. You either build with black hats or remain target practice for those who take the hint.”

M&S insurance claim likely to top £100m

Back in the UK, reports today (14 May) suggested that M&S’ insurers may find themselves on the hook for as much as £100m following the ransomware attack, with Allianz and Beazley particularly exposed.

According to the Financial Times, the claim would likely cover lost online sales and data breach liability losses following the theft of customer data from the retailer’s systems. M&S has already lost tens of millions of pounds as a result of the cyber attack, which has left its food supply chains in disarray.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Apple TV+ has entered its blockbuster era
Next Article 10 Best Free Online Sticky Notes Apps in 2025
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Nonprofit Social Media: Tips on How to Achieve Big Results with Small Teams
Computing
Google rolls out Android 16 beta 4.1 update for pixel with these fixes
Software
What Andor understands about fascism that the rest of Star Wars never did
News
The studio of Kassos and Peepaodo unveils its first film and it promises
Mobile

You Might also Like

News

What Andor understands about fascism that the rest of Star Wars never did

7 Min Read
News

The OnePlus 13 is a great camera phone, and the OnePlus 15 could continue this trend

2 Min Read
News

Review: Sonnet MacCuff mini – a well-designed M4 Mac mini mount [Video] – 9to5Mac

4 Min Read
News

Donald Trump hails former terrorist warlord as ‘a young, attractive guy’

3 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?