

Srsly Risky Biz: Four key players drive Scattered Spider
5 snips Jul 10, 2025
Tom Uren and Amberleigh Jack delve into the inner workings of Scattered Spider, highlighting key figures behind its cyber exploits. They discuss the community-like nature of this group and its sophisticated techniques, like SIM swapping. The conversation shifts to staggering data leaks within China's espionage ecosystem, raising questions about a burgeoning market for espionage-as-a-service. The potential for actionable intelligence from these leaks sparks intrigue, hinting at future law enforcement strategies in the relentless battle against cybercrime.
AI Snips
Chapters
Transcript
Episode notes
Few Key Players Drive Scattered Spider
- Scattered Spider's impact mainly stems from a few highly skilled key players coordinating operations.
- Targeting these few could offer leverage to disrupt the wider community's disruptive activities.
Focus on Key Operators
- Focus law enforcement and defense efforts on identifying and disrupting the few key operators of Scattered Spider.
- Prioritize stopping high-impact, disruptive members over the larger lower-impact community.
Social Engineers Centralized in Few
- Bill Siegel found only two or three people actually making the social engineering calls.
- This shows a limited number of operators handle the complex voice-based hacks for Scattered Spider.