UNC3944, also known as Scattered Spider, 0ktapus, and Scatter Swine, is a financially motivated cybercriminal group recognized for its aggressive use of social engineering, SMS phishing (smishing), SIM swapping, ransomware deployment, and data extortion tactics. The group is notable for its operational sophistication and its ability to adapt and expand its methods over time.

Key Characteristics

• Social Engineering & Smishing: UNC3944 frequently targets organizations by sending SMS phishing messages to employees to steal credentials. They also impersonate employees in calls to help desks to obtain password resets or multifactor authentication (MFA) codes.
• SIM Swapping: Early operations focused on telecommunications companies to facilitate SIM swapping attacks, often leading to further criminal activities.
• Ransomware & Data Extortion: Since mid-2023, the group has increasingly deployed ransomware and shifted toward stealing large volumes of sensitive data for extortion purposes. They target business-critical systems, aiming to maximize operational disruption and ransom leverage.
• Cloud and SaaS Exploitation: UNC3944 is adept at exploiting cloud environments (such as AWS and Azure) and SaaS platforms, often creating rogue virtual machines and abusing legitimate tools to maintain persistence and exfiltrate data.
• Operational Tempo: The group operates quickly, often overwhelming security teams by accessing and exfiltrating data from critical systems within days.
• Victim Profile: UNC3944 targets a broad range of sectors—including technology, telecommunications, financial services, retail, hospitality, media, and entertainment—with a focus on large enterprises, especially those with extensive help desk or outsourced IT functions.

Notable Tactics, Techniques, and Procedures (TTPs)

• Use of commercial residential proxy services to mask their location and evade detection.
• Creation of phishing domains mimicking legitimate organizational portals, often tailored using insider knowledge.
• Privilege escalation by targeting password managers and privileged access management systems.
• Deployment of ransomware on virtual machines within victim environments, sometimes disabling security controls before launching attacks.
• Aggressive post-compromise communications, including threatening notes and direct contact with executives.

Group Composition and Activity

• Members are believed to be mostly teens and young adults, primarily based in the United States and other English-speaking countries.
• The group operates in underground forums and messaging platforms like Telegram, where they acquire tools and collaborate with other cybercriminals.
• Activity slowed following law enforcement actions in 2024, but experts warn the group could rebound quickly due to its connections with broader cybercriminal networks.

Synonyms:
Scattered Spider, Oktapus, Scatter Swine