top of page

The Scattered Spider Trilogy: Win, Lose, and Give It Away

  • Writer: Patrick Duggan
    Patrick Duggan
  • Jan 8
  • 3 min read


Act I: The Win


Target: European Space Agency Haul: 500GB of spacecraft operational data Method: Credential theft, lateral movement, exfiltration Status: "We still have access"


SpaceX, Airbus, Thales Alenia Space contractor data. Satellite failure modes. Contingency plans. The kind of intelligence nation-states pay good money for.



Verdict: WIN





Act II: The Loss


Target: Resecurity Haul: 28,000 consumer records, 190,000 payment transactions Method: Standard reconnaissance and exploitation Plot twist: It was all fake


Resecurity saw them coming. Built a honeypot. Populated it with synthetic data and already-breached records to make it look lived-in. Let them "succeed."


Then dropped the reveal. The "compromised" systems were isolated sandboxes. The "stolen" data was fabricated. The screenshots Scattered Spider posted as proof? Evidence they fell for a trap.


Someone claiming to be "the real ShinyHunters" denied involvement afterward. Sure.



Verdict: LOSS





Act III: The Giveaway


Asset: CVE-2025-61882 (CVSS 9.8) Value: Unauthenticated RCE in Oracle E-Business Suite Distribution method: Posted on "SCATTERED LAPSUS$ HUNTERS" Telegram Price: Free Who profited: Clop


On October 3, 2025, Scattered Spider leaked a working exploit for a critical Oracle vulnerability on their Telegram channel. The next day, Oracle released an emergency patch. Too late—Clop had been using it since August.


  • Organizations compromised: 103

  • Datasets on torrent sites: 77

  • Victims including: Michelin, Canon, Mazda, Estée Lauder, Broadcom, Harvard, Dartmouth

  • Estimated extortion revenue: Millions

  • Amount Scattered Spider made from the leak: $0

They did the work. Clop cashed the check.



Verdict: ???





The Pattern



Act

Target

Outcome

Scattered Spider Gets

I

ESA

500GB exfiltrated

Nation-state-grade intel

II

Resecurity

Honeypotted

Embarrassment

III

Oracle (via leak)

103 orgs owned

Nothing


This is the problem with being a "loose alliance" instead of an organized operation. No brand control. No operational security. No monetization strategy.


One faction hits the European Space Agency and walks away with spacecraft data.


Another faction falls for a honeypot and gets publicly embarrassed.


And someone in the group decides to leak a multi-million-dollar exploit for free on Telegram, letting a completely different criminal organization make all the money.





The Comedy


Scattered Spider isn't a threat group. It's a scene.


Different crews using the same name, the same TTPs, and occasionally the same Telegram channels. Some are competent (ESA). Some are sloppy (Resecurity). Some are generous to a fault (Oracle leak).


The left hand doesn't know what the right hand is giving away.





The Tragedy


103 organizations. 77 leaked datasets. 40,000+ people at Dartmouth alone with their SSNs in criminal hands.


Because a threat actor thought Telegram clout was worth more than operational security.





Recommendations


  • The "Scattered Spider" label covers multiple competence levels

  • Some will honeypot. Some won't.

  • Assume they're sharing tools freely—what works on one target will be tried on you

  • If you have a CVSS 9.8 zero-day, maybe don't post it on Telegram for free

  • Brand dilution is real—every honeypot embarrassment hurts the name

  • Clop appreciates your charitable contributions




The Trilogy


Three posts. One day. One group. Three very different outcomes.


Comedy comes in threes.




About DugganUSA: We publish free threat intelligence for the 99% who can't afford enterprise security. Unlike Scattered Spider, we're consistent about what we give away.





Her name is Renee Nicole Good.


Comments

Rated 0 out of 5 stars.
No ratings yet

Add a rating
bottom of page