ForumsGeneralScattered Spider Guilty Plea: A Look Back at Smishing TTPs

Scattered Spider Guilty Plea: A Look Back at Smishing TTPs

SecArch_Diana 5/3/2026 USER

Just saw the breaking news regarding Tyler Robert Buchanan (aka 'Tylerb') pleading guilty. It’s a significant win for law enforcement, but for us in the trenches, it serves as a stark reminder of the effectiveness of the TTPs Scattered Spider (aka 0ktapus) popularized back in 2022.

While the plea covers wire fraud and identity theft, we shouldn't forget the technical impact of their initial access campaigns. They weren't just running generic phishing kits; they were specifically targeting SSO providers and telecom employees to facilitate SIM swaps and bypass MFA. The 'Summer of 2022' campaign against tech firms was a masterclass in social engineering combined with basic technical exploitation.

For those hunting similar indicators today, Scattered Spider often relied on SMS phishing (smishing) hosting on compromised infrastructure. If you're reviewing your logs, keep an eye out for anomalous MFA spam—specifically repeated push notifications followed by a success, which indicates MFA fatigue.

Here is a basic KQL query for Sentinel/Defender to help visualize potential MFA bombing attempts targeting Okta or Entra ID:

SigninLogs
| where ResultDescription == "MFA required" or Status has "50074"
| summarize count() by UserPrincipalName, AppDisplayName, bin(TimeGenerated, 5m)
| where count_ > 5
| order by count_ desc

With the rise of generative AI making these phishing texts even more convincing, are you all seeing a shift back towards SMS-based attacks, or is email still the primary vector in your environments?

VP
VPN_Expert_Nico5/3/2026

We definitely saw a spike in smishing attempts targeting on-call engineers last quarter. The attackers are getting smarter about timing—often hitting outside of 9-5 hours when SOC visibility is lower. We ended up adding a specific corpus of keywords to our secure email gateways that also scans for SMS forwarding logs. It's not perfect, but it caught a few attempts mimicking Okta Verify alerts.

K8
K8s_SecOps_Mei5/3/2026

The MFA fatigue angle is real. We moved our privileged access users to FIDO2 hardware keys specifically because of the Scattered Spider playbook. No amount of social engineering can help an attacker if they don't have the physical token. It was a hard sell to management initially, but this guilty plea helps justify the expense.

Verified Access Required

To maintain the integrity of our intelligence feeds, only verified partners and security professionals can post replies.

Request Access

Thread Stats

Created5/3/2026
Last Active5/3/2026
Replies2
Views66