Leader of Scattered Spider Hacking Collective Pleads Guilty to Multi-Million Dollar Cryptocurrency Theft and Identity Fraud

Tyler Robert Buchanan, a 24-year-old British national identified as a primary figure within the notorious "Scattered Spider" cybercrime collective, has formally entered a guilty plea in a United States federal court. The charges, which include wire fraud and aggravated identity theft, stem from a sophisticated and relentless hacking campaign that targeted some of the world’s most prominent corporations. The guilty plea marks a significant milestone in a multi-year, international investigation led by the Federal Bureau of Investigation (FBI) and the Department of Justice (DOJ), aimed at dismantling a group that has redefined the landscape of modern social engineering.
According to the legal filings and statements released by the U.S. Attorney’s Office for the Central District of California, Buchanan and four other defendants were indicted in November 2024. The prosecution alleged that between September 2021 and April 2023, the group executed a series of highly effective phishing and SIM-swapping attacks. These operations resulted in the theft of at least $8 million in cryptocurrency and the compromise of sensitive data belonging to at least a dozen major corporations. The breadth of the victim list is staggering, encompassing sectors such as entertainment, telecommunications, technology, business process outsourcing (BPO), information technology (IT) suppliers, and cloud communications providers.
The Mechanics of the Scattered Spider Strategy
The success of Scattered Spider, also tracked by security researchers under aliases such as 0ktapus, Octo Tempest, and UNC3944, was rooted not in complex software exploits, but in the psychological manipulation of human targets. The Justice Department detailed a recurring "modus operandi" used by Buchanan and his co-conspirators. The scheme typically began with a "smishing" (SMS phishing) campaign. The attackers would broadcast hundreds of fraudulent text messages to the mobile devices of employees working for a target organization or its third-party IT suppliers.
These messages were meticulously crafted to appear as legitimate administrative alerts. They often claimed that the employee’s account required immediate attention or that a new security protocol needed to be implemented. Embedded within these messages were links to phishing websites that were visual clones of the companies’ internal login portals. Once an unsuspecting employee entered their credentials, the attackers captured the usernames and passwords in real-time.
To bypass Multi-Factor Authentication (MFA)—a standard security measure—the group employed "MFA bombing" or "MFA fatigue" attacks. This involved inundating a target’s device with push notifications, hoping the victim would eventually tap "Approve" out of frustration or confusion. In more targeted instances, they utilized SIM swapping. By convincing a telecommunications provider to transfer a victim’s phone number to a SIM card under their control, the hackers could intercept one-time passwords (OTPs) sent via SMS, granting them total control over email accounts and virtual currency wallets.
A Chronology of the Investigation and Arrests
The downfall of Tyler Robert Buchanan began with a coordinated international law enforcement effort. In June 2024, Spanish authorities, acting on a request from the FBI, arrested Buchanan in Palma de Mallorca. At the time of his arrest, he was found with high-end technology and evidence linking him to the unauthorized access of corporate networks. Following his apprehension, Buchanan was extradited to the United States and has remained in federal custody since April 2025.

The legal timeline for the group shows a systematic dismantling of their leadership:
- September 2021 – April 2023: The primary period of criminal activity, during which the group breached companies like Twilio, MailChimp, and DoorDash.
- January 2024: Noah Michael Urban (known as "Sosa"), a key member of the collective, was arrested. He later pleaded guilty to wire fraud and conspiracy and was sentenced to 10 years in federal prison in May 2025.
- June 2024: Buchanan was arrested in Spain.
- July 2024: UK police arrested a 17-year-old in Walsall suspected of involvement in the high-profile MGM Resorts attack, a breach widely attributed to Scattered Spider.
- November 2024: U.S. prosecutors unsealed indictments against Buchanan and three other suspects: Ahmed Hossam Eldin Elbadawy, Evans Onyeaka Osiebo, and Joel Martin Evans.
- August 21, 2026: Buchanan is scheduled to be sentenced. He faces a statutory maximum of 22 years in federal prison.
High-Profile Targets and Financial Devastation
While the $8 million in stolen cryptocurrency is the primary figure cited in the criminal complaint, the actual economic damage caused by Scattered Spider is believed to be in the hundreds of millions. The group is credited with the September 2023 cyberattacks on MGM Resorts and Caesars Entertainment. The MGM breach was particularly devastating, forcing the company to shut down systems across its Las Vegas properties, including hotel reservation systems, slot machines, and websites. MGM later reported a $100 million hit to its earnings due to the disruption.
The group’s ability to infiltrate "gatekeeper" organizations—companies like Twilio and Okta—provided them with a springboard into thousands of other downstream targets. In the 2022 "0ktapus" campaign, the group successfully breached Twilio and used that access to target users of the encrypted messaging app Signal. This strategy of targeting the supply chain allowed a relatively small group of individuals to exert a disproportionate amount of influence over global digital infrastructure.
The Evolution of the Scattered Spider Collective
Scattered Spider represents a shift in the cybercrime ecosystem. Unlike many traditional ransomware groups that operate out of Russia or Eastern Europe, Scattered Spider is a loose-knit collective of primarily English-speaking individuals, many of whom are based in the United Kingdom and the United States. Security firms like Microsoft and Mandiant have noted that the group is exceptionally young, with some members believed to be in their late teens.
The collective is often associated with "the Com," a broader community of online hackers known for a "toxic" culture that sometimes spills over into real-world violence, including "swatting" (calling in fake police emergencies) and physical threats. This demographic shift has challenged law enforcement, as the group’s lack of a formal hierarchy and their use of decentralized platforms like Telegram and Discord make them difficult to track.
Furthermore, Scattered Spider has demonstrated a willingness to collaborate with established Russian-speaking Ransomware-as-a-Service (RaaS) operations. Since early 2023, they have been identified as affiliates for gangs such as BlackCat (ALPHV), Qilin, and RansomHub. This partnership combines the Western group’s superior social engineering skills with the sophisticated encryption tools and extortion infrastructure of the Russian syndicates.
Official Reactions and Industry Implications
The guilty plea of Buchanan has been hailed by the Department of Justice as a victory for international cooperation. "This case sends a clear message to cybercriminals around the world: you cannot hide behind a keyboard, and geographic borders will not protect you from the reach of the law," a spokesperson for the DOJ stated following the hearing.

Cybersecurity experts suggest that the Scattered Spider saga highlights a critical vulnerability in modern corporate defense: the human element. Despite billions of dollars spent on firewalls and endpoint detection, a single well-placed phone call or text message remains the most effective way to breach a Fortune 500 company. The group’s success has prompted a re-evaluation of MFA strategies, with many organizations moving away from SMS-based codes toward more secure hardware tokens (like YubiKeys) that are resistant to phishing.
The fallout from these breaches has also led to increased regulatory scrutiny. The SEC’s new rules regarding the disclosure of "material" cyber incidents were put to the test during the MGM and Caesars attacks, forcing companies to be more transparent about the impact of such breaches on their financial health.
Broader Impact and the Road Ahead
As Tyler Robert Buchanan awaits his August 2026 sentencing, the focus of law enforcement remains on the remaining members of the collective and the recovery of stolen assets. The $8 million in cryptocurrency represents only a fraction of the digital wealth moved through the group’s wallets, and investigators are continuing to trace the flow of funds through "mixers" and decentralized exchanges.
The prosecution of Buchanan serves as a landmark case in the fight against "identity-centric" cybercrime. It underscores the necessity of public-private partnerships in identifying threats and the importance of swift international extradition treaties. While the core leadership of Scattered Spider has been significantly degraded by these arrests, the tactics they pioneered—MFA fatigue, smishing, and the targeting of IT help desks—have been adopted by numerous other emerging threat actors.
For the global business community, the legacy of Scattered Spider is a sobering reminder that cybersecurity is not merely a technical challenge, but a social and psychological one. The conviction of Buchanan marks the end of one chapter, but the "spider’s web" of modern cybercrime continues to expand, requiring ever-more vigilant and coordinated defenses.




