SecurityBrief Australia - Technology news for CISOs & cybersecurity decision-makers
Teenagers in hoodies in dark room with glowing computer screens and digital spider web cyber attacks

Teens charged in SCATTERED SPIDER cyber attacks as experts warn of ongoing risks

Wed, 24th Sep 2025

Two teenagers in the United Kingdom have been charged in connection with a cyber attack that disrupted Transport for London for several months.

The individuals have been identified as members of SCATTERED SPIDER, a cybercrime group responsible for ransomware and extortion campaigns affecting industries such as retail, insurance, and aviation globally, with operations including attacks in Australia.

The case comes amid coordinated efforts by authorities to tackle cyber threats posed by prominent hacking groups. In July, the Australian Signals Directorate disclosed ongoing collaboration with international partners to track SCATTERED SPIDER, citing the risk the group presents to public and private sector organisations.

Law enforcement action

Security experts have welcomed the recent arrests as a significant blow to SCATTERED SPIDER, but caution that further vigilance will be necessary. Adam Meyers, CrowdStrike's Head of Counter Adversary Operations, commented on the law enforcement response:

"The arrests of SCATTERED SPIDER members in the UK represent a significant blow to one of the most disruptive eCrime groups operating today. Since emerging in 2022, SCATTERED SPIDER has conducted increasingly aggressive ransomware and extortion campaigns across a number of verticals. This coordinated law enforcement action will likely degrade SCATTERED SPIDER's operations in the near term. More importantly, it sends a message: cybercriminals who aggressively extort and disrupt are not beyond reach. But this isn't just about arrests - it demonstrates the impact of strong public-private collaboration - when law enforcement and industry share intelligence and act decisively, we can disrupt operations that are inflicting real damage on global businesses."

In the United States, a juvenile was recently arrested in Las Vegas on identity theft, extortion, and computer intrusion charges, also linked to attacks attributed to SCATTERED SPIDER. US authorities reported that one UK suspect, Thalha Jubair, faces charges connected to over 120 cyberattacks with ransom payments exceeding USD $115 million.

Ongoing threat

Despite the arrests, cyber experts have warned that the structure of SCATTERED SPIDER allows its operations to persist. Adrian Culley, Senior Sales Engineer at SafeBreach, highlighted the group's unconventional nature and the continuing threat posed to organisations:

"We will continue to learn a lot more about the members of Scattered Spider, as additional members are apprehended and their court cases progress. However, we can't expect to be done with this threat just yet. Despite the arrests of a number of the group's members, their operations have remained largely unhindered. This is due in large part to their less-than-traditional organisational structure as a disparate group of individuals who coordinate attacks on underground forums and chat apps, which has allowed them to carry on with their activities even when specific members are taken out of commission."

Culley further noted that the group's skill in social engineering presents particular challenges, as their use of legitimate credentials and tools can evade traditional endpoint security measures. Their reliance on ransomware-as-a-service and malware-as-a-service also contributes to the scale and frequency of their attacks.

Culley recommended organisations remain vigilant with identity and access management, adopt phishing-resistant multi-factor authentication mechanisms, implement help desk hardening, enforce strict verification procedures, and provide continuous staff training that addresses social engineering risks. He also advised companies to regularly simulate attacks against their networks using exposure validation solutions to proactively identify and address vulnerabilities.

Quantum threat on the horizon

The evolving nature of cyber threats is mirrored by developments in technology. As quantum computing advances, concerns are growing around its potential to undermine traditional cyber defences. Curtis Simpson, Chief Information Security Officer and Chief Advocacy Officer at Armis, outlined the risks and emphasised the need for Australian organisations to prepare for the impact of quantum computing on cybersecurity.

Simpson warned that once quantum computers become capable of breaking existing encryption methods, adversaries could quickly access sensitive data, compromise critical infrastructure, and disrupt national security.

"Australian organisations, as with organisations in other regions, remain crucially unprepared for quantum computing cyber risks," said Simpson. He cited research from ISACA that found high levels of concern among respondents in Australia and New Zealand, yet only five per cent of organisations considered quantum-related cyber threats a high priority.

Simpson advised Australian businesses to take proactive measures, including building an inventory of their encryption assets, planning for the transition to post-quantum cryptography (PQC), retiring legacy technologies, and investing in automation where possible. He noted that the Australian Signals Directorate has issued guidance on PQC planning, and the National Institute of Standards and Technology has begun releasing draft standards to support the transition.

Industry response

Experts agree that strong public-private partnerships are key to limiting the impact of cybercrime. The recent arrests and industry commentary reflect a coordinated approach to cyber risk management, incorporating incident response, intelligence sharing, and forward-looking preparations for new technological threats.

Security specialists advise that organisations review their cyber defences with consideration for both present and emerging risks, prioritising proactive security measures and ongoing education for their teams as tactics and technologies continue to evolve.

Follow us on:
Follow us on LinkedIn Follow us on X
Share on:
Share on LinkedIn Share on X