Cybersecurity

Inside the Scattered Spider Playbook: A Guide to SMS Phishing and SIM Swapping Attacks

2026-05-01 01:16:24

Overview

Cybercriminal groups like Scattered Spider have mastered the art of social engineering, using SMS phishing and SIM swapping to steal millions from cryptocurrency investors. This guide dissects the real-world attack chain used by a senior member known as "Tylerb" (Tyler Robert Buchanan) to breach major tech firms and loot digital wallets. By understanding each step—from reconnaissance to cash-out—you can better defend against these sophisticated threats. This tutorial is based on the guilty plea of a 24-year-old British national who admitted to wire fraud conspiracy and aggravated identity theft in 2025.

Inside the Scattered Spider Playbook: A Guide to SMS Phishing and SIM Swapping Attacks
Source: krebsonsecurity.com

Prerequisites

Before diving into the attack methodology, ensure you have a basic grasp of these concepts:

No programming experience is required, but familiarity with basic networking and authentication flows will help.

Step-by-Step Anatomy of the Attack

Step 1: Reconnaissance and Target Selection

Scattered Spider first identifies high-value targets—both companies and individual investors. In the 2022 campaign, they focused on technology companies such as Twilio, LastPass, DoorDash, and Mailchimp. Attackers gather employee names, phone numbers, and organizational structures through open-source intelligence (OSINT) and previous data breaches. Buchanan used the username and email address linked to his real identity, a mistake that later helped FBI investigators tie him to the phishing domains.

Step 2: SMS Phishing Campaign

The group launched tens of thousands of SMS-based phishing attacks. These messages often impersonate IT support or security teams, urging recipients to click a link and enter credentials. For example, a typical SMS might read: "Alert: Your account has been locked. Verify immediately at [malicious domain]." Buchanan registered numerous phishing domains using NameCheap, logging in from a UK-based IP address that Scottish authorities confirmed was leased to him throughout 2022.

Example phishing SMS:
From: +1 (415) 555-0199
Message: "Twilio Security: Unauthorized login detected. Reset password now: http://twilio-verify-ok[.]com"

The attackers cloned legitimate login pages to harvest credentials and session tokens. Once a victim entered their details, the attackers instantly captured them.

Step 3: Credential Harvesting and Internal Access

With stolen credentials, Scattered Spider gained initial footholds inside corporate networks. They often impersonated employees contacting help desks to reset Multi-Factor Authentication (MFA) devices or request new access tokens. This social engineering tactic—calling IT support with stolen personal details—allowed them to bypass security controls. The group used the stolen data from these breaches to identify cryptocurrency investors among the employee base or downstream customers.

Step 4: SIM Swapping to Intercept 2FA

After identifying victims, the attackers performed SIM swapping. They tricked mobile carriers into transferring the victim’s phone number to a SIM card in their possession. This allowed them to intercept SMS-based one-time passcodes and password reset links. The U.S. Justice Department noted that Buchanan admitted to stealing at least $8 million in virtual currency from individual victims across the United States. The SIM swap is the critical step that enables emptying cryptocurrency wallets protected only by SMS 2FA.

Inside the Scattered Spider Playbook: A Guide to SMS Phishing and SIM Swapping Attacks
Source: krebsonsecurity.com
  1. Attacker gathers victim’s personal data (from phishing or data breaches).
  2. Attacker contacts the mobile carrier, impersonating the victim, and requests a SIM swap, claiming the phone is lost.
  3. Carrier activates the new SIM, transferring the number.
  4. Attacker now receives all SMS messages, including password reset codes from crypto exchanges.
  5. Attacker resets passwords, logs into the exchange, and transfers funds to their own wallets.

Step 5: Exfiltration and Laundering

The stolen cryptocurrency was moved through multiple wallets and mixers to obscure the trail. Buchanan's involvement was eventually traced when rival cybercriminals hired thugs to invade his home in the UK, assault his mother, and threaten him with a blowtorch to give up his crypto wallet keys—a bizarre twist that drove him to flee the UK in February 2023. He was later detained by Spanish airport authorities and extradited to the U.S.

Common Mistakes

Mistakes Made by Attackers

Mistakes Made by Victims

Summary

The Scattered Spider case illustrates the complete lifecycle of a modern phishing and SIM-swapping attack: reconnaissance, large-scale SMS phishing, credential theft, social engineering to bypass MFA, SIM swapping, and cryptocurrency theft. By learning from Buchanan's mistakes—like using personal identifiable information on domains—and knowing the attacker's playbook, organizations and individuals can implement stronger defenses. Replace SMS-based 2FA with authenticator apps, train teams to recognize phishing attempts, and secure personal data. The 24-year-old now faces over 20 years in prison, a stark reminder that cybercrime has real-world consequences.

Explore

Why Your JavaScript Module Design Shapes Your Entire Application Architecture Why Hydrogen Fuel Cells Are Winning in Combat Drones but Not in Passenger Cars Meta Unveils AI Agent Platform That Automates Hyperscale Efficiency, Recovering Hundreds of Megawatts The Battle for OpenAI's Soul: Inside the Courtroom Clash Between Elon Musk and Sam Altman Crypto Market Digest: Bitcoin Holds Steady at $87K, Altcoins Fluctuate as The White Whale Surges 15x in a Week