Cyber Intelligence

Linkedin
  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map
Reading: Teenage hackers run rings around cyber-defenses
Share
Cyber IntelligenceCyber Intelligence
Aa
  • News
  • Analysis
  • Expert Opinions
  • Resources
Search
  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map

Cyber Intelligence

Linkedin
  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map
Reading: Teenage hackers run rings around cyber-defenses
Share
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
cybercrimeNewsransomwareRussia

Teenage hackers run rings around cyber-defenses

Tony Glover
June 10, 2025 at 12:25 PM
By Tony Glover Tony Glover
Share
SHARE

The recent UK retail cyberattacks that impacted Marks & Spencer and the Co-Op supermarket chain are only the tip of a very large iceberg that now threatens organizations on both sides of the Atlantic.

Although media reports have attributed the attacks to a group named “Scattered Spider,” the actual threat is far bigger. For a start, there is no criminal group that actually calls itself “Scattered Spider”, which is just a made-up name attributed by cybersecurity researchers. These attacks and many others in the US and the UK are now known to be the work of a vast sprawling network of hackers, some as young as 14, spread across the US and the UK. They call themselves “the Community”, or “the Com” for short, and are essentially a vast teenage subculture of criminal hackers.

The widespread availability of Ransomware-as-a-Service malware (RaaS) supplied by groups such as BlackCat working out of Russia enables even youngsters with limited computer skills to deploy highly sophisticated malware with ease. If they are having difficulties using the software, the cybercriminal gangs supplying it have 24-hour help desks who are eager to come to their assistance.

The real skillset possessed by American and British teenagers is that they speak English and are familiar with Western culture. This enables them to convincingly target individual employees within an organization, pretending to be from the in-house helpdesk. This type of scam is known as “social engineering”. The young hackers generally explain that the staff member’s computer has been compromised and that the passwords and entry codes need to be reset. Even the most gullible employee would likely become suspicious of a caller with a heavy Russian accent or poor English grammar. But a friendly young American or English voice sounding as if it could easily come from a member of the company’s IT helpdesk arouses far less suspicion.

Despite the simplicity of this type of cyber-attack, it has already proven to be remarkably effective. In addition to the UK retail sector attacks, members of the Com are known to have hacked into companies including MGM, Microsoft, Nvidia, and Electronic Arts. The attack on MGM casinos in September 2023 evidences how devastating a simple “social engineering” hack can be. The hacker used LinkedIn information to impersonate an employee and reset the targeted staff member’s credentials to hack into the system. After MGM refused to pay a $30 million ransom, the attack eventually resulted in a 36-hour outage, bringing gaming tables, slot machines, and even the lifts to a standstill. The attack is estimated to have cost MGM $100 million, plus a class-action lawsuit that was eventually settled for $45 million.

Law enforcement is powerless

While law enforcement agencies are working around the clock to bring the teenage hackers to justice, they are unable to stem the vast tide of youngsters hoping to gain cash and notoriety among their peers by executing increasingly audacious cyberattacks.

Over the past couple of years, some members of the Com have been convicted. For example, six Scattered Spider members were arrested in late 2024. But given that the Com is already believed to have thousands of members and their numbers are growing, the chances of any single hacker being caught are so slim that these sporadic arrests do little to deter the majority of what is a rapidly-growing subculture of very young, mostly male, criminals working from their bedrooms.

And while cybersecurity advisers recommend defense strategies such as “Zero Trust” and urge companies to educate staff as to the dangers of unsolicited calls, there is no easy fix for this growing and pernicious threat. The only workable defense would be to incur extra costs by adopting a policy whereby the organization’s helpdesk staff only make personal appearances and to tell employees to ignore any phone calls purporting to come from them.

TAGGED: blackcat, cybercrime, Cybersecurity, electronic arts, hackers, mgm, Microsoft, nvidia, raas, Ransomware, russia, scattered spider, teen hackers, the community, zero-trust
Tony Glover June 17, 2025 June 10, 2025
Share This Article
Twitter LinkedIn Email Copy Link Print
Previous Article Trump Doubles Down on Cybersecurity Sanctions – June 9th
Next Article Honeywell kicks off AI tools to accelerate industrial autonomy – June 10th
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Editor's Pick

You Might Also Like

Newsransomware

Ransomware group offers cyber gangs legal advice

A new cybercriminal group, Qilin, is rapidly establishing dominance in the murky world of ransomware by providing not just ransomware-as-a-service (RaaS) but a full soup-to-nuts cybercrime service .In addition to the malware, Qilin also provides a full suite of legal guidance for criminals together with operational and storage features. According cybersecurity company, Cybereason, Qilin is positioning itself not just as a ransomware group, but as a full cybercrime service.

June 20, 2025
NewsOne Minute RoundupOne Minute Roundup

Japan Pushes Proactive Cyber Laws – June 17th

Japan Prime Minister Shigeru Ishiba implements a new cybersecurity defense law ahead of national elections to take proactive measures against cyber threats. The legislation allows the government to monitor online communications and requires private companies to report cyberattacks. 

June 17, 2025
AINews

Criminal use of AI enters new and dangerous phase

Cybercriminals have just added what may be the most dangerous weapon yet to their arsenal of illegal software, a Dark Web version of legitimate artificial intelligence (AI) platforms. Tel Aviv-based network security company, Cato Networks, has uncovered an emerging criminal platform called Nytheon AI that it says is “a fully-fledged illicit AI platform”. While there have been other attempts to offer criminal versions of popular AI models, Nytheon AI is the first truly comprehensive multilingual offering. Threat actors can now use the platform to conduct a variety of attacks including tailored spear-phishing campaigns, deepfake documents, and polymorphic malware capable of constantly mutating its appearance.

June 17, 2025
NewsOne Minute RoundupOne Minute Roundup

EU Launches Free Railway Cybersecurity Courses – June 16th

The International Union of Railways is launching cybersecurity courses specifically for the transport industry. Developed by industry specialists, the CYRUS training program aims to address the growing need for cybersecurity awareness in the industry, particularly among non-technical staff.

June 16, 2025

Cyber Intelligence

We provide in-depth analysis, breaking news, and interviews with some of the leading minds in cybersecurity and distill critical insights that matter to our readers. Daily.

Linkedin

Category

  • Cybercrime
  • News

Quick Links

  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map

© 2023 Cyberintel.media

Welcome Back!

Sign in to your account

Lost your password?