Skip to main content
Mallory

Scattered Spider Member Pleads Guilty in $8 Million SMS Phishing and Crypto Theft Scheme

enforcement-actionphishing-campaign-intelligencevoice-social-engineeringcredential-access-methodcryptocurrency-platform-risk
Updated April 24, 2026 at 08:01 PM19 sources
Share:
Scattered Spider Member Pleads Guilty in $8 Million SMS Phishing and Crypto Theft Scheme

Get Ahead of Threats Like This

Know if you're exposed. Before adversaries strike.

Tyler Robert Buchanan, a 24-year-old British national from Dundee, Scotland, pleaded guilty in U.S. federal court in California to conspiracy to commit wire fraud and aggravated identity theft for his role in Scattered Spider’s large-scale social-engineering operation. Prosecutors said Buchanan and co-conspirators ran SMS phishing campaigns from September 2021 to April 2023 that impersonated corporate IT help desks and labor providers, used fake login pages and stolen credentials, and carried out SIM swapping to breach companies and individuals. The Justice Department said the scheme stole at least $8 million in virtual currency from U.S. victims across telecommunications, technology, cloud communications, outsourcing, gaming, and cryptocurrency sectors.

Investigators tied Buchanan to the 2022 0ktapus campaign, which used fake Okta login pages to compromise more than 130 organizations, including Twilio and Cloudflare, and enabled downstream attacks affecting other major brands. Authorities said stolen credentials were funneled into a Telegram channel administered by Buchanan and an associate, and searches of his residence in Scotland uncovered victim company files, personal data, and roughly 20 devices. Buchanan was arrested in Palma de Mallorca by Spanish authorities, extradited to the United States, and has been in federal custody since April 2025; he now faces up to 22 years in prison, underscoring continued law-enforcement pressure on the loosely organized Scattered Spider group, an offshoot of The Com.

Timeline

  1. Apr 17, 2026

    DOJ announces guilty plea and August sentencing date

    The U.S. Department of Justice publicly announced Buchanan's guilty plea and said sentencing was scheduled for August 21. Prosecutors stated he faces up to 22 years in prison.

  2. Apr 17, 2026

    Buchanan pleads guilty in U.S. federal court

    On April 17, 2026, Buchanan pleaded guilty in U.S. federal court in California to conspiracy to commit wire fraud and aggravated identity theft. He admitted participating in SMS phishing operations that impersonated corporate IT help desks or labor providers and were linked to at least $8 million in stolen cryptocurrency.

  3. Apr 1, 2025

    Buchanan is extradited from Spain and enters U.S. federal custody

    By April 2025, Buchanan had been extradited from Spain to the United States and was in federal custody. U.S. authorities pursued charges tied to conspiracy, identity theft, phishing, and cryptocurrency theft.

  4. Nov 1, 2024

    U.S. unseals charges against Buchanan and four alleged associates

    In November 2024, U.S. authorities unsealed charges against Tyler Buchanan and four other alleged members tied to the Scattered Spider-linked phishing and cryptocurrency theft scheme. The case expanded the public legal action beyond Buchanan alone.

  5. Jun 15, 2024

    Spanish authorities arrest Tyler Buchanan in Palma de Mallorca

    Spanish authorities arrested Buchanan in Palma de Mallorca while he was allegedly attempting to board a flight to Italy. Reporting in June 2024 identified him as a suspected leading member of the Scattered Spider cybercrime group.

  6. May 25, 2024

    U.S. criminal complaint against Buchanan is filed

    A U.S. criminal complaint in the Central District of California was filed against Buchanan in connection with the Scattered Spider-linked phishing and cryptocurrency theft scheme. The referenced complaint document is dated May 25, 2024.

  7. Jan 1, 2023

    Police Scotland seizes devices from Buchanan's residence

    In 2023, Police Scotland seized about 20 devices from Buchanan's residence in Scotland. Investigators said the devices contained files related to numerous victim companies and data on individual victims.

  8. Jan 1, 2022

    Fake Okta phishing campaign compromises 130+ organizations

    In 2022, Buchanan was tied by the FBI to a phishing campaign using fake Okta login pages, widely associated with Scattered Spider and 0ktapus. The operation compromised more than 130 organizations, including Twilio and Cloudflare, and enabled downstream attacks on other victims.

  9. Sep 1, 2021

    Scattered Spider phishing and crypto theft scheme begins

    From September 2021, Tyler Buchanan and co-conspirators began a large-scale SMS phishing, credential theft, and SIM-swapping campaign targeting companies and individuals. Prosecutors said the scheme ultimately stole at least $8 million in cryptocurrency from U.S. victims.

See the full picture in Mallory

Mallory subscribers get deeper analysis on every story, including:

Impact Assessment

Who’s affected and how

Technical Details

Deep-dive technical analysis

Response Recommendations

Actionable next steps for your team

Indicators of Compromise

IPs, domains, hashes, and more

AI Threads

Ask questions and take action on every story

Advanced Filters

Filter by topic, classification, timeframe

Scheduled Alerts

Get matching stories delivered automatically

Sources

ismg-cdn.nyc3.cdn.digitaloceanspaces.com
ismg-cdn.nyc3.cdn.digitaloceanspaces.com
ismg-cdn.nyc3.cdn.digitaloceanspaces.com
ismg-cdn.nyc3.cdn.digitaloceanspaces.com
ismg-cdn.nyc3.cdn.digitaloceanspaces.com
ismg-cdn.nyc3.cdn.digitaloceanspaces.com

5 more from sources like cyberscoop, cyber security news, help net security, krebs on security and security affairs

Related Stories

US Charges Alleged Scattered Spider Member Arrested in Finland

US Charges Alleged Scattered Spider Member Arrested in Finland

U.S. prosecutors have charged 19-year-old dual U.S.-Estonian citizen Peter Stokes, allegedly a member of the **Scattered Spider** cybercrime group who used the alias `Bouquet`, after his arrest in Finland on April 10. According to reports citing court records, Stokes was detained while allegedly attempting to board a flight to Tokyo and now faces wire fraud, conspiracy, and computer intrusion charges in a sealed six-count complaint, with U.S. authorities seeking his extradition to Chicago. Investigators allege he took part in at least four intrusions, including a 2023 breach of an online communications platform and other attacks carried out while he was still a teenager. The complaint links Stokes to Scattered Spider operations that relied on help-desk social engineering, credential resets, MFA fatigue, and SMS phishing to gain access to major corporate environments. One 2025 intrusion described in the filings allegedly targeted a multibillion-dollar luxury retailer, where attackers obtained administrator access, claimed to have stolen **100 GB** of data, and issued an **$8 million** extortion demand, causing more than **$2 million** in losses. The case adds to broader law-enforcement pressure on the financially motivated group, also tracked as **Octo Tempest**, which has been tied to intrusions affecting MGM Resorts, Caesars, Twilio, Reddit, Riot Games, Mailchimp, DoorDash, Harrods, Marks & Spencer, WestJet, and Jaguar Land Rover.

2 days ago
California Man Sentenced for Laundering Millions From Social-Engineering Crypto Heists

California Man Sentenced for Laundering Millions From Social-Engineering Crypto Heists

Evan Tangeman, a 22-year-old from Newport Beach, California, was sentenced to 70 months in prison after pleading guilty to a `RICO` conspiracy tied to a cybercriminal network that stole roughly **$230 million to $260 million** in cryptocurrency from victims. Prosecutors said Tangeman laundered at least **$3.5 million** between October 2023 and May 2025 for the group, which allegedly stole more than **4,100 Bitcoin** from a Washington, D.C., victim in August 2024 and used the proceeds to fund luxury homes, private jets, high-end vehicles, private security, and other lavish purchases. Authorities said the organization, identified by law enforcement as the **Social Engineering Enterprise**, targeted wealthy cryptocurrency holders using stolen and dark-web-sourced data, spoofed phone numbers, impersonation of Google and Gemini support staff, and remote-access tools including **AnyDesk** to obtain Bitcoin Core private keys. Investigators alleged the group then obscured the proceeds through mixers, exchanges, peel chains, pass-through wallets, and VPNs, while Tangeman also helped rent properties under false identities and destroy devices after arrests of key members. Another alleged launderer, **Kunal Mehta**, has also pleaded guilty and is awaiting sentencing.

2 days ago
Scattered Spider-Linked Teenagers Plead Not Guilty to Transport for London Cyberattack

Scattered Spider-Linked Teenagers Plead Not Guilty to Transport for London Cyberattack

Two British teenagers, Thalha Jubair and Owen Flowers, have pleaded not guilty to charges stemming from a cyberattack on Transport for London (TfL) in August 2024. The attack, attributed to the Scattered Spider hacking collective, caused significant disruption to TfL's online services and internal systems, impacting the agency's ability to process refunds and initially believed not to have compromised customer data. However, a later update from TfL confirmed that customer information, including names, addresses, and contact details, was exposed during the breach. Both suspects were arrested by the UK National Crime Agency and City of London Police, and the charges they face are among the most severe under English law for cyber offenses, carrying a maximum sentence of life imprisonment. In addition to the TfL incident, Owen Flowers faces further charges for allegedly conspiring to attack the networks of SSM Health Care Corporation and Sutter Health in the United States, while Thalha Jubair is also charged with refusing to provide device passcodes to investigators. The U.S. Department of Justice has unsealed a complaint against Jubair for related computer crimes. The case highlights the international scope of the investigation and the serious legal consequences for those accused of high-impact cyberattacks targeting critical infrastructure and healthcare organizations.

1 months ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed. Before adversaries strike.

Scattered Spider Member Pleads Guilty in $8 Million SMS Phishing and Crypto Theft Scheme | Mallory