Skip to main content
Mallory

US Charges Alleged Scattered Spider Member Arrested in Finland

enforcement-actioncybercrime-service-ecosystemvoice-social-engineeringcredential-access-methoddata-exfiltration-method
Updated April 30, 2026 at 09:01 PM3 sources
Share:
US Charges Alleged Scattered Spider Member Arrested in Finland

Get Ahead of Threats Like This

Know if you're exposed. Before adversaries strike.

U.S. prosecutors have charged 19-year-old dual U.S.-Estonian citizen Peter Stokes, allegedly a member of the Scattered Spider cybercrime group who used the alias Bouquet, after his arrest in Finland on April 10. According to reports citing court records, Stokes was detained while allegedly attempting to board a flight to Tokyo and now faces wire fraud, conspiracy, and computer intrusion charges in a sealed six-count complaint, with U.S. authorities seeking his extradition to Chicago. Investigators allege he took part in at least four intrusions, including a 2023 breach of an online communications platform and other attacks carried out while he was still a teenager.

The complaint links Stokes to Scattered Spider operations that relied on help-desk social engineering, credential resets, MFA fatigue, and SMS phishing to gain access to major corporate environments. One 2025 intrusion described in the filings allegedly targeted a multibillion-dollar luxury retailer, where attackers obtained administrator access, claimed to have stolen 100 GB of data, and issued an $8 million extortion demand, causing more than $2 million in losses. The case adds to broader law-enforcement pressure on the financially motivated group, also tracked as Octo Tempest, which has been tied to intrusions affecting MGM Resorts, Caesars, Twilio, Reddit, Riot Games, Mailchimp, DoorDash, Harrods, Marks & Spencer, WestJet, and Jaguar Land Rover.

Timeline

  1. Apr 28, 2026

    Alleged Scattered Spider leader Tyler Buchanan pleads guilty in U.S.

    The reporting notes that Tyler Robert Buchanan, described as an alleged Scattered Spider leader, recently pleaded guilty in the United States to wire fraud and aggravated identity theft charges.

  2. Apr 28, 2026

    U.S. prosecutors charge arrested suspect and seek extradition

    Following the Finland arrest, U.S. prosecutors charged Stokes in connection with alleged Scattered Spider intrusions and moved to extradite him to Chicago on wire fraud, conspiracy, and computer intrusion counts.

  3. Apr 10, 2026

    Finnish authorities arrest alleged Scattered Spider member Peter Stokes

    Peter Stokes, a 19-year-old dual U.S.-Estonian citizen, was arrested in Finland on April 10, 2026, reportedly while attempting to board a flight to Tokyo.

  4. Dec 1, 2025

    U.S. files sealed criminal complaint against Peter Stokes

    A sealed six-count U.S. complaint was filed in December charging Peter Stokes with wire fraud, conspiracy, and computer intrusion offenses tied to alleged Scattered Spider activity.

  5. Jan 1, 2025

    Luxury retailer breached and hit with $8 million extortion demand

    In 2025, investigators say Stokes helped compromise an unnamed multibillion-dollar luxury retailer by socially engineering the help desk to reset credentials, gaining administrator access. The attackers allegedly claimed to have stolen 100 GB of data and demanded $8 million, with the victim suffering more than $2 million in losses.

  6. Mar 1, 2023

    Alleged 'Bouquet' participates in a communications platform breach

    Court records allege the suspect later identified as Peter Stokes, using the alias "Bouquet," took part in a March 2023 intrusion against an online communications platform while he was 16.

  7. Jan 1, 2022

    Scattered Spider emerges as a social-engineering-focused cybercrime group

    The financially motivated group known as Scattered Spider, also tracked as Octo Tempest, became active in 2022 and began targeting major companies using tactics such as help-desk impersonation, MFA fatigue, and SMS phishing.

See the full picture in Mallory

Mallory subscribers get deeper analysis on every story, including:

Impact Assessment

Who’s affected and how

Technical Details

Deep-dive technical analysis

Response Recommendations

Actionable next steps for your team

Indicators of Compromise

IPs, domains, hashes, and more

AI Threads

Ask questions and take action on every story

Advanced Filters

Filter by topic, classification, timeframe

Scheduled Alerts

Get matching stories delivered automatically

Related Stories

Scattered Spider Member Pleads Guilty in $8 Million SMS Phishing and Crypto Theft Scheme

Scattered Spider Member Pleads Guilty in $8 Million SMS Phishing and Crypto Theft Scheme

Tyler Robert Buchanan, a 24-year-old British national from Dundee, Scotland, pleaded guilty in U.S. federal court in California to **conspiracy to commit wire fraud** and **aggravated identity theft** for his role in Scattered Spider’s large-scale social-engineering operation. Prosecutors said Buchanan and co-conspirators ran SMS phishing campaigns from September 2021 to April 2023 that impersonated corporate IT help desks and labor providers, used fake login pages and stolen credentials, and carried out SIM swapping to breach companies and individuals. The Justice Department said the scheme stole at least **$8 million in virtual currency** from U.S. victims across telecommunications, technology, cloud communications, outsourcing, gaming, and cryptocurrency sectors. Investigators tied Buchanan to the 2022 **0ktapus** campaign, which used fake Okta login pages to compromise more than 130 organizations, including **Twilio** and **Cloudflare**, and enabled downstream attacks affecting other major brands. Authorities said stolen credentials were funneled into a Telegram channel administered by Buchanan and an associate, and searches of his residence in Scotland uncovered victim company files, personal data, and roughly 20 devices. Buchanan was arrested in Palma de Mallorca by Spanish authorities, extradited to the United States, and has been in federal custody since April 2025; he now faces up to 22 years in prison, underscoring continued law-enforcement pressure on the loosely organized Scattered Spider group, an offshoot of **The Com**.

1 weeks ago
Scattered Spider-Linked Teenagers Plead Not Guilty to Transport for London Cyberattack

Scattered Spider-Linked Teenagers Plead Not Guilty to Transport for London Cyberattack

Two British teenagers, Thalha Jubair and Owen Flowers, have pleaded not guilty to charges stemming from a cyberattack on Transport for London (TfL) in August 2024. The attack, attributed to the Scattered Spider hacking collective, caused significant disruption to TfL's online services and internal systems, impacting the agency's ability to process refunds and initially believed not to have compromised customer data. However, a later update from TfL confirmed that customer information, including names, addresses, and contact details, was exposed during the breach. Both suspects were arrested by the UK National Crime Agency and City of London Police, and the charges they face are among the most severe under English law for cyber offenses, carrying a maximum sentence of life imprisonment. In addition to the TfL incident, Owen Flowers faces further charges for allegedly conspiring to attack the networks of SSM Health Care Corporation and Sutter Health in the United States, while Thalha Jubair is also charged with refusing to provide device passcodes to investigators. The U.S. Department of Justice has unsealed a complaint against Jubair for related computer crimes. The case highlights the international scope of the investigation and the serious legal consequences for those accused of high-impact cyberattacks targeting critical infrastructure and healthcare organizations.

1 months ago
Cordial Spider and Snarky Spider hit U.S. sectors with identity-driven extortion

Cordial Spider and Snarky Spider hit U.S. sectors with identity-driven extortion

CrowdStrike says two financially motivated threat groups tied to **The Com** — **Cordial Spider** and **Snarky Spider** — are conducting rapid data-theft and extortion campaigns against U.S.-based organizations across critical infrastructure and commercial sectors, including aviation, retail, hospitality, automotive, financial services, legal, academic, and technology. The actors are described as closely aligned with **Scattered Spider** and linked to other The Com subsets such as **SLSH** and **ShinyHunters**, with operations observed since at least October 2025 and ransom demands in some cases reaching seven figures. The groups rely on voice phishing, text messages, emails, and other social-engineering tactics to compromise identity platforms and move through victims’ SaaS environments. Researchers said the attackers use phishing pages that mimic legitimate single sign-on and identity provider portals to steal credentials, session keys, and tokens, then register their own MFA devices, disable MFA, suppress or delete alerts, and expand access across connected services. CrowdStrike also identified differences in the crews’ tradecraft, including operating hours, phishing infrastructure, leak sites, preferred operating systems, and MFA-registration methods, while noting their use of residential proxy services such as **Mullvad**, **Oxylabs**, **NetNut**, **9Proxy**, **Infatica**, and **NSOCKS** to evade detection; some victims were additionally subjected to **DDoS attacks** or **swatting**.

Yesterday

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed. Before adversaries strike.

US Charges Alleged Scattered Spider Member Arrested in Finland | Mallory