logo
blogtopicsabout
logo
blogtopicsabout

Scattered Spider's 'Tylerb' Pleads Guilty, Exposing Social Engineering and SIM Swap Tactics

Tech News
April 21, 2026

TL;DR

  • •Tyler Robert Buchanan, a 24-year-old senior member of the 'Scattered Spider' cybercrime group, has pleaded guilty to wire fraud conspiracy and aggravated identity theft.
  • •Buchanan admitted to launching extensive SMS phishing and social engineering attacks in 2022, leading to breaches at major tech companies including Twilio, LastPass, DoorDash, and Mailchimp.
  • •The stolen data was leveraged for SIM-swapping attacks, enabling the group to steal at least $8 million in cryptocurrency from individual investors, with Buchanan now facing over 20 years in prison.

A significant blow has been dealt to the notorious cybercrime group "Scattered Spider" as senior member Tyler Robert Buchanan, known by his hacker handle "Tylerb," has pleaded guilty to wire fraud conspiracy and aggravated identity theft. The 24-year-old British national, once a prominent figure on criminal hacking leaderboards, is now in U.S. custody, facing a potential sentence of over 20 years.

Buchanan's admission sheds light on the sophisticated social engineering and phishing tactics employed by Scattered Spider, a prolific English-speaking group recognized for its audacious attacks on major corporations and individuals.

The Anatomy of the Attacks

Buchanan confessed to his involvement in a series of text-message phishing campaigns that took place in the summer of 2022. These campaigns were meticulously designed to compromise a dozen major technology companies. Among the high-profile victims were Twilio, LastPass, DoorDash, and Mailchimp.

The group's modus operandi involved:

  • SMS-based Phishing: Sending tens of thousands of deceptive text messages to employees, tricking them into revealing credentials or clicking malicious links.
  • Social Engineering: Impersonating employees or contractors to manipulate IT help desks into granting unauthorized access to corporate networks and systems. This often involved deceiving personnel into resetting passwords or providing multi-factor authentication (MFA) codes.

Once inside, Scattered Spider exploited the stolen data to execute SIM-swapping attacks. This highly effective technique involves transferring a victim's phone number to a device controlled by the attackers. By doing so, they could intercept critical communications like one-time passcodes for authentication and password reset links sent via SMS, effectively bypassing common security measures.

Financial Impact and Identification

Buchanan admitted to stealing at least $8 million in virtual currency directly from individual victims across the United States. This figure is part of the broader "tens of millions of dollars worth of cryptocurrency" the group collectively siphoned from investors.

FBI investigators meticulously pieced together Buchanan's involvement. They discovered that the same username and email address were used to register numerous phishing domains crucial to the 2022 campaign. A breakthrough came when domain registrar NameCheap revealed that the account used for these registrations logged in from a UK Internet address less than a month before the phishing spree began. Scottish police confirmed that this IP address was leased to Buchanan throughout 2022, firmly linking him to the criminal enterprise.

Flight and Capture

Buchanan's criminal activities also attracted unwanted attention from rival cybercrime gangs. In February 2023, he fled the United Kingdom after thugs hired by a competitor invaded his home, assaulted his mother, and threatened him with a blowtorch to extract his cryptocurrency wallet keys. Later that year, UK investigators found a device at his Scotland residence containing data stolen from SMS phishing victims and seed phrases from cryptocurrency theft victims.

His flight ended with his arrest by Spanish authorities, leading to his eventual extradition and guilty plea in the U.S.

A screenshot of two photos of Buchanan that appeared in a Daily Mail story dated May 3, 2025.: image omitted due to site embedding policy; open the original article (Krebs on Security) (opens in a new tab) to view it. Photo/source: Krebs on Security (opens in a new tab).

Why It Matters for Developers and IT Professionals

Buchanan's guilty plea and the details surrounding Scattered Spider's operations offer critical lessons for developers, security architects, and IT operations teams:

The Enduring Threat of Social Engineering

The success of Scattered Spider underscores that even with advanced technical defenses, the 'human element' remains the most vulnerable link. Developers need to think beyond code vulnerabilities and consider how their applications and the data they handle can be exploited through social engineering. Training, awareness, and robust internal protocols are paramount for all employees, not just those in IT.

Mitigating SIM-Swapping Risks

For any application handling sensitive data or financial transactions, reliance on SMS-based two-factor authentication (2FA) is a significant risk. This case highlights the ease with which SIM-swapping can bypass SMS-based MFA. Organizations should push users towards stronger, phishing-resistant MFA methods such as:

  • Hardware Security Keys (e.g., FIDO2/WebAuthn): These offer the strongest protection against phishing and SIM-swapping.
  • Authenticator Apps (e.g., Google Authenticator, Authy): While not entirely impervious to sophisticated social engineering, they are generally more secure than SMS.

Developers should integrate these stronger MFA options into their authentication flows, making them easily accessible and preferably the default for users.

Enhanced Account Recovery and Identity Verification

Companies must review their account recovery processes for both employees and customers. If an IT help desk can be tricked into resetting a password or transferring a phone number, the system is fundamentally insecure. Implement multi-layered identity verification, ideally requiring in-person or video verification for high-risk changes, and always flagging suspicious activity immediately.

Supply Chain and Third-Party Security

Breaches at companies like Twilio (an SMS provider) can have cascading effects, impacting their customers down the line. This emphasizes the critical importance of vetting third-party vendors and understanding their security posture. A compromise at one point in the supply chain can lead to widespread data theft and financial losses.

Proactive Monitoring and Threat Intelligence

FBI investigators traced Buchanan through domain registrations and IP addresses. This highlights the importance of continuous monitoring of network activity, including DNS registrations related to your brand, and leveraging threat intelligence feeds to identify potential phishing campaigns targeting your organization or employees.

The Legal Consequences are Real

The significant prison sentence Buchanan faces serves as a stark reminder to aspiring cybercriminals that law enforcement agencies are increasingly effective at identifying, pursuing, and prosecuting individuals involved in cybercrime, regardless of their location.

Looking Ahead

As the legal process continues for Buchanan, the cybersecurity community must internalize these lessons. The cat-and-mouse game between attackers and defenders continues, but a renewed focus on human-centric security, robust authentication mechanisms, and vigilant monitoring can significantly bolster defenses against groups like Scattered Spider. The emphasis must shift from purely technical solutions to a comprehensive strategy encompassing technology, people, and processes.

Source:

Krebs on Security ↗