United States Courts (Federal Court Network)

United States Courts (Federal Court Network)

The **Scattered Spider** cybercriminal group, led by **Thalha Jubair (19)**, breached the **U.S. Federal Court Network** in January 2024 via a **helpdesk password reset attack**. After gaining access, the group **compromised multiple accounts**, including those of a **federal judge**, and **stole sensitive personnel data**—names, usernames, phone numbers, titles, and work locations of thousands of court employees. They also **searched for subpoenas** related to their group and **attempted unauthorized access to another magistrate judge’s account**. Additionally, they **used a compromised account to request emergency disclosure of customer financial data** from a third-party provider. The breach exposed **highly sensitive judicial and administrative records**, risking **operational disruption, reputational damage, and potential misuse of stolen identities**. The attack was part of a broader campaign where Scattered Spider **extorted over $115 million** from victims, employing **ransomware and data theft** tactics. The breach **threatened the integrity of federal judicial operations**, with implications for national security given the **targeting of judges and court systems**.

Source: https://therecord.media/scattered-spider-unsealed-charges-115million-extortion-breached-courts-system

TPRM report: https://www.rankiteo.com/company/administrative-office-of-the-united-states-courts

"id": "adm4102141092025",
"linkid": "administrative-office-of-the-united-states-courts",
"type": "Cyber Attack",
"date": "1/2024",
"severity": "100",
"impact": "5",
"explanation": "Attack threatening the organization's existence"
{'affected_entities': [{'customers_affected': 'Thousands (court personnel and '
                                              'users)',
                        'industry': 'Judicial/Legal',
                        'location': 'United States',
                        'name': 'United States Courts',
                        'type': 'Federal Government'},
                       {'industry': 'Transportation',
                        'location': 'United Kingdom',
                        'name': 'Transport for London',
                        'type': 'Government Agency'},
                       {'industry': ['Insurance',
                                     'Retail',
                                     'Aviation',
                                     'Others'],
                        'location': 'United States',
                        'name': '47 Unnamed U.S. Entities',
                        'type': ['Private Companies',
                                 'Critical Infrastructure']},
                       {'name': 'Seven Victim Companies (from complaint)'}],
 'attack_vector': ['Helpdesk Impersonation (Password Reset)',
                   'Credential Theft',
                   'Administrative Account Takeover',
                   'Data Exfiltration',
                   'System Encryption'],
 'data_breach': {'data_encryption': 'Yes (used in ransomware attacks)',
                 'data_exfiltration': 'Yes (downloaded from U.S. Courts '
                                      'network)',
                 'file_types_exposed': ['Personnel databases',
                                        'Email inboxes (including federal '
                                        'judges)',
                                        'Subpoena documents'],
                 'number_of_records_exposed': 'Thousands (exact number '
                                              'unspecified)',
                 'personally_identifiable_information': ['Names',
                                                         'Usernames',
                                                         'Telephone numbers',
                                                         'Titles',
                                                         'Work locations'],
                 'sensitivity_of_data': 'High (includes PII of federal '
                                        'employees and judicial records)',
                 'type_of_data_compromised': ['Personally Identifiable '
                                              'Information (PII)',
                                              'Employment Records',
                                              'Judicial Subpoenas',
                                              'Customer Account Information']},
 'date_publicly_disclosed': '2024-07-18',
 'description': 'A Justice Department complaint revealed that the Scattered '
                'Spider cybercriminal group, including U.K. national Thalha '
                'Jubair (19), conducted at least 120 cyberattacks over three '
                'years, extorting at least $115 million from victims, '
                'including 47 U.S. entities. The group breached the U.S. '
                'federal court network via helpdesk social engineering, '
                'stealing personnel data and searching for subpoenas. Jubair '
                'was arrested in London and faces U.S. charges for '
                'conspiracies involving computer fraud, wire fraud, and money '
                "laundering. The group's tactics included calling help desks "
                'to reset passwords, taking over administrative accounts, and '
                'encrypting systems after data theft. Evidence tied Jubair to '
                'servers, cryptocurrency wallets (including $36M seized), '
                'Telegram accounts, and gaming/food delivery purchases. The '
                'group also targeted Transport for London and industries like '
                'insurance, retail, and aviation.',
 'impact': {'brand_reputation_impact': ['High (targeting of federal systems '
                                        'and critical infrastructure)',
                                        'Public association with Scattered '
                                        "Spider's high-profile attacks"],
            'data_compromised': ['Personnel data (names, usernames, telephone '
                                 'numbers)',
                                 'Federal judge subpoenas',
                                 'Thousands of names, titles, and work '
                                 'locations of U.S. Courts users',
                                 'Customer account information (requested via '
                                 'financial services provider)'],
            'financial_loss': '$115 million (ransom payments)',
            'identity_theft_risk': ['High (PII of court personnel and users '
                                    'exposed)'],
            'legal_liabilities': ['Potential lawsuits from affected entities',
                                  'Regulatory scrutiny for U.S. Courts and '
                                  'victim companies'],
            'operational_impact': ['Widespread disruption to U.S. businesses',
                                   'Disruption to critical infrastructure',
                                   'Federal court system compromise',
                                   'Emergency disclosure requests to financial '
                                   'services providers'],
            'payment_information_risk': ['Moderate (customer account '
                                         'information requested via financial '
                                         'services provider)'],
            'systems_affected': ['U.S. Federal Court Network',
                                 'Seven victim companies (unnamed)',
                                 'Transport for London (2023)',
                                 '47 U.S. entities',
                                 'Companies in insurance, retail, and aviation '
                                 'industries']},
 'initial_access_broker': {'backdoors_established': 'Yes (compromised '
                                                    'administrative accounts)',
                           'entry_point': 'Helpdesk password reset requests',
                           'high_value_targets': ['Federal court personnel '
                                                  'data',
                                                  'Subpoenas',
                                                  'Financial services customer '
                                                  'data'],
                           'reconnaissance_period': 'Ongoing since at least '
                                                    'May 2022'},
 'investigation_status': 'Ongoing (Jubair arrested; extradition efforts '
                         'pending; additional co-conspirators under '
                         'investigation)',
 'lessons_learned': ['Helpdesk authentication processes are critical targets '
                     'for social engineering attacks.',
                     'Multi-factor authentication (MFA) is essential for '
                     'administrative accounts.',
                     'Cryptocurrency transactions can be traced to identify '
                     'threat actors.',
                     'Telegram and gaming platforms can serve as evidence '
                     'sources in investigations.',
                     'Collaboration between international law enforcement '
                     'agencies is vital for disrupting cybercriminal '
                     'networks.'],
 'motivation': ['Financial Gain',
                'Data Theft for Extortion',
                'Disruption of Critical Infrastructure'],
 'post_incident_analysis': {'corrective_actions': ['DOJ/FBI disruption of '
                                                   'Scattered Spider '
                                                   'operations (server '
                                                   'seizures, arrests)',
                                                   'Heightened scrutiny of '
                                                   'helpdesk processes in '
                                                   'federal agencies',
                                                   'International law '
                                                   'enforcement collaboration '
                                                   'to track cryptocurrency '
                                                   'and threat actors'],
                            'root_causes': ['Inadequate authentication for '
                                            'helpdesk password resets',
                                            'Lack of MFA for administrative '
                                            'accounts',
                                            'Insufficient monitoring of '
                                            'privileged account activity',
                                            'Human error (falling for social '
                                            'engineering)']},
 'ransomware': {'data_encryption': 'Yes (critical systems encrypted after data '
                                   'theft)',
                'data_exfiltration': 'Yes (double extortion tactic)',
                'ransom_demanded': ['$25 million (one victim)',
                                    '$36.2 million (another victim)',
                                    'Total: $115 million across all victims'],
                'ransom_paid': '$115 million (total across all victims)'},
 'recommendations': ['Implement stricter identity verification for helpdesk '
                     'password resets (e.g., MFA, challenge questions).',
                     'Monitor administrative accounts for unusual activity '
                     '(e.g., sudden data access or exfiltration).',
                     'Segment networks to limit lateral movement by attackers.',
                     'Train employees on recognizing social engineering '
                     'tactics, especially for helpdesk staff.',
                     'Enhance logging and monitoring of critical systems to '
                     'detect unauthorized access.',
                     'Coordinate with law enforcement proactively to share '
                     'threat intelligence.',
                     'Conduct regular audits of third-party vendors and '
                     'service providers for security vulnerabilities.'],
 'references': [{'date_accessed': '2024-07-18',
                 'source': 'U.S. Department of Justice'},
                {'date_accessed': '2024-07-18',
                 'source': 'FBI Statement (Brett Leatherman)'},
                {'date_accessed': '2024-07-18',
                 'source': 'Westminster Magistrates Court Records (Thalha '
                           'Jubair and Owen Flowers)'}],
 'regulatory_compliance': {'legal_actions': ['U.S. charges against Thalha '
                                             'Jubair (computer fraud, wire '
                                             'fraud, money laundering)',
                                             'Potential extradition from U.K.',
                                             'Up to 95 years in prison if '
                                             'convicted'],
                           'regulatory_notifications': ['DOJ complaint filing',
                                                        'FBI statements',
                                                        'International law '
                                                        'enforcement '
                                                        'coordination']},
 'response': {'communication_strategy': ['DOJ complaint unsealing',
                                         'Public statements by FBI/DOJ '
                                         'officials',
                                         'Media coverage of arrests'],
              'containment_measures': ['Seizure of servers and cryptocurrency '
                                       'wallets ($36M)',
                                       "Shutdown of Scattered Spider's "
                                       'Telegram channel'],
              'incident_response_plan_activated': 'Yes (FBI, DOJ, and '
                                                  'international law '
                                                  'enforcement)',
              'law_enforcement_notified': 'Yes (FBI, DOJ, U.K. authorities)',
              'third_party_assistance': ['U.K. National Crime Agency',
                                         'West Midlands Police',
                                         'City of London Police',
                                         'Agencies in Canada, Romania, '
                                         'Australia, and the Netherlands']},
 'stakeholder_advisories': ['DOJ and FBI warnings about Scattered Spider '
                            'tactics',
                            'Advisories to critical infrastructure sectors'],
 'threat_actor': ['Scattered Spider',
                  'Thalha Jubair (19, U.K. national)',
                  'Owen Flowers (18, U.K. national)',
                  'Unnamed U.S.-based co-conspirator'],
 'title': 'Scattered Spider Cybercriminal Operation Extorts $115M, Breaches '
          'U.S. Federal Court Network',
 'type': ['Cyber Extortion',
          'Data Breach',
          'Ransomware',
          'Social Engineering',
          'Unauthorized Access'],
 'vulnerability_exploited': ['Weak Helpdesk Authentication',
                             'Lack of Multi-Factor Authentication (MFA)',
                             'Human Error (Social Engineering)']}
Great! Next, complete checkout for full access to Rankiteo Blog.
Welcome back! You've successfully signed in.
You've successfully subscribed to Rankiteo Blog.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info has been updated.
Your billing was not updated.