What's Hot

    Prices Rise for Travel, Gas, Mortgages After a Month of War, Shutdown | Invesloan.com

    March 29, 2026

    12 Tons of KitKats Vanished in a European Highway Heist | Invesloan.com

    March 29, 2026

    Trump says navy is constructing underground complicated at White House | Invesloan.com

    March 29, 2026
    Facebook Twitter Instagram
    Finance Pro
    Facebook Twitter Instagram
    invesloan.cominvesloan.com
    Subscribe for Alerts
    • Home
    • News
    • Politics
    • Money
    • Personal Finance
    • Business
    • Economy
    • Investing
    • Markets
      • Stocks
      • Futures & Commodities
      • Crypto
      • Forex
    • Technology
    invesloan.cominvesloan.com
    Home » The fantasy of the genius hacker | Invesloan.com
    Business

    The fantasy of the genius hacker | Invesloan.com

    May 11, 2025Updated:May 11, 2025
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Stay informed with free updates

    Simply sign up to the Cyber Security myFT Digest — delivered directly to your inbox.

    The writer is director of the Cambridge Cybercrime Centre and professor of emergent harms at the University of Cambridge

    In the past few weeks you might have heard the name “Scattered Spider” in relation to the ongoing disruption at Marks and Spencer, the Co-op and Harrods. While there has been no public attribution for the cyber attacks on UK retail as yet, there is speculation that the tactics used are similar to a network of loosely affiliated online miscreants that goes by this name. Other reports suggest collaboration with another cyber criminal group, DragonForce, which allegedly provides ransomware as a service.

    Scattered Spider has been linked with breaches at a number of high-profile companies and has infiltrated the collective imagination of cyber security professionals, the media and the government. Yet its symbolic power — amplified by its striking name — far outweighs its technical skill.

    The size of the group’s alleged targets may make it appear as if impressive hacking abilities are required. But reports indicate that it gets into organisations via back doors by convincing unwitting employees to enable access.

    This can be done through social engineering (manipulating people into sharing private information), targeted phishing, taking advantage of multi-factor fatigue and Sim swapping. These tactics are not novel. They involve smooth-talking employees, driving them towards fake websites in order to steal their credentials and taking advantage of poor verification practices. None of these crimes requires highly skilled adversaries.

    In the cyber security industry, however, marketing is everything. Names are chosen to invoke a visceral reaction and to promote fear. That fear helps to turn people towards expensive high-tech security products.

    Scattered Spider is, in fact, not an official group that named itself. Its name was first invoked by the cyber security company CrowdStrike in 2022. You can even buy Scattered Spider figurines, T-shirts, mouse pads, mugs and a skateboard from CrowdStrike’s online shop. (CrowdStrike, you may remember, was the company blamed for millions of computers going offline last summer, disrupting airlines, news media, health services, and emergency call centres due to a botched software update.)

    It’s not just CrowdStrike that comes up with names for groups involved in deviant behaviour. Other security companies jostle to choose the catchiest moniker, which will be splashed on media releases, and ensure their website comes at the top of search results. Scattered Spider has been given many other names, including Starfraud, UNC3944, Scatter Swine, and Muddled Libra.

    There are some exceptions. DragonForce does appear to have named itself, perhaps in an attempt to gain notoriety and ward off a title picked by the marketing department of a security company. 

    The names handed out to cyber criminal gangs don’t just describe their behaviour, they can also shape it. These linguistic choices can inflate a group’s symbolic capital, granting legitimacy to its members, who are often adolescents or young adults seeking peer recognition and prestige. For them, cyber crime may be not only a means to wealth but a rite of passage. Scattered Spider is therefore being amplified by the same industry that is designed to neutralise them. 

    Often, the high-tech services that the cyber security sector sells protect the front door, while offenders continue to sneak in the back one using low-tech methods. 

    In a world where affiliation with hacker groups can be a badge of honour, regardless of country or language, offenders can be driven by reputation and peer recognition. To tackle cyber threats we need better deterrence, as cyber crime offenders usually do not face any consequences for their crimes. Global prosecution rates are extremely low. Many criminals evade investigation altogether as their crimes are relatively low in value, despite being high in volume.

    Effective cross-border collaboration is essential for addressing all but the most mundane cyber crimes, and police need to be trained to deal with this. We need a responsive ecosystem that can act at the early stages of security breaches. 

    If we are to protect ourselves from the onslaught of cyber crime, we require both increased prosecution and a mature computer security industry that introduces neither vulnerabilities nor provocative names.

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

    Keep Reading

    Does personal credit score have a credit score high quality drawback? | Invesloan.com

    Iran battle lifts K-defence firm providing low-cost Patriot rival | Invesloan.com

    Subscribe to learn | Invesloan.com

    Subscribe to learn | Invesloan.com

    Pandemic oil merchants are the GOATs | Invesloan.com

    Subscribe to learn | Invesloan.com

    Subscribe to learn | Invesloan.com

    Subscribe to learn | Invesloan.com

    India cuts telecom spectrum costs as operator curiosity dries up | Invesloan.com

    LATEST NEWS

    Prices Rise for Travel, Gas, Mortgages After a Month of War, Shutdown | Invesloan.com

    March 29, 2026

    12 Tons of KitKats Vanished in a European Highway Heist | Invesloan.com

    March 29, 2026

    Trump says navy is constructing underground complicated at White House | Invesloan.com

    March 29, 2026

    Trump hits 96% approval in CPAC ballot as conservatives again agenda | Invesloan.com

    March 29, 2026
    POPULAR

    China’s first passenger jet completes maiden commercial flight

    May 28, 2023

    Numbers taking US accountancy exams drop to lowest level in 17 years

    May 29, 2023

    Toyota chair faces removal vote over governance issues

    May 29, 2023
    Advertisement
    Load WordPress Sites in as fast as 37ms!
    Facebook Twitter Pinterest WhatsApp Instagram
    © 2007-2023 Invesloan.com All Rights Reserved.
    • Privacy
    • Terms
    • Press Release
    • Advertise
    • Contact

    Type above and press Enter to search. Press Esc to cancel.

    invesloan.com
    Manage Cookie Consent
    To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    • Manage options
    • Manage services
    • Manage {vendor_count} vendors
    • Read more about these purposes
    View preferences
    • {title}
    • {title}
    • {title}