Inside the Web of Deceit: Key 'Scattered Spider' Member Admits Guilt
In a significant breakthrough against cybercrime, Tyler Robert Buchanan—a 24-year-old from Scotland and a senior figure in the notorious group “Scattered Spider”—has entered a guilty plea to charges of wire fraud conspiracy and aggravated identity theft. The case sheds light on a sophisticated campaign of SMS phishing and SIM swapping that netted tens of millions of dollars in cryptocurrency from both tech companies and individual investors. Below, we explore the key aspects of this case through a series of detailed questions and answers.
Who is Tyler Buchanan, and what charges did he face?
Tyler Buchanan, known by his hacker handle “Tylerb,” is a 24-year-old British national from Dundee, Scotland. He was a senior member of the cybercrime group Scattered Spider. In May 2025, he pleaded guilty to wire fraud conspiracy and aggravated identity theft. These charges stem from a series of SMS-based phishing attacks in the summer of 2022 that targeted major technology companies. Buchanan admitted that the group used stolen data to orchestrate SIM-swapping attacks, siphoning at least $8 million in virtual currency from victims across the United States. He now faces a potential sentence of over 20 years in prison, with sentencing pending in U.S. federal court.

What is Scattered Spider, and how did it operate?
Scattered Spider is an English-speaking cybercrime syndicate notorious for its reliance on social engineering. Rather than exploiting technical vulnerabilities, group members would impersonate employees or contractors to deceive IT help desks into granting them access to corporate networks. Once inside, they would steal data and demand ransoms. The group also branched into cryptocurrency theft by using compromised credentials from phishing attacks to carry out SIM-swapping. Their operations were highly targeted, often focusing on technology companies and high-net-worth individuals. The group’s tactics earned them a place as one of the most formidable cybercriminal networks in recent years.
How did the 2022 SMS phishing campaign work?
In the summer of 2022, Buchanan conspired with other Scattered Spider members to launch tens of thousands of SMS-based phishing messages. These texts appeared to come from legitimate sources, tricking employees of companies like Twilio, LastPass, DoorDash, and Mailchimp into revealing their login credentials. The attackers used these stolen credentials to breach corporate systems and exfiltrate sensitive data. That data later fueled SIM-swapping attacks against individual cryptocurrency investors. The phishing domains were registered using a username and email address later tied to Buchanan, which allowed FBI investigators to identify him as a key orchestrator of the campaign.
What is SIM swapping, and why is it dangerous?
SIM swapping is a technique where criminals trick a mobile carrier into transferring a victim’s phone number to a SIM card controlled by the attacker. This gives the crooks access to any text message or phone call intended for the victim—including one-time passcodes for authentication and password reset links. For cryptocurrency investors, this can be catastrophic: attackers can drain wallets and accounts protected only by SMS-based two-factor verification. As noted above, the Scattered Spider group used data from corporate breaches to identify high-value targets, then executed SIM swaps to steal millions in digital currency. The U.S. Justice Department stated that Buchanan alone admitted to stealing at least $8 million from victims across the country.

How did investigators track down Buchanan?
FBI investigators linked Buchanan to the phishing campaign after discovering that the same username and email address used to register the malicious domains appeared repeatedly in the attack logs. The domain registrar NameCheap provided records showing that, less than a month before the phishing spree began, the account owner logged in from a U.K. internet address. Scottish police confirmed that the address was leased to Buchanan throughout 2022. This digital trail, combined with witness interviews and financial records, led to his identification. Buchanan was eventually arrested in Spain while trying to flee abroad, and he was extradited to the United States to face charges.
What led to Buchanan’s flight from the UK?
In February 2023, Buchanan fled the United Kingdom after a rival cybercrime gang reportedly hired thugs to invade his home. The attackers assaulted his mother and threatened to burn him with a blowtorch unless he surrendered the keys to his cryptocurrency wallet. This dramatic incident was first reported by KrebsOnSecurity. Scottish police later found a device at his residence containing evidence linking him to the Scattered Spider activities. Buchanan’s escape attempt ended when he was detained by airport authorities in Spain, as shown in photos published by the Daily Mail in May 2025. His capture marked the end of a short-lived flight from justice.
What does this guilty plea mean for cybercrime enforcement?
Buchanan’s guilty plea sends a strong message that even sophisticated cybercriminals can be caught and prosecuted. By admitting to wire fraud conspiracy and aggravated identity theft, he has accepted responsibility for his role in a multi-million dollar scheme that harmed both companies and individual investors. His cooperation may provide law enforcement with valuable insights into Scattered Spider’s inner workings and financial structure. The case also highlights the importance of improving cybersecurity practices, such as moving away from SMS-based two-factor authentication to more secure methods like authenticator apps or hardware tokens. As cybercrime groups like Scattered Spider evolve, international cooperation and advanced investigative techniques remain crucial to protecting digital assets and personal data.
Related Articles
- CISA Warns of Active Exploitation of 'Copy Fail' Linux Flaw Leading to Full System Compromise
- Former Ransomware Negotiators Sentenced to Prison for Roles in BlackCat Attacks
- 8 Critical Facts About the MetInfo CMS RCE Vulnerability (CVE-2026-29014)
- Windows Shell Spoofing Vulnerability: Urgent Patch Required, Experts Warn of 'Patch Gap' Risks
- Ubuntu 16.04 LTS Security Support Ends – Upgrade Now or Risk Unpatched Exploits
- How Russian GRU Hackers Hijacked Routers to Steal OAuth Tokens: A Technical Breakdown
- From Stalled Deals to Closed Wins: A Tutorial on MSP Cybersecurity Sales Transformation
- How to Detect and Recover from Docker Hub Supply Chain Compromises: A Step-by-Step Response Guide