HomeIntelligenceBrief
BREACH BRIEF🟠 High ThreatIntel

Scattered Spider Hacker Arrested in Finland Faces U.S. Charges for Multi‑Million Dollar Extortion Campaigns

A 19‑year‑old dual U.S./Estonian citizen, identified as ‘Bouquet,’ was detained in Finland and now faces U.S. federal charges for wire fraud, conspiracy, and computer intrusion tied to Scattered Spider’s global extortion operations. The actor helped steal and ransom data from high‑profile corporations, underscoring the need for robust credential‑security controls in third‑party risk programs.

LiveThreat™ Intelligence · 📅 April 28, 2026· 📰 bleepingcomputer.com
🟠
Severity
High
TI
Type
ThreatIntel
🎯
Confidence
High
🏢
Affected
5 sector(s)
Actions
3 recommended
📰
Source
bleepingcomputer.com

Scattered Spider Hacker Arrested in Finland Faces U.S. Charges for Multi‑Million Dollar Extortion Campaigns

What Happened – A 19‑year‑old dual U.S./Estonian citizen, known online as “Bouquet,” was detained by Finnish authorities at Helsinki Airport and is now charged in the United States with wire fraud, conspiracy, and computer intrusion for his role in Scattered Spider’s extortion operations. Prosecutors allege he helped steal and ransom data from multiple global corporations, demanding up to $8 million and causing millions in remediation costs.

Why It Matters for TPRM

  • The actor targeted a wide range of high‑profile vendors, demonstrating the breadth of risk posed by a single threat‑actor across sectors.
  • Scattered Spider’s tactics (MFA‑bombing, SMS phishing, social engineering) bypass traditional perimeter controls, highlighting gaps in credential‑security programs.
  • Ongoing investigations may surface additional victim disclosures, increasing exposure for third‑party supply chains.

Who Is Affected – Hospitality & gaming (Caesars, MGM Resorts), technology & SaaS (MailChimp, Twilio, Reddit), retail & luxury (Marks & Spencer, Harrods, Jaguar Land Rover), logistics & travel (WestJet), financial services (Allianz Life) and others.

Recommended Actions

  • Review all third‑party contracts for clauses addressing credential‑theft and extortion.
  • Verify that vendors enforce MFA with anti‑fatigue controls and monitor for anomalous authentication attempts.
  • Conduct a focused threat‑intel review on Scattered Spider TTPs and update incident‑response playbooks accordingly.

Technical Notes – The group leverages MFA‑bombing, SMS credential phishing, and help‑desk impersonation to harvest privileged credentials, then exfiltrates data (often > 100 GB) for ransom. No specific CVE is cited; the attack surface is primarily human‑factor weaknesses. Source: BleepingComputer

📰 Original Source
https://www.bleepingcomputer.com/news/security/us-reportedly-charges-scattered-spider-hacker-arrested-in-finland/

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.