Sunday, May 18, 2025
Homecyber securityUNC3944 Hackers Shift from SIM Swapping to Ransomware and Data Extortion

UNC3944 Hackers Shift from SIM Swapping to Ransomware and Data Extortion

Published on

SIEM as a Service

Follow Us on Google News

UNC3944, a financially-motivated threat actor also linked to the group known as Scattered Spider, has transitioned from niche SIM swapping operations targeting telecommunications organizations to a more aggressive focus on ransomware and data theft extortion across diverse industries.

Initially observed exploiting telecom vulnerabilities to facilitate SIM swaps, UNC3944 pivoted in early 2023 to deploy ransomware campaigns, impacting sectors such as technology, financial services, business process outsourcing, gaming, hospitality, retail, and media & entertainment.

This shift has seen the group conduct targeted waves of attacks, with notable campaigns against financial services in late 2023 and food services in May 2024, alongside high-profile brands likely chosen for prestige and media attention.

- Advertisement - Google News

Their victimology reveals a preference for large enterprises in English-speaking countries like the United States, Canada, the UK, and Australia, with recent expansions into Singapore and India, focusing on organizations with extensive help desk and outsourced IT functions vulnerable to social engineering.

Law Enforcement Impact and Emerging Threats

Despite a temporary decline in activity following 2024 law enforcement actions against alleged associates, UNC3944’s deep ties within the cybercrime ecosystem suggest a potential for rapid recovery, possibly through new partnerships or tooling to evade detection.

Recent public reports indicate tactics consistent with Scattered Spider being used in attacks on UK retail organizations, deploying DragonForce ransomware, with claims of responsibility for multiple attempted breaches.

Intriguingly, DragonForce operators have reportedly taken control of RansomHub, a ransomware-as-a-service (RaaS) platform that ceased operations in March 2024, where UNC3944 was an affiliate post the shutdown of ALPHV (Blackcat) RaaS.

While Google Threat Intelligence Group (GTIG) has not independently verified UNC3944’s direct involvement, the rising trend of retail sector victimization on data leak sites (DLS)-accounting for 11% of victims in 2025, up from 8.5% in 2024-underscores the attractiveness of retail targets due to their wealth of personally identifiable information (PII) and financial data, often coupled with a higher likelihood of ransom payment to restore transaction capabilities.

Tactical Sophistication and Defense Imperatives

UNC3944’s arsenal heavily relies on social engineering, impersonating users to manipulate help desk personnel, alongside sophisticated tactics to bypass multi-factor authentication (MFA) and escalate privileges within compromised environments.

UNC3944 Hackers
UNC3944 attack lifecycle

Their attack lifecycle includes reconnaissance using tools like ADRecon and SharpHound, targeting documentation on user provisioning and network diagrams.

To counter these threats, organizations must prioritize identity security by enforcing phishing-resistant MFA, disabling self-service password resets during heightened threat periods, and implementing strict verification processes like on-camera ID checks.

Additionally, endpoint hardening through device compliance checks, network segmentation to protect trusted service infrastructure, and robust monitoring for anomalous authentication attempts are critical.

With UNC3944’s proficiency in exploiting cloud resources and collaboration platforms like Microsoft Teams for impersonation, proactive measures such as restricting external domains, blocking TOR exit nodes, and educating staff on MFA fatigue and doxxing threats are essential to mitigate risks.

As this threat actor continues to adapt, organizations must remain vigilant, leveraging comprehensive visibility and segregated identity controls to safeguard against these evolving cyber threats.

Setting Up SOC Team? – Download Free Ultimate SIEM Pricing Guide (PDF) For Your SOC Team -> Free Download

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

VMware ESXi, Firefox, Red Hat Linux & SharePoint Hacked – Pwn2Own Day 2

Security researchers demonstrated their prowess on the second day of Pwn2Own Berlin 2025, discovering...

Critical WordPress Plugin Flaw Puts Over 10,000 Sites of Cyberattack

A serious security flaw affecting the Eventin plugin, a popular event management solution for...

Sophisticated NPM Attack Leverages Google Calendar2 for Advanced Communication

A startling discovery in the npm ecosystem has revealed a highly sophisticated malware campaign...

New Ransomware Attack Targets Elon Musk Supporters Using PowerShell to Deploy Payloads

A newly identified ransomware campaign has emerged, seemingly targeting supporters of Elon Musk through...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

VMware ESXi, Firefox, Red Hat Linux & SharePoint Hacked – Pwn2Own Day 2

Security researchers demonstrated their prowess on the second day of Pwn2Own Berlin 2025, discovering...

Critical WordPress Plugin Flaw Puts Over 10,000 Sites of Cyberattack

A serious security flaw affecting the Eventin plugin, a popular event management solution for...

Sophisticated NPM Attack Leverages Google Calendar2 for Advanced Communication

A startling discovery in the npm ecosystem has revealed a highly sophisticated malware campaign...