Executive Summary
In August 2024, Transport for London (TfL) experienced a cyber attack attributed to teen members of the Scattered Spider hacking group, known for leveraging social engineering and identity compromise. Attackers allegedly gained access to internal systems, disrupting service operations and putting critical transport and passenger information at risk. U.K. authorities arrested Thalha Jubair (19) and Owen Flowers (18) in September 2024 for their involvement, underlining the rapid evolution of cybercriminal tactics and the challenge of securing public infrastructure.
This incident is a prime example of increasingly sophisticated attacks leveraging compromised credentials and insider tactics, even involving younger threat actors. It highlights both the threat to public services and the urgency for robust Zero Trust controls amid a landscape of rising identity-driven intrusions.
Why This Matters Now
With the transport and public sectors facing a surge in targeted attacks by agile criminal groups like Scattered Spider, organizations must urgently review their access controls, east-west security, and segmentation. Recent regulatory scrutiny magnifies the need for layered defenses, making real-time detection and incident response essential to preventing disruptive breaches.
Attack Path Analysis
The attack began with Scattered Spider actors gaining an initial foothold in TfL’s cloud or hybrid infrastructure, likely through phishing or exploitation of insecure credentials. They escalated privileges, potentially abusing misconfigured IAM roles or acquiring elevated access tokens. Attackers moved laterally within the cloud network and possibly across segmented workloads, leveraging east-west pathways and evading detection. Establishing command and control, they maintained persistence and coordinated actions via covert channels or remote access tools. Sensitive data was exfiltrated or staged for ransomware, using authorized but unsanctioned egress paths. Finally, the attackers enacted impact by disrupting operations or enabling extortion, affecting service availability and organizational trust.
Kill Chain Progression
Initial Compromise
Description
Attackers obtained an initial foothold in TfL's cloud environment via phishing, credential abuse, or exploiting remote access weaknesses.
Related CVEs
CVE-2015-2291
CVSS 7.8A vulnerability in the Intel Ethernet diagnostics driver for Windows allows local users to execute arbitrary code with kernel privileges via crafted IOCTL calls.
Affected Products:
Intel Ethernet diagnostics driver for Windows – before 1.3.1.0
Exploit Status:
exploited in the wildCVE-2021-35464
CVSS 9.8A Java deserialization vulnerability in ForgeRock AM server versions before 7.0 allows unauthenticated remote code execution via crafted requests.
Affected Products:
ForgeRock AM server – before 7.0
Exploit Status:
exploited in the wild
MITRE ATT&CK® Techniques
Phishing
Valid Accounts
Command and Scripting Interpreter
Abuse Elevation Control Mechanism
Process Injection
Obfuscated Files or Information
Exfiltration Over Web Service
Potential Compliance Exposure
Mapping incident impact across multiple compliance frameworks.
NIS2 Directive – Policies on risk analysis and information system security
Control ID: Art. 21(2)(a)
PCI DSS 4.0 – Strong Authentication Management
Control ID: 8.3.1
NYDFS 23 NYCRR 500 – Cybersecurity Policy
Control ID: 500.03
DORA – ICT Risk Management Framework
Control ID: Art. 10
CISA ZTMM 2.0 – Mitigate unauthorized access and account compromise
Control ID: Identity Pillar – Authentication & Access Control
Sector Implications
Industry-specific impact of the vulnerabilities, including operational, regulatory, and cloud security risks.
Transportation
Direct target of Scattered Spider's TfL attack demonstrates vulnerability to cybercriminal groups exploiting transit systems through lateral movement and data exfiltration techniques.
Government Administration
Public agencies face elevated risks from organized cybercriminal groups targeting critical infrastructure, requiring enhanced zero trust segmentation and threat detection capabilities.
Information Technology/IT
IT sectors must strengthen east-west traffic security and multicloud visibility controls against sophisticated teen hackers exploiting enterprise network architectures and cloud environments.
Telecommunications
Communication infrastructure vulnerable to Scattered Spider tactics requiring encrypted traffic protection, egress security enforcement, and anomaly detection against persistent cybercriminal group activities.
Sources
- U.K. Arrests Two Teen Scattered Spider Hackers Linked to August 2024 TfL Cyber Attackhttps://thehackernews.com/2025/09/uk-arrest-two-teen-scattered-spider.htmlVerified
- Two charged for TfL cyber attackhttps://www.nationalcrimeagency.gov.uk/news/two-charged-for-tfl-cyber-attackVerified
- Scattered Spider: A Threat Profilehttps://flashpoint.io/blog/scattered-spider-threat-profile/Verified
- Scattered Spider: Threat Actor Profilehttps://cyble.com/threat-actor-profiles/scattered-spider/Verified
Frequently Asked Questions
Cloud Native Security Fabric Mitigations and ControlsCNSF
Stronger zero trust segmentation, east-west traffic controls, egress governance, and threat detection would have drastically limited adversary movement, visibility, and exfiltration opportunities throughout the attack lifecycle.
Control: Multicloud Visibility & Control
Mitigation: Improved detection of anomalous access and cloud policy misconfigurations.
Control: Zero Trust Segmentation
Mitigation: Minimizes attacker ability to leverage compromised accounts to reach sensitive resources.
Control: East-West Traffic Security
Mitigation: Prevents or highly constrains unauthorized lateral movement in the cloud.
Control: Cloud Firewall (ACF) with Inline IPS (Suricata)
Mitigation: Blocks known malicious traffic and suspicious outbound C2 patterns.
Control: Egress Security & Policy Enforcement
Mitigation: Blocks or flags unauthorized outbound transfers and data theft.
Rapid detection and response to ransomware or destructive activities.
Impact at a Glance
Affected Business Functions
- Public Transportation Operations
- Customer Service
- Online Ticketing
Estimated downtime: 5 days
Estimated loss: $5,000,000
Potential exposure of customer data, including names, addresses, and contact details.
Recommended Actions
Key Takeaways & Next Steps
- • Enforce zero trust segmentation and least-privilege identity mapping across all cloud and hybrid workloads.
- • Deploy centralized, multicloud visibility solutions to rapidly detect anomalous access and configuration drift.
- • Implement granular east-west policy enforcement to block unauthorized workload-to-workload traffic.
- • Strengthen egress controls with FQDN filtering, inline intrusion prevention, and advanced data exfiltration detection.
- • Regularly review and test incident response capabilities with cloud-tailored detection and baselining for ransomware and other advanced threats.



