Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Google suspends UNC2814 GRIDTIDE campaign after 53 breaches in 42 countries

The OpenClaw creator’s advice to AI builders is to be more playful and give yourself time to improve.

SLH offers $500-$1,000 per call to recruit women for IT help desk vishing attack

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » SLH offers $500-$1,000 per call to recruit women for IT help desk vishing attack
Identity

SLH offers $500-$1,000 per call to recruit women for IT help desk vishing attack

userBy userFebruary 25, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananFebruary 25, 2026Social engineering/cloud security

A notorious cybercrime group known as Scattered LAPSUS$ Hunters (SLH) has been observed offering financial incentives to recruit women to carry out social engineering attacks.

Dataminr said in a new threat brief that it is considering hiring them for voice phishing campaigns targeting IT help desks. The group is said to offer upfront payments of between $500 and $1,000 per call, in addition to providing the pre-written scripts needed to carry out the attack.

“SLH is diversifying its social engineering workforce by specifically recruiting women to carry out its malicious attacks, likely increasing its success rate in impersonating help desks,” the threat intelligence firm said.

SLH, a high-profile cybercriminal supergroup comprised of LAPSUS$, Scattered Spider, and ShinyHunters, has a history of engaging in sophisticated social engineering attacks that bypass multi-factor authentication (MFA) through techniques such as MFA prompt bombing and SIM swapping.

The group’s tactics include targeting help desks and call centers to infiltrate businesses by posing as employees and convincing them to reset passwords or install remote monitoring and management (RMM) tools that allow remote access. Once gaining initial access, Scattered Spiders have been observed to move laterally into virtualized environments, escalating privileges, and leaking sensitive corporate data.

Some of these attacks also lead to the deployment of ransomware. Another characteristic of these attacks is the use of legitimate services and residential proxy networks (such as Luminati and OxyLabs) to evade detection. Scattered Spider attackers have used a variety of tunneling tools such as Ngrok, Teleport, and Pinggy, as well as free file sharing services such as file.io, gofile.io, mega.nz, and transfer.sh.

Palo Alto Networks Unit 42, which tracks the Scattered Spider under the nickname Muddled Libra, said in a report released earlier this month that the attacker is “very adept at exploiting human psychology” by impersonating employees and attempting to reset passwords and multi-factor authentication (MFA).

In at least one incident investigated by a cybersecurity firm in September 2025, the Scattered Spider allegedly called an IT help desk to obtain privileged credentials, then created and utilized a virtual machine (VM) that it used to perform reconnaissance (such as enumerating Active Directory) and attempt to steal Outlook mailbox files and data downloaded from the target’s Snowflake database.

“This threat actor leverages legitimate tools and existing infrastructure to blend in, while focusing on identity compromise and social engineering,” Unit 42 said. “They operate quietly and maintain persistence.”

The cybersecurity firm also noted that Scattered Spider has an “extensive history” of targeting Microsoft Azure environments using the Graph API to facilitate access to Azure cloud resources. The group also uses cloud enumeration tools such as ADRecon for Active Directory reconnaissance.

With social engineering emerging as a key entry point for cybercrime groups, organizations are encouraged to remain vigilant and train their IT help desk and support personnel to be wary of pre-written scripts and sophisticated voice spoofing, implement strict identity verification, move away from SMS-based authentication to strengthen MFA policies, and monitor audit logs for new user creation and elevation of administrative privileges associated with help desk interactions.

“This recruitment drive represents a calculated evolution in SLH’s tactics,” Dataminr said. “By specifically soliciting female voices, the group is likely aiming to circumvent the ‘traditional’ profiles of attackers that IT help desk staff may be trained to identify, thereby increasing the effectiveness of their impersonation efforts.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleESA funding call to strengthen local transport networks
Next Article The OpenClaw creator’s advice to AI builders is to be more playful and give yourself time to improve.
user
  • Website

Related Posts

Google suspends UNC2814 GRIDTIDE campaign after 53 breaches in 42 countries

February 25, 2026

5 ways triage failure increases business risk instead of reducing it

February 25, 2026

A malicious NuGet package stole ASP.NET data. Malware with dropped npm packages

February 25, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Google suspends UNC2814 GRIDTIDE campaign after 53 breaches in 42 countries

The OpenClaw creator’s advice to AI builders is to be more playful and give yourself time to improve.

SLH offers $500-$1,000 per call to recruit women for IT help desk vishing attack

ESA funding call to strengthen local transport networks

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.