SLH Offers $500–$1,000 Per Call to Recruit Women for IT Help Desk Vishing Attacks
好的,我现在要帮用户总结这篇文章的内容,控制在100字以内。首先,我需要仔细阅读文章,抓住主要信息。 文章主要讲的是一个名为Scattered LAPSUS$ Hunters (SLH)的网络犯罪团伙。他们通过提供金钱激励来招募女性进行社会工程攻击,特别是语音钓鱼攻击。目标是公司的IT帮助台,目的是获取访问权限,进而进行数据泄露或部署勒索软件。 接下来,我需要提取关键点:SLH招募女性、使用预写脚本、目标是帮助台、绕过MFA、数据泄露和勒索软件。这些是文章的核心内容。 然后,我要把这些信息浓缩成一句话,确保不超过100字,并且直接描述内容,不需要开头语。可能的结构是:SLH招募女性进行语音钓鱼攻击,目标是帮助台,绕过MFA,导致数据泄露和勒索软件部署。 最后,检查一下是否涵盖了所有关键点,并且语言简洁明了。 </think> Scattered LAPSUS$ Hunters (SLH)网络犯罪团伙通过提供金钱激励招募女性进行社会工程攻击,特别是针对IT帮助台的语音钓鱼攻击。该团伙利用预写脚本绕过多因素认证(MFA),进而获取公司访问权限并实施数据泄露或勒索软件部署。 2026-2-25 15:6:0 Author: thehackernews.com(查看原文) 阅读量:11 收藏

Social Engineering / Cloud Security

The notorious cybercrime collective known as Scattered LAPSUS$ Hunters (SLH) has been observed offering financial incentives to recruit women to pull off social engineering attacks.

The idea is to hire them for voice phishing campaigns targeting IT help desks, Dataminr said in a new threat brief. The group is said to be offering anywhere between $500 and $1,000 upfront per call, in addition to providing them with the necessary pre-written scripts to carry out the attack.

"SLH is diversifying its social engineering pool by specifically recruiting women to conduct vishing attacks, likely to increase the success rate of help desk impersonation," the threat intelligence firm said.

A high-profile cybercrime supergroup comprising LAPSUS$, Scattered Spider, and ShinyHunters, SLH has a record of engaging in advanced social engineering attacks to sidestep multi-factor authentication (MFA) through techniques like MFA prompt bombing and SIM swapping. 

The group's modus operandi also involves targeting help desks and call centers to breach companies by posing as employees and convincing them to reset a password or install a remote monitoring and management (RMM) tool that grants them remote access. Once initial access is obtained, Scattered Spider has been observed moving laterally to virtualized environments, escalating privileges, and exfiltrating sensitive corporate data.

Some of these attacks have further led to the deployment of ransomware. Another hallmark of these attacks is the use of legitimate services and residential proxy networks (e.g., Luminati and OxyLabs) to blend in and evade detection. Scattered Spider actors have used various tunneling tools like Ngrok, Teleport, and Pinggy, as well as free file-sharing services such as file.io, gofile.io, mega.nz, and transfer.sh.

In a report published earlier this month, Palo Alto Networks Unit 42, which is tracking Scattered Spider under the moniker Muddled Libra, described the threat actor as "highly proficient at exploiting human psychology" by impersonating employees to attempt password and multi-factor authentication (MFA) resets.

In at least one case investigated by the cybersecurity company in September 2025, Scattered Spider is said to have created and utilized a virtual machine (VM) after obtaining privileged credentials by calling the IT help desk and then used it to conduct reconnaissance (e.g., Active Directory enumeration) and attempt to exfiltrate Outlook mailbox files and data downloaded from the target's Snowflake database.

"While focusing on identity compromise and social engineering, this threat actor leverages legitimate tools and existing infrastructure to blend in," Unit 42 said. "They operate quietly and maintain persistence."

The cybersecurity company also noted that Scattered Spider has an "extensive history" of targeting Microsoft Azure environments using the Graph API to facilitate access to Azure cloud resources. Also put to use by the group are cloud enumeration tools such as ADRecon for Active Directory reconnaissance.

With social engineering emerging as the primary entry point for the cybercrime group, organizations are advised to be on alert and train IT help desk and support personnel to watch out for pre-written scripts and polished voice impersonation, enforce strict identity verification, harden MFA policies by shifting away from SMS-based authentication, and audit logs for new user creation or administrative privilege escalation following help desk interactions.

"This recruitment drive represents a calculated evolution in SLH's tactics," Dataminr said. "By specifically seeking female voices, the group likely aims to bypass the 'traditional' profiles of attackers that IT help desk staff may be trained to identify, thereby increasing the effectiveness of their impersonation efforts."

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/02/slh-offers-5001000-per-call-to-recruit.html
如有侵权请联系:admin#unsafe.sh