Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Cybercrime Group Recruits Women for IT Vishing

Cybercrime Group Recruits Women for IT Vishing

Posted on February 25, 2026 By CWS

The cybercrime syndicate Scattered LAPSUS$ Hunters (SLH) is reportedly offering monetary incentives to recruit women for their vishing campaigns targeting IT help desks. According to Dataminr, this move is designed to enhance the effectiveness of their social engineering tactics by utilizing female voices to impersonate employees.

Financial Incentives and Recruitment

SLH is known to offer between $500 and $1,000 per call to women, along with providing them with pre-written scripts to execute the phishing attacks. This strategy appears to be a deliberate attempt to diversify their social engineering tactics and increase the success rate of their impersonations.

The group, which includes members from LAPSUS$, Scattered Spider, and ShinyHunters, has a history of sophisticated social engineering techniques that bypass multi-factor authentication (MFA) through methods such as MFA prompt bombing and SIM swapping.

Modus Operandi of SLH

SLH targets IT help desks and call centers, posing as employees to trick them into resetting passwords or installing remote access tools. Once initial access is acquired, Scattered Spider is known to move laterally within virtual environments, escalate privileges, and extract sensitive corporate information.

Some attacks have escalated to deploying ransomware. The group uses legitimate services and residential proxy networks like Luminati and OxyLabs to avoid detection, and employs tools such as Ngrok, Teleport, and various file-sharing services.

Strategic Use of Tools and Techniques

A report by Palo Alto Networks Unit 42, tracking Scattered Spider as Muddled Libra, highlights their skill in exploiting human psychology by impersonating employees to reset passwords and MFA.

In one instance, the group created a virtual machine after obtaining credentials, using it for reconnaissance and attempting to extract data from the target’s systems. They have a notable history of targeting Microsoft Azure, using tools like ADRecon for cloud resource access.

Defense Measures and Recommendations

Organizations are advised to be vigilant and train IT support personnel to recognize pre-written scripts and polished impersonation attempts. Strengthening identity verification methods and moving away from SMS-based MFA are recommended to thwart these attacks.

Dataminr emphasizes that this recruitment strategy marks an evolution in SLH’s tactics, likely aiming to bypass traditional attacker profiles and improve impersonation success rates.

The Hacker News Tags:cloud security, Cybercrime, Cybersecurity, Dataminr, IT security, LAPSUS, MFA, Palo Alto Networks, Phishing, Scattered Spider, ShinyHunters, SLH, social engineering, Unit 42, Vishing

Post navigation

Previous Post: CISA Alerts on FileZen Vulnerability Exploitation
Next Post: AI and Stolen Credentials: A Growing Cybersecurity Threat

Related Posts

Overcoming Risks from Chinese GenAI Tool Usage Overcoming Risks from Chinese GenAI Tool Usage The Hacker News
Lazarus Hits Web3, Intel/AMD TEEs Cracked, Dark Web Leak Tool & More Lazarus Hits Web3, Intel/AMD TEEs Cracked, Dark Web Leak Tool & More The Hacker News
WIRTE Leverages AshenLoader Sideloading to Install the AshTag Espionage Backdoor WIRTE Leverages AshenLoader Sideloading to Install the AshTag Espionage Backdoor The Hacker News
New RFP Guide Enhances AI Governance and Security New RFP Guide Enhances AI Governance and Security The Hacker News
Digital Parasite Threats Redefine Cybersecurity in 2026 Digital Parasite Threats Redefine Cybersecurity in 2026 The Hacker News
North Korea-Linked Hackers Target Developers via Malicious VS Code Projects North Korea-Linked Hackers Target Developers via Malicious VS Code Projects The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical Adobe Reader Flaw Patched After Months of Exploitation
  • Critical Adobe Acrobat Reader Flaw Patched Amid Exploitation
  • CPUID Breach: STX RAT Spread via Compromised Downloads
  • OpenAI Urges macOS Users to Update Apps Amid Security Threat
  • Google Enhances Gmail with Mobile End-to-End Encryption

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical Adobe Reader Flaw Patched After Months of Exploitation
  • Critical Adobe Acrobat Reader Flaw Patched Amid Exploitation
  • CPUID Breach: STX RAT Spread via Compromised Downloads
  • OpenAI Urges macOS Users to Update Apps Amid Security Threat
  • Google Enhances Gmail with Mobile End-to-End Encryption

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark