Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Cybercrime Group Recruits Women for IT Vishing

Cybercrime Group Recruits Women for IT Vishing

Posted on February 25, 2026 By CWS

The cybercrime syndicate Scattered LAPSUS$ Hunters (SLH) is reportedly offering monetary incentives to recruit women for their vishing campaigns targeting IT help desks. According to Dataminr, this move is designed to enhance the effectiveness of their social engineering tactics by utilizing female voices to impersonate employees.

Financial Incentives and Recruitment

SLH is known to offer between $500 and $1,000 per call to women, along with providing them with pre-written scripts to execute the phishing attacks. This strategy appears to be a deliberate attempt to diversify their social engineering tactics and increase the success rate of their impersonations.

The group, which includes members from LAPSUS$, Scattered Spider, and ShinyHunters, has a history of sophisticated social engineering techniques that bypass multi-factor authentication (MFA) through methods such as MFA prompt bombing and SIM swapping.

Modus Operandi of SLH

SLH targets IT help desks and call centers, posing as employees to trick them into resetting passwords or installing remote access tools. Once initial access is acquired, Scattered Spider is known to move laterally within virtual environments, escalate privileges, and extract sensitive corporate information.

Some attacks have escalated to deploying ransomware. The group uses legitimate services and residential proxy networks like Luminati and OxyLabs to avoid detection, and employs tools such as Ngrok, Teleport, and various file-sharing services.

Strategic Use of Tools and Techniques

A report by Palo Alto Networks Unit 42, tracking Scattered Spider as Muddled Libra, highlights their skill in exploiting human psychology by impersonating employees to reset passwords and MFA.

In one instance, the group created a virtual machine after obtaining credentials, using it for reconnaissance and attempting to extract data from the target’s systems. They have a notable history of targeting Microsoft Azure, using tools like ADRecon for cloud resource access.

Defense Measures and Recommendations

Organizations are advised to be vigilant and train IT support personnel to recognize pre-written scripts and polished impersonation attempts. Strengthening identity verification methods and moving away from SMS-based MFA are recommended to thwart these attacks.

Dataminr emphasizes that this recruitment strategy marks an evolution in SLH’s tactics, likely aiming to bypass traditional attacker profiles and improve impersonation success rates.

The Hacker News Tags:cloud security, Cybercrime, Cybersecurity, Dataminr, IT security, LAPSUS, MFA, Palo Alto Networks, Phishing, Scattered Spider, ShinyHunters, SLH, social engineering, Unit 42, Vishing

Post navigation

Previous Post: CISA Alerts on FileZen Vulnerability Exploitation
Next Post: AI and Stolen Credentials: A Growing Cybersecurity Threat

Related Posts

Malicious Pull Request Targets 6,000+ Developers via Vulnerable Ethcode VS Code Extension Malicious Pull Request Targets 6,000+ Developers via Vulnerable Ethcode VS Code Extension The Hacker News
How to Use Ringfencing to Prevent the Weaponization of Trusted Software How to Use Ringfencing to Prevent the Weaponization of Trusted Software The Hacker News
China-Linked Group Targets Singapore Telecom in Cyber Attack China-Linked Group Targets Singapore Telecom in Cyber Attack The Hacker News
Automated FortiGate Attacks Exploit FortiCloud SSO to Alter Firewall Configurations Automated FortiGate Attacks Exploit FortiCloud SSO to Alter Firewall Configurations The Hacker News
Malicious VS Code AI Extensions with 1.5 Million Installs Steal Developer Source Code Malicious VS Code AI Extensions with 1.5 Million Installs Steal Developer Source Code The Hacker News
China-Linked Amaranth-Dragon Exploits WinRAR Flaw in Southeast Asia China-Linked Amaranth-Dragon Exploits WinRAR Flaw in Southeast Asia The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • SURXRAT Android Malware Threatens Global Device Security
  • Cortex XDR Vulnerability Enables Covert Command Channels
  • Cybercriminals Exploit Fake Avast Site for Credit Card Data
  • UK Imposes $20M Fine on Reddit for Child Data Breaches
  • Google Halts Major Cyber Espionage Campaign Targeting 53 Entities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • SURXRAT Android Malware Threatens Global Device Security
  • Cortex XDR Vulnerability Enables Covert Command Channels
  • Cybercriminals Exploit Fake Avast Site for Credit Card Data
  • UK Imposes $20M Fine on Reddit for Child Data Breaches
  • Google Halts Major Cyber Espionage Campaign Targeting 53 Entities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News