SLH Offers $500–$1,000 Per Call to Recruit Women for IT Help Desk Vishing Attacks
Scattered LAPSUS$ Hunters (SLH) Recruits Women for High-Stakes Vishing Attacks
In a disturbing evolution of cybercrime tactics, the notorious Scattered LAPSUS$ Hunters (SLH) collective has launched a targeted recruitment campaign to enlist women for sophisticated voice phishing operations against corporate IT help desks.
According to cybersecurity firm Dataminr’s latest threat brief, SLH is actively offering financial incentives ranging from $500 to $1,000 per successful call to women willing to execute these social engineering campaigns. The group provides comprehensive pre-written scripts designed to maximize success rates when impersonating employees to IT support personnel.
“This recruitment drive represents a calculated evolution in SLH’s tactics,” Dataminr analysts noted. “By specifically seeking female voices, the group likely aims to bypass the ‘traditional’ profiles of attackers that IT help desk staff may be trained to identify, thereby increasing the effectiveness of their impersonation efforts.”
The Rise of a Cybercrime Supergroup
SLH represents a formidable alliance between three of the most dangerous cybercrime collectives: LAPSUS$, Scattered Spider, and ShinyHunters. This supergroup has established itself as a master of advanced social engineering techniques, particularly in circumventing multi-factor authentication (MFA) systems through methods like MFA prompt bombing and SIM swapping.
Their primary attack vector involves targeting corporate help desks and call centers, where attackers pose as legitimate employees requesting password resets or the installation of remote monitoring and management (RMM) tools. These RMM tools grant attackers remote access to corporate networks, serving as a gateway for deeper infiltration.
Once initial access is achieved, Scattered Spider has demonstrated sophisticated lateral movement capabilities, escalating privileges and exfiltrating sensitive corporate data. In several documented cases, these attacks have culminated in ransomware deployments, causing significant financial and operational damage to victim organizations.
Technical Sophistication and Evasion Tactics
What makes SLH particularly dangerous is their technical sophistication and ability to blend into legitimate network traffic. The group extensively utilizes residential proxy networks such as Luminati and OxyLabs to mask their true locations and avoid detection. They employ tunneling tools including Ngrok, Teleport, and Pinggy to maintain persistent access while appearing as legitimate network traffic.
The attackers also leverage free file-sharing services like file.io, gofile.io, mega.nz, and transfer.sh to exfiltrate stolen data without raising immediate suspicion. This combination of social engineering prowess and technical evasion makes them exceptionally difficult to detect and stop.
Azure Cloud Targeting and Graph API Exploitation
Palo Alto Networks Unit 42, tracking the group under the moniker “Muddled Libra,” has documented Scattered Spider’s extensive targeting of Microsoft Azure environments. The group demonstrates particular proficiency in exploiting the Graph API to facilitate unauthorized access to Azure cloud resources.
“They operate quietly and maintain persistence,” Unit 42 researchers observed. “While focusing on identity compromise and social engineering, this threat actor leverages legitimate tools and existing infrastructure to blend in.”
The group’s toolkit includes cloud enumeration tools like ADRecon for Active Directory reconnaissance, allowing them to map corporate networks and identify high-value targets for subsequent attacks.
Real-World Attack Chain
In a September 2025 investigation, Unit 42 documented a sophisticated attack where Scattered Spider obtained privileged credentials by successfully calling an IT help desk. The attackers then created and utilized a virtual machine to conduct extensive reconnaissance, including Active Directory enumeration.
Their objectives included exfiltrating Outlook mailbox files and downloading data from the target’s Snowflake database. This case exemplifies the group’s methodical approach: initial social engineering compromise followed by technical exploitation and data theft.
Implications for Corporate Security
The targeted recruitment of women for vishing attacks represents a significant evolution in cybercrime methodology. By diversifying their social engineering pool with voices that may not match traditional attacker profiles, SLH increases their chances of bypassing trained help desk personnel.
Organizations must recognize that traditional security awareness training focused on identifying male-sounding voices or certain accents may be insufficient. The polished nature of the pre-written scripts provided to recruited operatives suggests these attacks will be highly convincing and professionally executed.
Recommended Security Measures
Security experts recommend several critical measures to defend against these evolving threats:
Organizations should implement rigorous identity verification protocols for all help desk interactions, moving beyond simple security questions to more robust authentication methods. MFA policies should be hardened by transitioning away from SMS-based authentication, which remains vulnerable to SIM swapping attacks.
IT help desk and support personnel require specialized training to recognize pre-written scripts and polished voice impersonation attempts. They should be educated about the specific tactics employed by groups like SLH and trained to escalate suspicious interactions for additional verification.
Comprehensive log auditing is essential, particularly monitoring for new user creation or administrative privilege escalation following help desk interactions. These activities often indicate successful social engineering compromises.
The Human Element in Cybercrime
This recruitment strategy highlights the increasingly human-centric nature of modern cybercrime. While technical vulnerabilities remain important, the exploitation of human psychology through social engineering has become the primary entry point for sophisticated threat actors.
SLH’s approach demonstrates how cybercrime groups are treating their operations like legitimate businesses, investing in recruitment, providing training materials, and offering competitive compensation to attract skilled operatives. This professionalization of cybercrime makes these threats more dangerous and persistent than ever before.
Conclusion
The Scattered LAPSUS$ Hunters’ targeted recruitment of women for vishing attacks represents a disturbing evolution in cybercrime methodology. By combining social engineering expertise with technical sophistication and strategic recruitment, SLH has positioned itself as one of the most formidable threats facing corporate cybersecurity today.
Organizations must adapt their security strategies to address this human-centric threat landscape, implementing comprehensive training, robust verification protocols, and vigilant monitoring to protect against these increasingly sophisticated attacks. The stakes have never been higher, as these groups continue to evolve and refine their tactics in pursuit of corporate data and financial gain.
Tags: Cybercrime, Social Engineering, Vishing, Scattered LAPSUS$ Hunters, SLH, Women in Cybercrime, IT Security, MFA Bypass, Cloud Security, Azure, Graph API, Ransomware, SIM Swapping, Help Desk Security, Data Exfiltration, Threat Intelligence, Cyber Recruitment, Voice Phishing, Corporate Espionage, Security Awareness, Authentication Bypass
Viral Sentences:
“SLH is diversifying its social engineering pool by specifically recruiting women to conduct vishing attacks, likely to increase the success rate of help desk impersonation.”
“By specifically seeking female voices, the group likely aims to bypass the ‘traditional’ profiles of attackers that IT help desk staff may be trained to identify.”
“Organizations are advised to be on alert and train IT help desk and support personnel to watch out for pre-written scripts and polished voice impersonation.”
“This recruitment drive represents a calculated evolution in SLH’s tactics.”
“Scattered Spider has an ‘extensive history’ of targeting Microsoft Azure environments using the Graph API to facilitate access to Azure cloud resources.”
“They operate quietly and maintain persistence.”
“SLH’s approach demonstrates how cybercrime groups are treating their operations like legitimate businesses, investing in recruitment, providing training materials, and offering competitive compensation to attract skilled operatives.”
“The stakes have never been higher, as these groups continue to evolve and refine their tactics in pursuit of corporate data and financial gain.”
“The professionalization of cybercrime makes these threats more dangerous and persistent than ever before.”
“Traditional security awareness training focused on identifying male-sounding voices or certain accents may be insufficient.”
,




Leave a Reply
Want to join the discussion?Feel free to contribute!