The Scattered Lapsus$ Hunters (SLH) cybercrime collective has launched a new recruitment campaign specifically targeting women for upcoming voice phishing (vishing) operations. This tactical evolution signals a calculated effort to diversify the group's social engineering tactics.Â
By seeking female voices, SLH likely aims to circumvent security training that profiles attackers, thereby increasing the success rate of their impersonation attempts against corporate targets.
The SLH vishing campaign is designed to exploit a common vulnerability: the human element in IT support. The group is offering significant financial incentives, paying recruits up to $1,000 upfront for each call made, as Dataminr observed on a public Telegram board on February 22, 2026.Â
These recruits are armed with detailed scripts, likely to convincingly impersonate employees in need of assistance, typically to reset passwords or bypass multi-factor authentication (MFA).Â
As seen in previous incidents, the primary targets of these vishing attacks on IT help desks are employees who can grant initial network access, which SLH can then leverage for broader infiltration and data exfiltration.
The Scattered Lapsus$ Hunters, an alliance of some of the most aggressive threat actors, and its members have a well-documented history of successfully breaching major global corporations. Their known tactics include MFA fatigue bombing and SIM swapping.Â
Security organizations are urged to:
Earlier this month, a Mandiant report outlined how the ShinyHunters extortion tactics, vishing, and SSO compromise target cloud environments. In January, security researchers observed an alleged ShinyHunters vishing campaign targeting Okta SSO accounts via custom Phishing-as-a-Service kits.