Threat IntelHIGH

Vishing Attacks: Scattered LAPSUS$ Hunters Recruit Women for Cash

THThe Hacker News19h ago2 min read
Scattered LAPSUS$ Huntersvishingsocial engineeringcybercrime
🎯

Basically, a cybercrime group is paying women to trick IT help desks over the phone.

Quick Summary

Scattered LAPSUS$ Hunters are recruiting women for voice phishing attacks, offering $500-$1,000 per call. This poses a serious risk to your personal and professional data. Stay vigilant and report any suspicious calls to protect yourself.

What Happened

Cybercrime? is evolving, and the latest twist involves a notorious group called Scattered LAPSUS$ Hunters (SLH). This collective has been spotted recruiting women to conduct voice phishing, or vishing?, attacks. These attacks specifically target IT help desk?s, aiming to exploit vulnerabilities in organizations' security systems.

The group is reportedly offering between $500 and $1,000 for each successful call. This financial incentive is designed to lure individuals into participating in these deceptive schemes. As organizations increasingly rely on remote work and digital communication, the risk of falling victim to such attacks rises dramatically.

Why Should You Care

If you use a phone to manage your work or personal accounts, this news is crucial. Imagine receiving a call from someone who sounds legitimate, asking for sensitive information. That's exactly what these vishing? attacks aim to achieve. They can lead to unauthorized access to your accounts and sensitive data.

This isn't just a problem for big companies; it can affect anyone. Your personal information, bank accounts, and even your job could be at risk. Protecting yourself means being aware of these tactics and knowing how to respond if you receive a suspicious call.

What's Being Done

In response to this alarming trend, cybersecurity experts and organizations are on high alert. They are working to develop better training and awareness programs to help employees recognize and avoid vishing? attempts. Here’s what you can do right now:

  • Be cautious when receiving calls asking for sensitive information.
  • Verify the identity of the caller before providing any details.
  • Report suspicious calls to your IT department or local authorities.

Experts are closely monitoring the situation, especially how SLH's tactics evolve and whether other groups will adopt similar recruitment strategies. Staying informed is key to staying safe.

💡 Tap dotted terms for explanations

🔒 Pro insight: The recruitment strategy reflects a shift in social engineering tactics, leveraging personal connections to enhance trust and deception.

Original article from

The Hacker News

Read Full Article

Related Pings

HIGHThreat Intel

Cyber Security Report 2026: Key Insights Unveiled

A new report reveals crucial trends in cybersecurity for 2026. It highlights rising threats like ransomware and phishing that affect everyone. Protecting your digital life is essential as attacks become more sophisticated. Stay updated and vigilant to safeguard your information.

Check Point Research·Just now·2m
HIGHThreat Intel

DDoS Attacks Surge: Japan's Websites Targeted

Japanese websites are experiencing a surge in DDoS attacks using reflection packets. Major companies, including banks and airlines, are being targeted. This matters because such attacks can cripple online services, affecting your access to essential sites. JPCERT/CC is monitoring the situation and sharing data to help mitigate risks.

JPCERT/CC·Just now·2m
HIGHThreat Intel

Spyware Campaign Exploits Wartime Panic in Israel

A new spyware campaign is exploiting the Israel-Iran conflict by sending a fake Red Alert app via SMS. This poses serious risks to personal safety and privacy. Stay vigilant and only download apps from trusted sources.

Infosecurity Magazine·Just now·2m
HIGHThreat Intel

Alert Fatigue: Modern SOCs Combat Overwhelming Noise

Security teams are facing overwhelming alert fatigue, making it hard to respond effectively. This affects everyone from analysts to organizations at large. Discover how modern SOCs are tackling this issue with new strategies and tools to streamline investigations and enhance security.

Rapid7 Blog·Just now·2m
HIGHThreat Intel

HoneyMyte Unleashes New Stealers in CoolClient Update

Kaspersky reveals that HoneyMyte has updated its CoolClient backdoor, deploying new data-stealing tools. This poses a risk to your online security. Stay informed and protect your sensitive information!

Kaspersky Securelist·Just now·3m
HIGHThreat Intel

PurpleBravo Exploits Job Offers to Target Software Supply Chains

PurpleBravo, a North Korean cyber group, is using fake job offers to target software supply chains. This tactic threatens the security of applications and services we rely on daily. Stay informed and protect your data from potential breaches.

Recorded Future Blog·Just now·2m