Threat IntelHIGH

Vishing Attacks: Scattered LAPSUS$ Hunters Recruit Women for Cash

THThe Hacker News20h ago2 min read
Scattered LAPSUS$ Huntersvishingsocial engineeringcybercrime
🎯

Basically, a cybercrime group is paying women to trick IT help desks over the phone.

Quick Summary

Scattered LAPSUS$ Hunters are recruiting women for voice phishing attacks, offering $500-$1,000 per call. This poses a serious risk to your personal and professional data. Stay vigilant and report any suspicious calls to protect yourself.

What Happened

Cybercrime? is evolving, and the latest twist involves a notorious group called Scattered LAPSUS$ Hunters (SLH). This collective has been spotted recruiting women to conduct voice phishing, or vishing?, attacks. These attacks specifically target IT help desk?s, aiming to exploit vulnerabilities in organizations' security systems.

The group is reportedly offering between $500 and $1,000 for each successful call. This financial incentive is designed to lure individuals into participating in these deceptive schemes. As organizations increasingly rely on remote work and digital communication, the risk of falling victim to such attacks rises dramatically.

Why Should You Care

If you use a phone to manage your work or personal accounts, this news is crucial. Imagine receiving a call from someone who sounds legitimate, asking for sensitive information. That's exactly what these vishing? attacks aim to achieve. They can lead to unauthorized access to your accounts and sensitive data.

This isn't just a problem for big companies; it can affect anyone. Your personal information, bank accounts, and even your job could be at risk. Protecting yourself means being aware of these tactics and knowing how to respond if you receive a suspicious call.

What's Being Done

In response to this alarming trend, cybersecurity experts and organizations are on high alert. They are working to develop better training and awareness programs to help employees recognize and avoid vishing? attempts. Here’s what you can do right now:

  • Be cautious when receiving calls asking for sensitive information.
  • Verify the identity of the caller before providing any details.
  • Report suspicious calls to your IT department or local authorities.

Experts are closely monitoring the situation, especially how SLH's tactics evolve and whether other groups will adopt similar recruitment strategies. Staying informed is key to staying safe.

💡 Tap dotted terms for explanations

🔒 Pro insight: The recruitment strategy reflects a shift in social engineering tactics, leveraging personal connections to enhance trust and deception.

Original article from

The Hacker News

Read Full Article

Related Pings

MEDIUMThreat Intel

AI Risks: Cyber Defenders Share Their Insights

Trend Micro's latest survey reveals how cybersecurity experts view AI risks. As technology evolves, so do the strategies to protect your data. Understanding these insights can help you feel more secure in your online activities.

Trend Micro Research·28m ago·2m
HIGHThreat Intel

Critical OT Attacks Loom as State Hackers Shift Tactics

State-affiliated hackers are shifting focus to disrupt industrial systems, posing a serious risk to essential services. With fewer than 10% of OT networks able to detect these threats, the potential for chaos is high. Experts urge immediate action to enhance monitoring and patch vulnerabilities.

CSO Online·28m ago·3m
HIGHThreat Intel

Telemetry Flaws: The Single-Source Detection Dilemma

Many organizations are missing critical threats by relying on a single source of telemetry data. This oversight can leave your systems vulnerable. It's time to diversify your data sources and strengthen your security posture.

TrustedSec Blog·28m ago·2m
MEDIUMThreat Intel

Autonomous Threat Operations: Simplifying Threat Hunting to 5 Steps

Recorded Future has revolutionized threat hunting by cutting the process from 27 steps to just 5. This change impacts organizations looking to enhance their cybersecurity. Faster detection means better protection for your data and privacy. Experts are monitoring the rollout closely.

Recorded Future Blog·28m ago·2m
MEDIUMThreat Intel

Cyber Risk Management: Executive Buy-In is Crucial

The 2025 Trend Micro Defenders Survey Report reveals the need for executive support in managing cyber risks. This gap can leave your personal data vulnerable. Organizations are encouraged to engage executives in cybersecurity discussions and allocate necessary resources.

Trend Micro Research·29m ago·2m
HIGHThreat Intel

Iranian Cyber Threat Actor Strikes Iraqi Government with AI Tactics

An Iranian cyber threat actor is targeting Iraq’s Ministry of Foreign Affairs. This attack could compromise sensitive data and impact national security. Experts recommend stronger security measures to protect against such threats.

Infosecurity Magazine·29m ago·2m