Back to Intelligence

Inside the SLH Recruitment Drive: Weaponizing Voice Phishing Against IT Help Desks

SA
Security Arsenal Team
February 25, 2026
5 min read

Introduction

Cybercrime syndicates are increasingly professionalizing their operations, mirroring legitimate corporate structures to maximize efficiency and profit. A stark example of this evolution comes from the notorious group known as Scattered LAPSUS$ Hunters (SLH). Recent intelligence reveals that SLH is not just writing malware; they are headhunting. The group is actively recruiting women to conduct voice phishing (vishing) campaigns against IT help desks, offering payouts of $500 to $1,000 per successful call. This shift highlights a dangerous trend: attackers are bypassing technical defenses by weaponizing human psychology and trust.

Deep-Dive Analysis: The "Trust" Exploit

The Tactic: Incentivized Insider Recruitment

Unlike traditional spray-and-pray phishing campaigns, this operation relies on targeted social engineering. By offering significant financial incentives ($500–$1,000 per call), SLH attracts actors who can convincingly portray distressed employees. The goal is simple but effective: manipulate IT help desk personnel into performing sensitive actions, such as password resets, MFA bypasses, or granting access to privileged accounts.

The Vector: IT Help Desks

The IT help desk is often the "soft underbelly" of an organization's security posture. Support agents are trained to be helpful and to resolve issues quickly. This culture of assistance, combined with high-pressure environments, creates a fertile ground for social engineers. Attackers use scripts involving urgency, intimidation, or pleading to rush agents into bypassing standard verification protocols.

The Psychology: Gender and Trust

SLH’s specific recruitment of women for these attacks is a calculated psychological maneuver. Research suggests that in high-stress or service-oriented interactions, female voices are often subconsciously perceived as more trustworthy and less threatening than male voices. By leveraging this bias, attackers aim to lower the cognitive defenses of the help desk analyst, making the request for a password reset seem legitimate and benign.

The Economics of Vishing

A payout of $1,000 is negligible compared to the potential return on investment (ROI) for a cybercriminal group. A single successful vishing call that results in a compromised administrator account can lead to a ransomware deployment or a massive data breach, netting millions in ransom or data sales. From the attacker's perspective, paying a "user" to make a call is a high-yield, low-risk investment compared to developing a zero-day exploit.

Executive Takeaways

  • Cybercrime is Service-Oriented: Threat groups are now functioning as marketplaces, paying commissions for specific tasks (vishing, ID verification bypassing) rather than doing it all themselves.
  • The Human Perimeter is Critical: Technical controls like firewalls and EDR are less effective against attacks that target human empathy and helpfulness.
  • Trust is a Vulnerability: Attackers are weaponizing social biases. Security policies must be agnostic to the perceived "trustworthiness" of a caller.

Detection & Threat Hunting

Defending against vishing requires monitoring for the aftermath of a successful attack—specifically, identity manipulation. SOC teams should hunt for spikes in administrative password resets or MFA changes that occur outside of normal business hours or originate from unusual locations.

Below is a KQL query for Microsoft Sentinel to detect suspicious patterns in Azure Active Directory (Entra ID) audit logs, specifically targeting password resets performed by help desk administrators.

Script / Code
let TimeWindow = 1h;
let ResetThreshold = 5;
AuditLogs
| where OperationName has "Reset password" or OperationName has "Update user"
| where Result == "success"
| where InitiatedBy contains "Admin" or InitiatedBy contains "System"
| extend TargetUser = tostring(TargetResources[0].userPrincipalName)
| extend InitiatingUser = tostring(InitiatedBy.user.userPrincipalName)
| extend InitiatedByIP = tostring(InitiatedBy.user.ipAddress)
| project TimeGenerated, OperationName, TargetUser, InitiatingUser, InitiatedByIP
| summarize count() by InitiatingUser, InitiatedByIP, bin(TimeGenerated, TimeWindow)
| where count_ > ResetThreshold
| order by count_ desc

Additionally, you can use PowerShell to check for recent password reset events across your on-premises Active Directory environment, which might indicate a help desk compromise.

Script / Code
# Search AD for events with ID 4724 (An attempt was made to reset an account's password)
$Date = (Get-Date).AddDays(-1)
Get-WinEvent -FilterHashtable @{LogName='Security'; ID=4724; StartTime=$Date} -ErrorAction SilentlyContinue |
Select-Object TimeCreated, @{n='TargetUserName';e={$_.Properties[0].Value}}, @{n='SubjectUserName';e={$_.Properties[2].Value}} |
Format-Table -AutoSize

Mitigation Strategies

  1. Strict Identity Verification: Implement a "Zero Trust" policy for help desk interactions. Require verification that cannot be easily spoofed over a phone call, such as:

    • Manager approval via internal chat or email (from a verified internal account).
    • Multi-factor verification (e.g., SMS code to the user's mobile, though this has SIM-swap risks, it is better than nothing).
    • Callback to a registered number on file, not the number calling in.
  2. Scripting & SOPs: Provide IT staff with exact scripts to handle "emergency" requests. Empower them to say, "I cannot help you with this on this line; I will call you back on your registered mobile in 5 minutes." This breaks the urgency loop.

  3. Vishing Simulations: Conduct regular vishing campaigns against your own help desk team. Use these sessions to train employees on identifying stress markers, refusal to follow protocol, and manipulation tactics.

  4. Flagging High-Risk Accounts: Implement Identity Protection policies that trigger reviews if multiple password resets occur for privileged accounts in a short timeframe.

Related Resources

Security Arsenal Managed SOC Services AlertMonitor Platform Book a SOC Assessment soc-mdr Intel Hub

socmdrmanaged-socdetectionvishingsocial-engineeringlapsushelp-desk-security

Is your security operations ready?

Get a free SOC assessment or see how AlertMonitor cuts through alert noise with automated triage.