Cybersecurity News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityNewsSLH Offers $500–$1,000 Per Call to Recruit Women for IT Help Desk Vishing Attacks
SLH Offers $500–$1,000 Per Call to Recruit Women for IT Help Desk Vishing Attacks
CybersecurityEnterpriseDefense

SLH Offers $500–$1,000 Per Call to Recruit Women for IT Help Desk Vishing Attacks

•February 25, 2026
0
The Hacker News
The Hacker News•Feb 25, 2026

Why It Matters

Targeting help‑desk operators with gender‑tailored vishing increases breach success rates, exposing critical corporate data and amplifying ransomware risk. The tactic forces organizations to rethink social‑engineering defenses and MFA strategies.

Key Takeaways

  • •SLH pays $500‑$1,000 per vishing call.
  • •Women recruited to exploit help‑desk voice bias.
  • •Attacks bypass MFA via social engineering.
  • •Use of legitimate proxies and tunneling tools.
  • •Organizations urged to train staff and harden MFA.

Pulse Analysis

The emergence of gender‑focused recruitment by cybercrime groups marks a nuanced evolution in social engineering. By offering lucrative upfront payments, SLH taps into a demographic that can more convincingly mimic typical help‑desk interactions, exploiting subconscious biases among support staff. This approach underscores how threat actors continuously refine their human‑targeting techniques, moving beyond generic phishing to tailored voice assaults that blend technical proficiency with psychological insight.

Technically, the vishing operations are supported by a suite of legitimate services—residential proxy networks like Luminati, tunneling platforms such as Ngrok, and free file‑sharing sites—to mask malicious traffic and maintain persistence. Once a help‑desk operator is deceived, attackers obtain privileged credentials, often sidestepping multi‑factor authentication through prompt bombing or SIM swapping. The foothold enables lateral movement across Azure environments via the Graph API, privilege escalation, and exfiltration of high‑value assets like Outlook mailboxes and Snowflake databases, sometimes culminating in ransomware payloads.

For enterprises, the immediate response must combine heightened user awareness with robust technical controls. Training programs should incorporate voice‑phishing simulations that feature diverse accents and gender profiles, while verification protocols need to require multi‑factor methods that are resistant to social manipulation, such as hardware tokens. Continuous monitoring of anomalous account creation and privilege changes, coupled with strict logging of help‑desk interactions, can surface suspicious activity early. As threat actors like SLH refine their playbooks, organizations that adopt a layered defense—combining people, process, and technology—will be better positioned to thwart these sophisticated vishing campaigns.

SLH Offers $500–$1,000 Per Call to Recruit Women for IT Help Desk Vishing Attacks

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...