Key Takeaway
Scattered Lapsus ShinyHunters (SLSH) employs phishing and MFA bypass to steal data, then uses harassment, swatting, and media manipulation to extort victims. Experts advise against paying ransom due to the gang's unreliable and aggressive behavior.
The ransomware group known as Scattered Lapsus ShinyHunters (SLSH) employs an aggressive and unorthodox extortion strategy that goes beyond traditional data ransom tactics. Unlike Russia-based ransomware affiliates with disciplined operational models, SLSH is a volatile English-language gang that uses harassment, swatting, and media manipulation to coerce victims into paying.
SLSH targets companies primarily through social engineering. According to Mandiant's January 30, 2026 analysis, SLSH initiates attacks by impersonating IT staff and calling employees to update MFA settings. This phishing technique directs victims to credential-harvesting sites where attackers capture SSO credentials and MFA codes, subsequently registering their own device for MFA access.
Once inside, SLSH steals sensitive internal data and immediately escalates pressure on victims. The group broadcasts threats and stolen data samples via ephemeral Telegram channels, notifying journalists and regulators to amplify public exposure. Victims experience coordinated harassment campaigns including distributed denial-of-service (DDoS) attacks, flooding email inboxes, and direct threats against executives and their families.
Allison Nixon, director of research at Unit 221B, details that SLSH's harassment extends to "swatting"—phony emergency calls reporting bomb threats or hostage situations at executives’ addresses, prompting armed police responses. This psychological warfare aims to overwhelm victims into payment through fear and reputational damage.
SLSH does not follow the traditional ransomware model of encrypting files with promises to decrypt after ransom payment. Instead, their extortion resembles violent sextortion schemes: they steal damaging data and threaten to release it unless paid, without any reliable guarantee that stolen data will be deleted.
Unit 221B’s research characterizes SLSH as a faction of The Com, a loosely connected network of cybercriminals operating across Discord and Telegram. This group is marked by internal conflicts, betrayals, and erratic behavior, which reduces their operational reliability. Nixon warns that engaging with SLSH beyond a firm refusal to pay only encourages intensified harassment and repeated attacks.
Victims reportedly face ransom demands both to prevent data disclosure and to halt escalating personal attacks. However, due to SLSH's fractious nature and lack of consistent behavior, payments do not guarantee cessation of threats or data deletion.
Defensive recommendations include:
- Enhancing employee awareness of MFA phishing via phone calls and verifying all IT-related requests independently.
- Deploying multi-factor authentication mechanisms resistant to credential harvesting, such as hardware tokens.
- Monitoring for unauthorized MFA device registrations and anomalous access patterns.
- Establishing incident response plans that incorporate psychological and physical threat assessments.
- Coordinating with law enforcement regarding swatting risks and ensuring rapid verification of emergency calls.
- Avoiding negotiation or payment demands to SLSH to prevent further harassment.
Security teams should prioritize these measures to mitigate the unique threats posed by SLSH’s aggressive extortion tactics.
Original Source
Krebs on Security