Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

429+ Articles
114+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. News
  3. Scattered Lapsus$ ShinyHunters Alliance Hits 100+
Scattered Lapsus$ ShinyHunters Alliance Hits 100+
NEWS

Scattered Lapsus$ ShinyHunters Alliance Hits 100+

The SLSH alliance combining Scattered Spider, Lapsus$, and ShinyHunters has attacked over 100 organizations since the start of 2026, breaching 60 million...

Dylan H.

News Desk

February 17, 2026
5 min read

SLSH Alliance Emerges as 2026's Most Prolific Threat Actor Coalition

A formidable threat actor coalition known as the SLSH alliance — combining members of Scattered Spider, Lapsus$, and ShinyHunters — has attacked 100+ organizations since the start of 2026, breaching an estimated 60 million records across industries ranging from technology and healthcare to retail and energy.

The alliance represents a convergence of three of the most notorious cybercriminal groups of the past three years, pooling their social engineering expertise, infrastructure, and stolen credential databases into a unified operation of unprecedented scale.


Attack Methodology

Phone Phishing (Vishing) as Primary Vector

The SLSH alliance's signature technique is phone-based phishing (vishing), where operatives call employees directly, posing as internal IT staff or help desk personnel.

The Attack Chain

1. Reconnaissance    — Scrape LinkedIn, corporate directories for employee names/roles
2. Vishing Call      — Call target posing as IT support, referencing internal systems
3. Credential Theft  — Harvest SSO credentials (Microsoft Entra, Okta, Google Workspace)
4. MFA Bypass        — Socially engineer MFA codes or exploit MFA fatigue
5. Access & Pivot    — Use SSO trust to access connected SaaS and cloud systems
6. Data Exfiltration — Extract customer databases, source code, internal documents
7. Extortion         — Demand ransom or publish stolen data

Why Vishing Works

FactorDetail
UrgencyCallers claim "urgent security incident" requiring immediate action
AuthorityPose as IT department, reference real internal tools and ticket numbers
PreparationUse stolen org charts and Slack/Teams context to appear legitimate
MFA BypassAsk victims to read back MFA codes or approve push notifications
TrustPhone calls feel more personal and trustworthy than emails

Known Targets

The SLSH alliance has targeted organizations across multiple sectors. Below is a selection of confirmed and reported targets from public disclosures and security researchers:

OrganizationSectorStatus
AtlassianTechnologyConfirmed breach
AdyenFinancial ServicesConfirmed breach
CanvaTechnologyConfirmed breach
Epic GamesGamingConfirmed breach
HubSpotTechnologyConfirmed breach
ModernaHealthcare / PharmaConfirmed breach
ZoomInfoTechnologyConfirmed breach
GameStopRetailConfirmed breach
WeWorkReal EstateConfirmed breach
HalliburtonEnergyConfirmed breach
SonosConsumer ElectronicsConfirmed breach
TelstraTelecommunicationsConfirmed breach
Panera BreadFood / RetailConfirmed breach

This list represents only publicly known targets. Researchers at Push Security estimate the true number exceeds 100 organizations across at least 15 countries.


Intimidation and Physical Threats

Beyond digital attacks, the SLSH alliance has escalated to real-world intimidation tactics that distinguish it from traditional cybercriminal groups:

  • Swatting executives — Filing false emergency reports to send armed police to executives' homes
  • Threatening families — Contacting family members of targeted employees via phone and social media
  • Doxxing — Publishing personal information of security staff who resist cooperation
  • Physical surveillance threats — Referencing home addresses during vishing calls to intimidate targets

These tactics create enormous psychological pressure on victims and significantly increase the likelihood of compliance.


Group Profile

AttributeDetails
Alliance NameSLSH (Scattered Spider / Lapsus$ / ShinyHunters)
Active SinceLate 2025 (formal coalition), individual groups active since 2020-2022
Primary TacticVishing and social engineering
Estimated MembersDozens of operatives across multiple countries
MotivationFinancial (extortion, data sales)
CommunicationTelegram, Discord, encrypted channels
Records Breached (2026)60+ million
Organizations Hit (2026)100+

Defense Recommendations

Immediate Actions

  1. Train employees on vishing attacks — IT staff will never call and ask for passwords or MFA codes over the phone
  2. Implement phishing-resistant MFA — Deploy hardware security keys (FIDO2/WebAuthn) instead of SMS or push-based MFA
  3. Establish verbal verification protocols — Require callback procedures using known phone numbers for any credential or access requests
  4. Monitor SSO logs aggressively — Flag unusual login locations, times, or device fingerprints on Entra, Okta, and Google Workspace

Strategic Measures

  • Reduce SSO blast radius — Implement conditional access policies and session controls to limit what a single set of credentials can access
  • Deploy SaaS security posture management (SSPM) — Monitor for unauthorized OAuth app grants and excessive permissions
  • Conduct red team vishing exercises — Test organizational resilience against phone-based social engineering
  • Implement out-of-band identity verification — Use a secondary channel (e.g., Slack DM to a verified account) to confirm any sensitive request received by phone

Sources

  • Krebs on Security — SLSH Alliance Hits 100+ Orgs in 2026
  • Push Security — The Rise of the SLSH Alliance

Related Reading

  • Fintech Giant Figure Technology Confirms Breach: Nearly 1
  • ShinyHunters Dumps 5.1 Million Panera Bread Customer
  • ShinyHunters Dumps Harvard and UPenn Data After Ransom
#Threat Actors#ShinyHunters#Scattered Spider#Lapsus$#Social Engineering

Related Articles

Fintech Giant Figure Technology Confirms Breach: Nearly 1

Blockchain-based lending platform Figure Technology Solutions confirms a data breach affecting nearly 1 million customers after ShinyHunters exploited an...

5 min read

Telus Digital Confirms Massive Breach After ShinyHunters

Canadian telecom giant Telus Digital has confirmed a security incident after the ShinyHunters hacking group claimed to have stolen nearly 1 petabyte of...

5 min read

ShinyHunters Claims Mass Data Theft From 400 Firms via

Cybercrime group ShinyHunters claims to have exploited misconfigured Salesforce Experience Cloud instances to steal CRM data from approximately 400...

6 min read
Back to all News