A highly disruptive and volatile data extortion gang, self-identified as Scattered Lapsus ShinyHunters (SLSH), employs a particularly insidious playbook to extract ransom from victim organizations. This playbook goes far beyond traditional data theft and ransom demands, escalating to direct harassment, intimidation, and even "swatting" incidents targeting executives and their families. Simultaneously, SLSH actively disseminates information about the extent of their breaches to journalists and regulatory bodies, creating a public relations nightmare for their targets. Reports indicate that some victim firms are succumbing to these demands, possibly driven by a dual motivation to contain the exposure of stolen data and to halt the escalating personal attacks. However, a prominent expert on the group, Allison Nixon, director of research at Unit 221B, strongly advises against any engagement beyond a firm "we are not paying" stance. Nixon emphasizes that any form of negotiation or appeasement only serves to embolden the group and fuel further harassment. Furthermore, she highlights SLSH’s fractured and unreliable history, suggesting that the only truly effective strategy against them is outright refusal to pay.

Unlike the highly structured and disciplined Russian-based ransomware affiliate groups that have dominated the cybercrime landscape, SLSH presents as an unruly and loosely affiliated collective. Operating primarily in English, they appear to lack any interest in cultivating a reputation for consistent behavior, which would typically foster a degree of trust in the criminal underworld regarding the adherence to ransom agreements. This assessment comes from Allison Nixon, whose extensive research has involved tracking the group’s movements across various Telegram channels used for extortion and harassment. Nixon points out that SLSH diverges significantly from traditional data ransom groups in several key aspects that undermine any rationale for trusting their promises, such as the purported destruction of stolen data.

While many established Russian ransomware operations have historically utilized high-pressure tactics to coerce payment in exchange for decryption keys or assurances of data deletion, SLSH’s methods are markedly more aggressive and far-reaching. These traditional tactics might include publishing victim data on dark web shaming blogs with countdown timers or notifying company journalists and board members. However, Nixon explains that SLSH’s extortion campaigns swiftly escalate beyond these measures. They resort to direct threats of physical violence against executives and their families, launch Distributed Denial of Service (DDoS) attacks against victim websites, and engage in relentless email-flooding campaigns.

SLSH’s initial point of entry into victim networks is typically achieved through sophisticated phishing operations. They often target employees via phone calls, impersonating IT support staff. The purloined access is then leveraged to exfiltrate sensitive internal data. A January 30th blog post by Google’s Mandiant detailed recent SLSH extortion attacks, stemming from incidents in early to mid-January 2026. In these attacks, SLSH operatives posed as IT personnel, contacting employees of targeted organizations and falsely claiming that the company was updating its Multi-Factor Authentication (MFA) settings. The attackers then guided employees to fake, victim-branded credential harvesting sites to capture their Single Sign-On (SSO) credentials and MFA codes, subsequently registering their own devices for MFA to gain persistent access.

Victims often become aware of a breach not through technical alerts, but when their company’s name is publicly exposed on ephemeral Telegram channels that SLSH uses to threaten, extort, and harass their targets. According to Nixon, this coordinated harassment, disseminated across SLSH’s Telegram channels, is a calculated strategy designed to overwhelm the victim organization. By manufacturing public humiliation, they aim to push companies past their breaking point and compel them to pay.

Nixon has documented instances where executives from targeted organizations have become victims of "swatting" attacks. This involves SLSH fabricating a bomb threat or hostage situation at the target’s residence or place of work, with the intent of provoking a heavily armed police response. "A significant component of their strategy towards victims is the psychological aspect," Nixon stated in an interview with KrebsOnSecurity. "This includes harassing executives’ children and threatening company boards. Simultaneously, while victims are receiving extortion demands, they are also being contacted by media outlets seeking comments on the impending negative press."

Please Don’t Feed the Scattered Lapsus ShinyHunters

A recent blog post by Unit 221B, titled "Don’t Read This Blog: Harassment Scare Tactics, Why Victims Should Never Pay ShinyHunters," argues vehemently against any negotiation with SLSH. The group has repeatedly demonstrated a willingness to extort victims based on promises they have no intention of keeping. Nixon attributes the known members of SLSH to "The Com," a loose network of Discord and Telegram communities dedicated to cybercrime, which functions as a decentralized social network facilitating rapid collaboration.

Nixon observes that extortion groups originating from "The Com" often foster internal feuds and drama, leading to a climate of deception, betrayal, credibility destruction, backstabbing, and sabotage. "With this ongoing dysfunction, often exacerbated by substance abuse, these threat actors are frequently unable to focus on the core objective of executing a successful, strategic ransom operation," Nixon wrote. "They continually lose control through outbursts that jeopardize their strategy and operational security, severely limiting their ability to build a professional, scalable, and sophisticated criminal organization capable of sustained successful ransoms – unlike more established and professional criminal organizations focused solely on ransomware."

In contrast to intrusions from established ransomware groups, which typically involve encryption/decryption malware primarily confined to the affected machine, Nixon explains that ransom demands from "Com" groups often mirror the tactics of violent sextortion schemes targeting minors. Members of "The Com" steal damaging information, threaten its release, and then "promise" to delete it if the victim complies, without providing any guarantee or technical proof of their compliance.

A crucial element of SLSH’s strategy to coerce victims into paying, according to Nixon, involves manipulating the media to amplify the perceived threat posed by the group. This approach also borrows from the playbook of sextortion attacks, where predators aim to keep targets continuously engaged and worried about the repercussions of non-compliance. "On days when SLSH lacked substantial criminal ‘wins’ to announce, they focused on announcing death threats and harassment to keep law enforcement, journalists, and cybercrime industry professionals fixated on this group," she noted.

Nixon herself has been a target of SLSH’s threats for several months, with their Telegram channels frequently featuring threats of physical violence against her, this publication, and other security researchers. While these threats are primarily a tactic to generate media attention and establish a veneer of credibility, they serve as valuable indicators of compromise. SLSH members often mention and malign security researchers, even in their communications with victims. Unit 221B’s advisory warns: "Watch for the following behaviors in their communications to you or their public statements: Repeated abusive mentions of Allison Nixon (or ‘A.N.’), Unit 221B, or cybersecurity journalists—especially Brian Krebs—or any other cybersecurity employee, or cybersecurity company. Any threats to kill, or commit terrorism, or violence against internal employees, cybersecurity employees, investigators, and journalists."

Unit 221B asserts that while the pressure campaign during an extortion attempt can be deeply traumatizing for employees, executives, and their family members, engaging in prolonged negotiations with SLSH only incentivizes the group to escalate the level of harm and risk. This escalation can extend to the physical safety of employees and their families. "The breached data will never revert to its original state, but we can assure you that the harassment will cease," Nixon concluded. "Therefore, your decision to pay should be a separate consideration from the harassment. We believe that by separating these issues, you will objectively recognize that the most prudent course of action to safeguard your interests, both in the short and long term, is to refuse payment."