Cyber Syndicates Merge: SLH Emerges as New Ransomware Powerhouse

Notorious cybercrime groups Scattered Spider, Lapsus$, and ShinyHunters have merged into SLH, forming a powerful extortion network targeting cloud firms and beyond. This alliance blends digital hacks with physical crimes like cargo theft, posing unprecedented threats to global supply chains and critical infrastructure.
Cyber Syndicates Merge: SLH Emerges as New Ransomware Powerhouse
Written by Ava Callegari

In the shadowy underbelly of the digital world, a formidable alliance is taking shape. Three notorious cybercrime groups—Scattered Spider, Lapsus$, and ShinyHunters—have reportedly merged into a single entity known as Scattered Lapsus$ Hunters (SLH). This federation, operating under an ‘Extortion-as-a-Service’ model, is poised to amplify threats to organizations worldwide, according to recent analyses.

Security researchers at Trustwave have detailed this merger in a new report, highlighting how SLH leverages Telegram for extortion, data leaks, and public taunts. The group primarily targets cloud and SaaS firms, with most operators traced back to ShinyHunters, as per TechRadar.

The Genesis of a Super-Group

Scattered Spider, known for high-profile breaches like the MGM Resorts attack, brings sophisticated social engineering tactics to the table. Lapsus$, infamous for infiltrating companies such as Microsoft and Nvidia, adds a layer of brazen, youthful hacking prowess. ShinyHunters, with its history of massive data thefts from firms like AT&T, contributes expertise in database exploitation.

This union isn’t entirely new; whispers of collaboration surfaced months ago. But Trustwave’s research, published recently, confirms the formalization of SLH as a ‘federated cybercriminal brand.’ The group’s structure allows for shared resources, making attacks more efficient and harder to trace.

Extortion Tactics Evolve

SLH’s operations center on Telegram channels where they post stolen data, demand ransoms, and mock victims. This public-facing approach heightens pressure on targets, as seen in their rapid data exfiltration methods that complicate victim notification, according to posts found on X from cybersecurity accounts like threatlight.

Beyond digital extortion, emerging trends show cyber gangs partnering with physical organized crime. A report from Cybersecurity Dive reveals hackers abusing remote monitoring tools to infiltrate trucking firms, enabling cargo thefts that blend cyber and physical crimes.

Blurring Digital and Physical Boundaries

Proofpoint’s warnings detail how financially motivated actors pose as brokers or carriers, deploying malware to reroute shipments. This intersection of cybercrime and organized theft could cost billions, as highlighted in a TechRadar article on hackers teaming up with crime rings for supply chain heists.

Recent incidents underscore the scale: Hackers infiltrate freight companies’ systems, steal credentials, and divert high-value cargo like electronics or pharmaceuticals. Organized crime groups then execute the physical theft, reselling goods on black markets, per findings from The Star.

Ransomware Rings Coordinate

SLH’s formation mirrors broader trends in ransomware collaboration. A SECURITY.COM piece advises defenders on combating coordinated rings, noting how groups share tools and intelligence to evade detection.

Europol has observed overlaps between traditional mobsters and cyber gangs, with AI wielded for advanced scams, as reported in The Register. This convergence amplifies threats, from data breaches to infrastructure sabotage.

High-Profile Precedents and Players

Notable figures in these gangs include alleged members like those sanctioned by the UK’s FCO for Conti and Ryuk operations, which hacked 149 British organizations, according to X posts referencing BBC News correspondent Joe Tidy.

The FBI has issued advisories on groups like Play ransomware, detailing tactics and indicators of compromise in joint reports with CISA, as shared on X by the official FBI account. Such collaborations highlight the international scope of these threats.

Defensive Strategies for Enterprises

Industry insiders recommend multi-layered defenses: Enhanced monitoring of cloud environments, rigorous access controls, and rapid incident response. Trustwave emphasizes the need for strategies against SLH’s quick data theft, which outpaces traditional notification processes.

For cargo theft, Proofpoint suggests vetting partners thoroughly and securing remote access tools. As Tom’s Hardware notes, phishing and social engineering remain key entry points, demanding ongoing employee training.

Global Implications and Future Outlook

The rise of SLH and similar alliances signals a shift toward more resilient cybercrime ecosystems. With operations spanning continents, law enforcement faces challenges in attribution and takedowns, as evidenced by past efforts against groups like Cl0p, profiled in Vice by journalist Lorenzo Franceschi-Bicchierai on X.

Experts predict increased attacks on critical sectors. A Jam Cyber blog lists the top 10 cybercrime gangs of 2025, underscoring the evolving landscape where mergers like SLH could dominate.

Navigating the Threat Landscape

Organizations must invest in threat intelligence sharing. Platforms like The Record provide ongoing cybercrime updates, helping track emerging alliances, as seen in their coverage at The Record.

Ultimately, this federation exemplifies how cybercrime is professionalizing, blending digital prowess with real-world criminality. Vigilance and collaboration will be key to mitigating these escalating risks.

Subscribe for Updates

CybersecurityUpdate Newsletter

The CybersecurityUpdate Email Newsletter is your essential source for the latest in cybersecurity news, threat intelligence, and risk management strategies. Perfect for IT security professionals and business leaders focused on protecting their organizations.

By signing up for our newsletter you agree to receive content related to ientry.com / webpronews.com and our affiliate partners. For additional information refer to our terms of service.

Notice an error?

Help us improve our content by reporting any issues you find.

Get the WebProNews newsletter delivered to your inbox

Get the free daily newsletter read by decision makers

Subscribe
Advertise with Us

Ready to get started?

Get our media kit

Advertise with Us