In the shadowy underbelly of the digital world, a formidable alliance is taking shape. Three notorious cybercrime groups—Scattered Spider, Lapsus$, and ShinyHunters—have reportedly merged into a single entity known as Scattered Lapsus$ Hunters (SLH). This federation, operating under an ‘Extortion-as-a-Service’ model, is poised to amplify threats to organizations worldwide, according to recent analyses.
Security researchers at Trustwave have detailed this merger in a new report, highlighting how SLH leverages Telegram for extortion, data leaks, and public taunts. The group primarily targets cloud and SaaS firms, with most operators traced back to ShinyHunters, as per TechRadar.
The Genesis of a Super-Group
Scattered Spider, known for high-profile breaches like the MGM Resorts attack, brings sophisticated social engineering tactics to the table. Lapsus$, infamous for infiltrating companies such as Microsoft and Nvidia, adds a layer of brazen, youthful hacking prowess. ShinyHunters, with its history of massive data thefts from firms like AT&T, contributes expertise in database exploitation.
This union isn’t entirely new; whispers of collaboration surfaced months ago. But Trustwave’s research, published recently, confirms the formalization of SLH as a ‘federated cybercriminal brand.’ The group’s structure allows for shared resources, making attacks more efficient and harder to trace.
Extortion Tactics Evolve
SLH’s operations center on Telegram channels where they post stolen data, demand ransoms, and mock victims. This public-facing approach heightens pressure on targets, as seen in their rapid data exfiltration methods that complicate victim notification, according to posts found on X from cybersecurity accounts like threatlight.
Beyond digital extortion, emerging trends show cyber gangs partnering with physical organized crime. A report from Cybersecurity Dive reveals hackers abusing remote monitoring tools to infiltrate trucking firms, enabling cargo thefts that blend cyber and physical crimes.
Blurring Digital and Physical Boundaries
Proofpoint’s warnings detail how financially motivated actors pose as brokers or carriers, deploying malware to reroute shipments. This intersection of cybercrime and organized theft could cost billions, as highlighted in a TechRadar article on hackers teaming up with crime rings for supply chain heists.
Recent incidents underscore the scale: Hackers infiltrate freight companies’ systems, steal credentials, and divert high-value cargo like electronics or pharmaceuticals. Organized crime groups then execute the physical theft, reselling goods on black markets, per findings from The Star.
Ransomware Rings Coordinate
SLH’s formation mirrors broader trends in ransomware collaboration. A SECURITY.COM piece advises defenders on combating coordinated rings, noting how groups share tools and intelligence to evade detection.
Europol has observed overlaps between traditional mobsters and cyber gangs, with AI wielded for advanced scams, as reported in The Register. This convergence amplifies threats, from data breaches to infrastructure sabotage.
High-Profile Precedents and Players
Notable figures in these gangs include alleged members like those sanctioned by the UK’s FCO for Conti and Ryuk operations, which hacked 149 British organizations, according to X posts referencing BBC News correspondent Joe Tidy.
The FBI has issued advisories on groups like Play ransomware, detailing tactics and indicators of compromise in joint reports with CISA, as shared on X by the official FBI account. Such collaborations highlight the international scope of these threats.
Defensive Strategies for Enterprises
Industry insiders recommend multi-layered defenses: Enhanced monitoring of cloud environments, rigorous access controls, and rapid incident response. Trustwave emphasizes the need for strategies against SLH’s quick data theft, which outpaces traditional notification processes.
For cargo theft, Proofpoint suggests vetting partners thoroughly and securing remote access tools. As Tom’s Hardware notes, phishing and social engineering remain key entry points, demanding ongoing employee training.
Global Implications and Future Outlook
The rise of SLH and similar alliances signals a shift toward more resilient cybercrime ecosystems. With operations spanning continents, law enforcement faces challenges in attribution and takedowns, as evidenced by past efforts against groups like Cl0p, profiled in Vice by journalist Lorenzo Franceschi-Bicchierai on X.
Experts predict increased attacks on critical sectors. A Jam Cyber blog lists the top 10 cybercrime gangs of 2025, underscoring the evolving landscape where mergers like SLH could dominate.
Navigating the Threat Landscape
Organizations must invest in threat intelligence sharing. Platforms like The Record provide ongoing cybercrime updates, helping track emerging alliances, as seen in their coverage at The Record.
Ultimately, this federation exemplifies how cybercrime is professionalizing, blending digital prowess with real-world criminality. Vigilance and collaboration will be key to mitigating these escalating risks.


WebProNews is an iEntry Publication