Daniel GloverIT helpdesks are the top target for social engineering attacks. Learn how threat groups exploit your support teams and practical defences to stop them.
Your IT helpdesk is the front door to your entire organisation. And right now, sophisticated threat groups are knocking.
Social engineering attacks targeting IT helpdesks have surged over the past two years. Groups like Scattered Spider and SLSH (Scattered Lapsus$ Hunters) have refined their tactics to the point where a single phone call to your service desk can lead to a full network compromise. In February 2026, SLSH was caught actively recruiting people with specific voice profiles to improve their success rate against helpdesk staff, offering up to $1,000 per successful call.
This is not theoretical. The MGM Resorts breach in 2023, which cost the company over $100 million, started with a social engineering call to the IT helpdesk. The attacker impersonated an employee, convinced the helpdesk analyst to reset their MFA, and within hours had access to critical systems.
If your helpdesk verification process relies on "What is your employee ID?" and "What department are you in?", you are already compromised. You just do not know it yet.
IT helpdesks exist to help people. That is both their purpose and their vulnerability. Helpdesk analysts are trained to resolve issues quickly, measured on ticket resolution times, and culturally conditioned to be helpful. Attackers exploit every one of these traits.
A caller who has done basic reconnaissance on LinkedIn, corporate websites, and data breach dumps can sound convincingly like an employee. They know names, job titles, reporting lines, and sometimes even internal project names. The helpdesk analyst, meanwhile, is handling dozens of calls per day and has no reliable way to verify the caller is who they claim to be.
This asymmetry is the core of the problem. The attacker needs to know just enough to sound credible. The analyst needs absolute certainty to refuse help, but the culture punishes them for being difficult.
The most common social engineering attack against helpdesks targets multi-factor authentication resets. The attacker calls claiming they have lost access to their MFA device, asks for a temporary bypass or reset, and uses that window to establish persistent access.
This attack works because MFA resets are routine. Helpdesks process them daily. There is no alarm bell that rings when the fifteenth MFA reset request of the day comes in, even though one of those fifteen might be an attacker.
Traditional vishing relied on confidence and aggression. Modern vishing is far more sophisticated. Threat groups now use:
The SLSH recruitment drive in February 2026 specifically sought female voices, likely because their existing caller pool did not match the demographic profile helpdesk staff expected from certain roles. This level of tactical refinement shows how seriously these groups treat social engineering as a discipline.
Understanding how these attacks unfold helps you build defences that address each stage.
The attacker gathers information about the target organisation. Sources include LinkedIn profiles, corporate websites, press releases, job postings, social media, and data from previous breaches. They identify a specific employee to impersonate, ideally someone who would plausibly call the helpdesk.
The attacker builds a believable story. Common pretexts include:
The urgency is deliberate. It pressures the analyst to skip verification steps.
The attacker calls the helpdesk, delivers their pretext, and provides enough identifying information to satisfy basic verification. They may know the employee's ID number, manager's name, and recent projects. If challenged, they escalate emotionally or invoke authority ("My director needs this done now").
Once the helpdesk resets the credential or MFA, the attacker logs in, enrolls their own MFA device, and begins lateral movement. The entire process from initial call to persistent access can take under thirty minutes.
I have implemented helpdesk security improvements across multiple organisations. The following strategies are practical, tested, and effective.
Knowledge-based verification ("What is your employee ID?") is broken. Attackers can find or buy this information. Replace it with verification methods that are resistant to social engineering:
The key principle is that verification should rely on something the attacker cannot obtain through research alone.
Not every helpdesk request carries the same risk. Create tiers:
| Risk Level | Actions | Verification Required |
|---|---|---|
| Low | Password unlock, general queries | Standard identity check |
| Medium | Password reset, software installation | Two-factor verification (e.g. callback plus identity check) |
| High | MFA reset, admin access, VPN credential changes | Video verification or in-person confirmation |
| Critical | Privileged account changes, security tool modifications | Manager approval plus security team sign-off |
This approach means your helpdesk is not applying the same friction to a printer query as to an MFA reset.
Generic security awareness training is not enough. Your helpdesk team needs specific social engineering training that covers:
This last point is critical. If your helpdesk analysts fear negative feedback for being "unhelpful", they will prioritise speed over security every time. Leadership must make it clear that proper verification is not optional, and that no one, regardless of seniority, is exempt.
Technical controls complement procedural defences:
You test your network with penetration tests. You should test your helpdesk with social engineering assessments. Engage a reputable firm to call your helpdesk using realistic pretexts and measure:
Use the results constructively, not punitively. The goal is continuous improvement, not blame.
For organisations building a formal programme, I recommend structuring your approach around three pillars:
A registered device, hardware token, or smart card that the attacker cannot replicate remotely. This is your strongest verification factor for remote interactions.
Move away from static information like employee IDs. Consider dynamic verification such as details from the employee's most recent IT ticket, or a one-time verification code sent to their registered email.
Video verification, voice biometrics, or in-person confirmation. These are the hardest for attackers to defeat, though AI voice cloning means voice alone is no longer sufficient.
A robust verification framework combines at least two of these pillars for any high-risk request. This aligns directly with an identity-first security strategy where identity verification becomes the primary control plane.
A single vishing call to the helpdesk led to an MFA reset, which gave Scattered Spider access to the Okta environment. From there, they compromised the entire network. The total cost exceeded $100 million. The fix? MGM subsequently implemented video verification for all MFA resets.
Similar tactics, same threat group. Caesars paid a $15 million ransom. Both attacks demonstrated that even large enterprises with significant security budgets were vulnerable at the helpdesk layer.
Attackers used SMS phishing combined with voice calls to helpdesk staff. Coinbase's security team detected the attack because an analyst flagged the interaction as suspicious. The difference was training and a culture that rewarded caution.
These cases reinforce a core principle of building a cybersecurity culture: technical controls fail without the human layer, and the human layer fails without leadership support.
If you cannot overhaul your helpdesk verification overnight, start with these:
These steps cost nothing but time, and they close the most exploited gaps immediately.
Social engineering attacks on IT helpdesks are not going away. As organisations strengthen their technical defences, attackers will increasingly target the human layer. AI voice cloning, deepfake video, and crowdsourced social engineering will make these attacks harder to detect.
The organisations that defend successfully will be those that treat helpdesk security as a core part of their zero trust architecture, not an afterthought. In a zero trust model, every access request is verified regardless of source. Your helpdesk should operate on the same principle: every caller is untrusted until proven otherwise.
Invest in your people. Give them the training, tools, and institutional backing to challenge suspicious requests. Because the next call to your helpdesk might not be from an employee at all.