
The ShinyHunters extortion gang claims it’s behind a wave of ongoing voice phishing assaults concentrating on single sign-on (SSO) accounts at Okta, Microsoft, and Google, enabling risk actors to breach company SaaS platforms and steal firm information for extortion.
In these assaults, risk actors impersonate IT assist and name workers, tricking them into coming into their credentials and multi-factor authentication (MFA) codes on phishing websites that impersonate firm login portals.
As soon as compromised, the attackers acquire entry to the sufferer’s SSO account, which might present entry to different related enterprise purposes and providers.
SSO providers from Okta, Microsoft Entra, and Google allow corporations to hyperlink third-party purposes right into a single authentication circulation, giving workers entry to cloud providers, inside instruments, and enterprise platforms with a single login.
These SSO dashboards usually listing all related providers, making a compromised account a gateway into company programs and information.
Platforms generally related by means of SSO embody Salesforce, Microsoft 365, Google Workspace, Dropbox, Adobe, SAP, Slack, Zendesk, Atlassian, and plenty of others.

Supply: Microsoft
Vishing assaults used for information theft
As first reported by BleepingComputer, risk actors have been finishing up these assaults by calling workers and posing as IT workers, utilizing social engineering to persuade them to log into phishing pages and full MFA challenges in actual time.
After having access to a sufferer’s SSO account, the attackers browse the listing of related purposes and start harvesting information from the platforms obtainable to that person.
BleepingComputer is conscious of a number of corporations focused in these assaults which have since obtained extortion calls for signed by ShinyHunters, indicating that the group was behind the intrusions.
BleepingComputer contacted Okta earlier this week in regards to the breaches, however the firm declined to touch upon the information theft assaults.
Nonetheless, Okta launched a report yesterday describing the phishing kits utilized in these voice-based assaults, which match what BleepingComputer has been instructed.
Based on Okta, the phishing kits embody a web-based management panel that permits attackers to dynamically change what a sufferer sees on a phishing website whereas chatting with them on the cellphone. This permits risk actors to information victims by means of every step of the login and MFA authentication course of.
If the attackers enter stolen credentials into the actual service and are prompted for MFA, they’ll show new dialog packing containers on the phishing website in actual time to instruct a sufferer to approve a push notification, enter a TOTP code, or carry out different authentication steps.

Supply: Okta
ShinyHunters declare accountability
Whereas ShinyHunters declined to touch upon the assaults final evening, the group confirmed to BleepingComputer this morning that it’s liable for among the social engineering assaults.
“We verify we’re behind the assaults,” ShinyHunters instructed BleepingComputer. “We’re unable to share additional particulars presently, in addition to the truth that Salesforce stays our major curiosity and goal, the remaining are benefactors.”
The group additionally confirmed different features of BleepingComputer’s reporting, together with particulars in regards to the phishing infrastructure and domains used within the marketing campaign. Nonetheless, it disputed {that a} screenshot of a phishing equipment command-and-control server shared by Okta was for its platform, claiming as a substitute that theirs was constructed in-house.
ShinyHunters claimed it’s concentrating on not solely Okta but additionally Microsoft Entra and Google SSO platforms.
Microsoft mentioned it has nothing to share presently, and Google mentioned it had no proof its merchandise had been being abused within the marketing campaign.
“Right now, we’ve got no indication that Google itself or its merchandise are affected by this marketing campaign,” a Google spokesperson instructed BleepingComputer.
ShinyHunters claims to be utilizing information stolen in earlier breaches, such because the widespread Salesforce information theft assaults, to establish and get in touch with workers. This information consists of cellphone numbers, job titles, names, and different particulars used to make the social-engineering calls extra convincing.
Final evening, the group relaunched its Tor information leak website, which presently lists breaches at SoundCloud, Betterment, and Crunchbase.
SoundCloud beforehand disclosed a knowledge breach in December 2025, whereas Betterment confirmed this month that its electronic mail platform had been abused to ship cryptocurrency scams and that information was stolen.
Crunchbase, which had not beforehand disclosed a breach, confirmed right now that information was stolen from its company community.
“Crunchbase detected a cybersecurity incident the place a risk actor exfiltrated sure paperwork from our company community,” an organization spokesperson instructed BleepingComputer. “No enterprise operations have been disrupted by this incident. We’ve got contained the incident and our programs are safe.”
“Upon detecting the incident we engaged cybersecurity specialists and contacted federal regulation enforcement. We’re reviewing the impacted data to find out if any notifications are required in line with relevant authorized necessities.”

