Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Mandiant discovers ShinyHunters-style Vishing attack that steals MFA and compromises SaaS platforms

CERT Polska details coordinated cyberattacks on over 30 wind and solar farms

Stripe veteran Lachy Groom’s latest bet, Physical Intelligence, is building Silicon Valley’s most active robot brain

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Mandiant discovers ShinyHunters-style Vishing attack that steals MFA and compromises SaaS platforms
Identity

Mandiant discovers ShinyHunters-style Vishing attack that steals MFA and compromises SaaS platforms

userBy userJanuary 31, 2026No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananJanuary 31, 2026Social Engineering/SaaS Security

Mandiant, a Google company, said Friday that it has seen “expanded threat activity” using tradecraft consistent with extortion-themed attacks organized by a group of financially motivated hackers known as Shiny Hunters.

This attack utilizes sophisticated voice phishing (also known as vishing) and a fake credential aggregator site that imitates the targeted company to gain unauthorized access to the victim’s environment by harvesting sign-on (SSO) credentials and multi-factor authentication (MFA) codes.

The ultimate goal of the attack is to target cloud-based software-as-a-service (SaaS) applications, siphon sensitive data and internal communications, and extort victims.

The tech giant’s threat intelligence team said it is tracking activity under multiple clusters, including UNC6661, UNC6671, and UNC6240 (also known as Shiny Hunters), and that these groups may be evolving their modus operandi or imitating previously observed tactics.

cyber security

“This methodology of targeting identity providers and SaaS platforms is consistent with previous observations of threat activity prior to ShinyHunters-branded extortion, but the range of cloud platforms targeted continues to expand as these threat actors seek more sensitive data for extortion purposes,” Mandiant said.

“Additionally, recent incidents appear to have escalated extortion tactics, including harassment of victim employees.”

Here are more details on vishing and credential theft activity:

UNC6661 has been observed impersonating IT staff to call employees of targeted victim organizations and direct them to a credential harvesting link instructing them to update their multi-factor authentication (MFA) settings. This activity was recorded from early to mid-January 2026. The stolen credentials are then used to register their devices with MFA and then travel across the network to exfiltrate data from the SaaS platform. In at least one case, attackers armed with access to a compromised email account sent more phishing emails to contacts at a cryptocurrency-focused company. The email was then deleted to cover its tracks. This is followed by extortion efforts by UNC6240. UNC6671 has also been observed deceiving victims by impersonating IT staff since early January 2026 as part of an effort to obtain credentials and MFA authentication codes on victim-branded credential aggregators. In at least some instances, threat actors gained access to Okta customer accounts. UNC6671 also utilized PowerShell to download sensitive data from SharePoint and OneDrive. The differences between UNC6661 and UNC6671 are related to the use of different domain registrars to register the credential harvesting domains (NICENIC for UNC6661 and Tucows for UNC6671) and the fact that the extortion emails sent after the UNC6671 activity did not overlap with known UNC6240 indicators. This indicates that a variety of people may be involved, demonstrating the amorphous nature of these cybercrime groups. Furthermore, the targeting of crypto companies suggests that the attackers may be seeking avenues for further financial gain.

cyber security

To combat the threats posed to SaaS platforms, Google has outlined a long list of hardening, logging, and detection recommendations.

Improve help desk processes, such as requiring personnel to make live video calls to verify identity. Restrict access to trusted exit points and physical locations. Enforce strong passwords. Remove SMS, phone calls, and emails as authentication methods. Restrict management plane access, audit exposed secrets, and enforce device access controls. Implement logging to increase visibility of identity actions, authorizations, and SaaS export operations. Detect MFA device enrollment and MFA life cycle changes. Look for OAuth/app authentication events that suggest mailbox manipulation activity using utilities such as ToogleBox Email Recall, or ID events that occur outside of normal business hours.

Google said, “This action is not the result of any security vulnerability in the vendor’s products or infrastructure.” “Instead, we continue to emphasize the effectiveness of social engineering and emphasize the importance of organizations moving to phish-resistant MFA whenever possible. Methods such as FIDO2 security keys and passkeys are resistant to social engineering, unlike push-based or SMS authentication.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleCERT Polska details coordinated cyberattacks on over 30 wind and solar farms
user
  • Website

Related Posts

CERT Polska details coordinated cyberattacks on over 30 wind and solar farms

January 31, 2026

Researchers discover Chrome extension that exploits affiliate links to steal ChatGPT access

January 30, 2026

China-linked UAT-8099 targets IIS servers in Asia with BadIIS SEO malware

January 30, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Mandiant discovers ShinyHunters-style Vishing attack that steals MFA and compromises SaaS platforms

CERT Polska details coordinated cyberattacks on over 30 wind and solar farms

Stripe veteran Lachy Groom’s latest bet, Physical Intelligence, is building Silicon Valley’s most active robot brain

OnlyFans considers selling majority stake to Architect Capital

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.