Inside a phishing panel
Security researchers gained direct access to Doko's Panel, a real-time phishing platform used in criminal campaigns by ShinyHunters and BlackFile groups. The investigation revealed four distinct infrastructure clusters operating independently customized variants of the tooling. Attacks combine voice phishing with adversary-in-the-middle techniques targeting enterprise identity providers like Okta, Microsoft, and Google, as well as cryptocurrency exchanges. Operators call victims impersonating IT helpdesk staff, directing them to combosquatted domains where credentials and MFA tokens are manually relayed in real-time. Confirmed breaches include SoundCloud (30M records), Match Group (10M records), Betterment (20M records), and Crunchbase. Over 400 domains have been identified linked to these operations. Evidence shows extensive use of AI language models in developing phishing infrastructure, with operators leveraging legitimate services to rapidly deploy and rotate attack infrastructure.
AI Analysis
Technical Summary
Doko's Panel is a sophisticated real-time phishing platform used by multiple criminal groups including ShinyHunters and BlackFile. It consists of four distinct infrastructure clusters running customized variants of the phishing tooling. The attacks combine voice phishing (vishing) with adversary-in-the-middle (AITM) techniques to target enterprise identity providers (Okta, Microsoft, Google) and cryptocurrency exchanges. Victims receive calls impersonating IT helpdesk personnel and are directed to combosquatted domains where their credentials and multi-factor authentication tokens are manually relayed in real-time to the attackers. The platform has been linked to confirmed data breaches involving tens of millions of records from major companies such as SoundCloud, Match Group, Betterment, and Crunchbase. The operators use AI language models extensively to develop phishing infrastructure and exploit legitimate services to quickly deploy and rotate attack infrastructure, complicating detection and takedown efforts. Over 400 malicious domains have been identified in connection with these campaigns.
Potential Impact
This threat enables attackers to bypass multi-factor authentication by manually relaying credentials and MFA tokens in real-time, facilitating unauthorized access to enterprise identity provider accounts and cryptocurrency exchange accounts. The confirmed breaches have resulted in the exposure of tens of millions of user records from high-profile companies, indicating significant data compromise and potential downstream impacts such as identity theft and financial fraud. The use of voice phishing combined with adversary-in-the-middle techniques increases the likelihood of successful credential theft and session hijacking. The rapid deployment and rotation of infrastructure using AI and legitimate services complicate defensive measures and increase the operational resilience of the threat actors.
Mitigation Recommendations
No official patch or fix is applicable as this is a phishing campaign rather than a software vulnerability. Defenders should focus on user awareness training to recognize vishing attempts and suspicious domain names, especially combosquatted domains mimicking legitimate services. Organizations should implement strong anomaly detection on authentication attempts and consider additional verification methods beyond MFA tokens that can be relayed. Monitoring for the identified malicious domains and hashes can aid in detection and blocking. Since the threat actors rapidly rotate infrastructure, continuous threat intelligence updates and domain monitoring are recommended. There is no vendor advisory indicating that no action is required or that the threat is already mitigated; therefore, proactive defensive measures are advised.
Indicators of Compromise
- domain: internal.com
- domain: manager.com
- domain: amazoninternal.com
- domain: passkeysetup.com
- domain: epicgamessso.com
- domain: sonosinternal.com
- domain: myadyeninternal.com
- domain: mysonossso.com
- domain: mydisneysso.com
- domain: enrollms.com
- domain: keyokta.com
- domain: passkeyportalsetup.com
- domain: addoktapasskey.com
- domain: mydropboxinternal.com
- domain: myxerointernal.com
- domain: passkeywork.com
- hash: 8a01bcb70ec1c101a163c9cb8e074781c1322096f7ae01789f02252854def44c
- hash: 9c0939960e49122196e44b6779fe55dd7a13ab437ce251c8cf35f8c6daf8be21
- hash: 9d65dd34384b441505e6b67647153c02d5c367bb53da36ce36a392e70b37940a
- hash: c0df36ccf88d5c8434b13b58f7a55a9715643a126148b9d078a93075d09cad26
- hash: cb1d409278b2247af23e7b00ac779b232baaf4ce5f63fdf5ebc3920a38cc6102
Inside a phishing panel
Description
Security researchers gained direct access to Doko's Panel, a real-time phishing platform used in criminal campaigns by ShinyHunters and BlackFile groups. The investigation revealed four distinct infrastructure clusters operating independently customized variants of the tooling. Attacks combine voice phishing with adversary-in-the-middle techniques targeting enterprise identity providers like Okta, Microsoft, and Google, as well as cryptocurrency exchanges. Operators call victims impersonating IT helpdesk staff, directing them to combosquatted domains where credentials and MFA tokens are manually relayed in real-time. Confirmed breaches include SoundCloud (30M records), Match Group (10M records), Betterment (20M records), and Crunchbase. Over 400 domains have been identified linked to these operations. Evidence shows extensive use of AI language models in developing phishing infrastructure, with operators leveraging legitimate services to rapidly deploy and rotate attack infrastructure.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
Doko's Panel is a sophisticated real-time phishing platform used by multiple criminal groups including ShinyHunters and BlackFile. It consists of four distinct infrastructure clusters running customized variants of the phishing tooling. The attacks combine voice phishing (vishing) with adversary-in-the-middle (AITM) techniques to target enterprise identity providers (Okta, Microsoft, Google) and cryptocurrency exchanges. Victims receive calls impersonating IT helpdesk personnel and are directed to combosquatted domains where their credentials and multi-factor authentication tokens are manually relayed in real-time to the attackers. The platform has been linked to confirmed data breaches involving tens of millions of records from major companies such as SoundCloud, Match Group, Betterment, and Crunchbase. The operators use AI language models extensively to develop phishing infrastructure and exploit legitimate services to quickly deploy and rotate attack infrastructure, complicating detection and takedown efforts. Over 400 malicious domains have been identified in connection with these campaigns.
Potential Impact
This threat enables attackers to bypass multi-factor authentication by manually relaying credentials and MFA tokens in real-time, facilitating unauthorized access to enterprise identity provider accounts and cryptocurrency exchange accounts. The confirmed breaches have resulted in the exposure of tens of millions of user records from high-profile companies, indicating significant data compromise and potential downstream impacts such as identity theft and financial fraud. The use of voice phishing combined with adversary-in-the-middle techniques increases the likelihood of successful credential theft and session hijacking. The rapid deployment and rotation of infrastructure using AI and legitimate services complicate defensive measures and increase the operational resilience of the threat actors.
Mitigation Recommendations
No official patch or fix is applicable as this is a phishing campaign rather than a software vulnerability. Defenders should focus on user awareness training to recognize vishing attempts and suspicious domain names, especially combosquatted domains mimicking legitimate services. Organizations should implement strong anomaly detection on authentication attempts and consider additional verification methods beyond MFA tokens that can be relayed. Monitoring for the identified malicious domains and hashes can aid in detection and blocking. Since the threat actors rapidly rotate infrastructure, continuous threat intelligence updates and domain monitoring are recommended. There is no vendor advisory indicating that no action is required or that the threat is already mitigated; therefore, proactive defensive measures are advised.
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://pushsecurity.com/blog/inside-criminal-phishing-panel"]
- Adversary
- ShinyHunters, BlackFile, UNC6661, UNC6671, UNC6240
- Pulse Id
- 6a019872d2134a70b4d8a5bf
- Threat Score
- null
Indicators of Compromise
Domain
| Value | Description | Copy |
|---|---|---|
domaininternal.com | — | |
domainmanager.com | — | |
domainamazoninternal.com | — | |
domainpasskeysetup.com | — | |
domainepicgamessso.com | — | |
domainsonosinternal.com | — | |
domainmyadyeninternal.com | — | |
domainmysonossso.com | — | |
domainmydisneysso.com | — | |
domainenrollms.com | — | |
domainkeyokta.com | — | |
domainpasskeyportalsetup.com | — | |
domainaddoktapasskey.com | — | |
domainmydropboxinternal.com | — | |
domainmyxerointernal.com | — | |
domainpasskeywork.com | — |
Hash
| Value | Description | Copy |
|---|---|---|
hash8a01bcb70ec1c101a163c9cb8e074781c1322096f7ae01789f02252854def44c | — | |
hash9c0939960e49122196e44b6779fe55dd7a13ab437ce251c8cf35f8c6daf8be21 | — | |
hash9d65dd34384b441505e6b67647153c02d5c367bb53da36ce36a392e70b37940a | — | |
hashc0df36ccf88d5c8434b13b58f7a55a9715643a126148b9d078a93075d09cad26 | — | |
hashcb1d409278b2247af23e7b00ac779b232baaf4ce5f63fdf5ebc3920a38cc6102 | — |
Threat ID: 6a01aa1fcbff5d8610f2b5b0
Added to database: 5/11/2026, 10:06:23 AM
Last enriched: 5/11/2026, 10:22:36 AM
Last updated: 5/12/2026, 3:47:16 AM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.