Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Inside a phishing panel

0
Medium
Published: Mon May 11 2026 (05/11/2026, 08:50:58 UTC)
Source: AlienVault OTX General

Description

Security researchers gained direct access to Doko's Panel, a real-time phishing platform used in criminal campaigns by ShinyHunters and BlackFile groups. The investigation revealed four distinct infrastructure clusters operating independently customized variants of the tooling. Attacks combine voice phishing with adversary-in-the-middle techniques targeting enterprise identity providers like Okta, Microsoft, and Google, as well as cryptocurrency exchanges. Operators call victims impersonating IT helpdesk staff, directing them to combosquatted domains where credentials and MFA tokens are manually relayed in real-time. Confirmed breaches include SoundCloud (30M records), Match Group (10M records), Betterment (20M records), and Crunchbase. Over 400 domains have been identified linked to these operations. Evidence shows extensive use of AI language models in developing phishing infrastructure, with operators leveraging legitimate services to rapidly deploy and rotate attack infrastructure.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 05/11/2026, 10:22:36 UTC

Technical Analysis

Doko's Panel is a sophisticated real-time phishing platform used by multiple criminal groups including ShinyHunters and BlackFile. It consists of four distinct infrastructure clusters running customized variants of the phishing tooling. The attacks combine voice phishing (vishing) with adversary-in-the-middle (AITM) techniques to target enterprise identity providers (Okta, Microsoft, Google) and cryptocurrency exchanges. Victims receive calls impersonating IT helpdesk personnel and are directed to combosquatted domains where their credentials and multi-factor authentication tokens are manually relayed in real-time to the attackers. The platform has been linked to confirmed data breaches involving tens of millions of records from major companies such as SoundCloud, Match Group, Betterment, and Crunchbase. The operators use AI language models extensively to develop phishing infrastructure and exploit legitimate services to quickly deploy and rotate attack infrastructure, complicating detection and takedown efforts. Over 400 malicious domains have been identified in connection with these campaigns.

Potential Impact

This threat enables attackers to bypass multi-factor authentication by manually relaying credentials and MFA tokens in real-time, facilitating unauthorized access to enterprise identity provider accounts and cryptocurrency exchange accounts. The confirmed breaches have resulted in the exposure of tens of millions of user records from high-profile companies, indicating significant data compromise and potential downstream impacts such as identity theft and financial fraud. The use of voice phishing combined with adversary-in-the-middle techniques increases the likelihood of successful credential theft and session hijacking. The rapid deployment and rotation of infrastructure using AI and legitimate services complicate defensive measures and increase the operational resilience of the threat actors.

Mitigation Recommendations

No official patch or fix is applicable as this is a phishing campaign rather than a software vulnerability. Defenders should focus on user awareness training to recognize vishing attempts and suspicious domain names, especially combosquatted domains mimicking legitimate services. Organizations should implement strong anomaly detection on authentication attempts and consider additional verification methods beyond MFA tokens that can be relayed. Monitoring for the identified malicious domains and hashes can aid in detection and blocking. Since the threat actors rapidly rotate infrastructure, continuous threat intelligence updates and domain monitoring are recommended. There is no vendor advisory indicating that no action is required or that the threat is already mitigated; therefore, proactive defensive measures are advised.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://pushsecurity.com/blog/inside-criminal-phishing-panel"]
Adversary
ShinyHunters, BlackFile, UNC6661, UNC6671, UNC6240
Pulse Id
6a019872d2134a70b4d8a5bf
Threat Score
null

Indicators of Compromise

Domain

ValueDescriptionCopy
domaininternal.com
domainmanager.com
domainamazoninternal.com
domainpasskeysetup.com
domainepicgamessso.com
domainsonosinternal.com
domainmyadyeninternal.com
domainmysonossso.com
domainmydisneysso.com
domainenrollms.com
domainkeyokta.com
domainpasskeyportalsetup.com
domainaddoktapasskey.com
domainmydropboxinternal.com
domainmyxerointernal.com
domainpasskeywork.com

Hash

ValueDescriptionCopy
hash8a01bcb70ec1c101a163c9cb8e074781c1322096f7ae01789f02252854def44c
hash9c0939960e49122196e44b6779fe55dd7a13ab437ce251c8cf35f8c6daf8be21
hash9d65dd34384b441505e6b67647153c02d5c367bb53da36ce36a392e70b37940a
hashc0df36ccf88d5c8434b13b58f7a55a9715643a126148b9d078a93075d09cad26
hashcb1d409278b2247af23e7b00ac779b232baaf4ce5f63fdf5ebc3920a38cc6102

Threat ID: 6a01aa1fcbff5d8610f2b5b0

Added to database: 5/11/2026, 10:06:23 AM

Last enriched: 5/11/2026, 10:22:36 AM

Last updated: 5/12/2026, 3:47:16 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses