Mandiant Finds ShinyHunters-Style Vishing Attacks Stealing MFA to Breach SaaS Platforms
Google-owned Mandiant on Friday said it identified an "expansion in threat activity" that uses tradecraft consistent with extortion-themed attacks orchestrated by a financially motivated hacking group known as ShinyHunters. The attacks leverage advanced voice phishing (aka vishing) and bogus credential harvesting sites mimicking targeted companies to gain unauthorized access to victim
AI Analysis
Technical Summary
Mandiant, a Google-owned cybersecurity firm, has reported an escalation in sophisticated vishing (voice phishing) attacks consistent with tactics used by the financially motivated ShinyHunters hacking group and associated clusters UNC6661, UNC6671, and UNC6240. These threat actors impersonate IT personnel to deceive employees at targeted organizations into visiting fake credential harvesting websites designed to mimic legitimate company portals. Victims are instructed to update their multi-factor authentication (MFA) settings, during which attackers capture single sign-on (SSO) credentials and MFA codes. The attackers then register their own devices for MFA, effectively bypassing the victim’s MFA protections. This access enables lateral movement within the victim’s network and exfiltration of sensitive data from cloud-based SaaS platforms such as Okta, SharePoint, and OneDrive. In some cases, compromised email accounts are weaponized to send additional phishing emails, particularly targeting cryptocurrency firms, followed by deletion of these emails to cover tracks. The threat actors also escalate extortion tactics, including harassment of victim personnel. The campaign exploits social engineering rather than software vulnerabilities, underscoring the limitations of traditional MFA methods like SMS and push notifications. Google recommends adopting phishing-resistant MFA methods such as FIDO2 security keys or passkeys, improving help desk verification processes (e.g., requiring live video calls), restricting management-plane access, auditing for exposed secrets, and enhancing logging and detection of anomalous identity and authorization activities. The attackers’ use of different domain registrars and extortion patterns suggests multiple loosely connected groups or evolving tactics. This threat represents a significant risk to organizations relying on cloud SaaS platforms for critical business operations and sensitive data.
Potential Impact
For European organizations, this threat poses a substantial risk to the confidentiality and integrity of sensitive corporate data and internal communications hosted on SaaS platforms. Successful compromise can lead to unauthorized access to critical cloud services, enabling data theft, business email compromise, and lateral movement within networks. The extortion component can result in financial losses, reputational damage, and operational disruption. Organizations in sectors with high SaaS adoption, such as finance, technology, and cryptocurrency, are particularly vulnerable. The social engineering nature of the attack means even well-secured environments can be compromised if employees are deceived. The harassment and extortion tactics further increase the risk of insider stress and potential operational impact. Given the widespread use of SaaS platforms like Okta, Microsoft 365, and Google Workspace across Europe, the threat could affect a broad range of enterprises, especially those with remote or hybrid workforces where identity verification is more challenging. The attack also highlights the need for stronger identity security practices to prevent lateral movement and data exfiltration.
Mitigation Recommendations
European organizations should implement multi-layered defenses tailored to counter advanced social engineering and credential theft. Key measures include: 1) Deploy phishing-resistant MFA methods such as FIDO2 security keys or passkeys instead of SMS or push-based MFA to prevent MFA code interception. 2) Enhance help desk and IT support processes by requiring live video verification or other strong identity proofing before making changes to MFA or account settings. 3) Restrict management-plane access to trusted networks and devices, enforce strong password policies, and remove weaker authentication methods like SMS and email-based MFA. 4) Conduct regular audits for exposed secrets, credentials, and unauthorized device registrations in identity providers and SaaS platforms. 5) Implement comprehensive logging and monitoring focused on identity lifecycle events, OAuth/app authorizations, and anomalous access patterns, especially outside normal business hours. 6) Train employees on recognizing vishing and social engineering tactics, emphasizing verification of IT requests. 7) Use endpoint detection tools to identify lateral movement and suspicious PowerShell or scripting activity. 8) Establish incident response plans that include rapid containment and forensic analysis of SaaS platform breaches. 9) Collaborate with SaaS providers to leverage their security features and threat intelligence. 10) Consider segmentation of SaaS access and least privilege principles to limit potential damage from compromised accounts.
Affected Countries
United Kingdom, Germany, France, Netherlands, Sweden, Switzerland, Belgium, Ireland
Mandiant Finds ShinyHunters-Style Vishing Attacks Stealing MFA to Breach SaaS Platforms
Description
Google-owned Mandiant on Friday said it identified an "expansion in threat activity" that uses tradecraft consistent with extortion-themed attacks orchestrated by a financially motivated hacking group known as ShinyHunters. The attacks leverage advanced voice phishing (aka vishing) and bogus credential harvesting sites mimicking targeted companies to gain unauthorized access to victim
AI-Powered Analysis
Technical Analysis
Mandiant, a Google-owned cybersecurity firm, has reported an escalation in sophisticated vishing (voice phishing) attacks consistent with tactics used by the financially motivated ShinyHunters hacking group and associated clusters UNC6661, UNC6671, and UNC6240. These threat actors impersonate IT personnel to deceive employees at targeted organizations into visiting fake credential harvesting websites designed to mimic legitimate company portals. Victims are instructed to update their multi-factor authentication (MFA) settings, during which attackers capture single sign-on (SSO) credentials and MFA codes. The attackers then register their own devices for MFA, effectively bypassing the victim’s MFA protections. This access enables lateral movement within the victim’s network and exfiltration of sensitive data from cloud-based SaaS platforms such as Okta, SharePoint, and OneDrive. In some cases, compromised email accounts are weaponized to send additional phishing emails, particularly targeting cryptocurrency firms, followed by deletion of these emails to cover tracks. The threat actors also escalate extortion tactics, including harassment of victim personnel. The campaign exploits social engineering rather than software vulnerabilities, underscoring the limitations of traditional MFA methods like SMS and push notifications. Google recommends adopting phishing-resistant MFA methods such as FIDO2 security keys or passkeys, improving help desk verification processes (e.g., requiring live video calls), restricting management-plane access, auditing for exposed secrets, and enhancing logging and detection of anomalous identity and authorization activities. The attackers’ use of different domain registrars and extortion patterns suggests multiple loosely connected groups or evolving tactics. This threat represents a significant risk to organizations relying on cloud SaaS platforms for critical business operations and sensitive data.
Potential Impact
For European organizations, this threat poses a substantial risk to the confidentiality and integrity of sensitive corporate data and internal communications hosted on SaaS platforms. Successful compromise can lead to unauthorized access to critical cloud services, enabling data theft, business email compromise, and lateral movement within networks. The extortion component can result in financial losses, reputational damage, and operational disruption. Organizations in sectors with high SaaS adoption, such as finance, technology, and cryptocurrency, are particularly vulnerable. The social engineering nature of the attack means even well-secured environments can be compromised if employees are deceived. The harassment and extortion tactics further increase the risk of insider stress and potential operational impact. Given the widespread use of SaaS platforms like Okta, Microsoft 365, and Google Workspace across Europe, the threat could affect a broad range of enterprises, especially those with remote or hybrid workforces where identity verification is more challenging. The attack also highlights the need for stronger identity security practices to prevent lateral movement and data exfiltration.
Mitigation Recommendations
European organizations should implement multi-layered defenses tailored to counter advanced social engineering and credential theft. Key measures include: 1) Deploy phishing-resistant MFA methods such as FIDO2 security keys or passkeys instead of SMS or push-based MFA to prevent MFA code interception. 2) Enhance help desk and IT support processes by requiring live video verification or other strong identity proofing before making changes to MFA or account settings. 3) Restrict management-plane access to trusted networks and devices, enforce strong password policies, and remove weaker authentication methods like SMS and email-based MFA. 4) Conduct regular audits for exposed secrets, credentials, and unauthorized device registrations in identity providers and SaaS platforms. 5) Implement comprehensive logging and monitoring focused on identity lifecycle events, OAuth/app authorizations, and anomalous access patterns, especially outside normal business hours. 6) Train employees on recognizing vishing and social engineering tactics, emphasizing verification of IT requests. 7) Use endpoint detection tools to identify lateral movement and suspicious PowerShell or scripting activity. 8) Establish incident response plans that include rapid containment and forensic analysis of SaaS platform breaches. 9) Collaborate with SaaS providers to leverage their security features and threat intelligence. 10) Consider segmentation of SaaS access and least privilege principles to limit potential damage from compromised accounts.
Affected Countries
Technical Details
- Article Source
- {"url":"https://thehackernews.com/2026/01/mandiant-finds-shinyhunters-using.html","fetched":true,"fetchedAt":"2026-01-31T09:08:48.740Z","wordCount":1248}
Threat ID: 697dc6a3ac063202221e55f2
Added to database: 1/31/2026, 9:08:51 AM
Last enriched: 1/31/2026, 9:09:09 AM
Last updated: 2/3/2026, 8:52:24 AM
Views: 59
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Google Presentations Abused for Phishing, (Fri, Jan 30th)
MediumIn Other News: Paid for Being Jailed, Google’s $68M Settlement, CISA Chief’s ChatGPT Leak
MediumOver 100 Organizations Targeted in ShinyHunters Phishing Campaign
MediumInitial Stages of Romance Scams [Guest Diary], (Tue, Jan 27th)
MediumPhishers Abuse SharePoint in New Campaign Targeting Energy Sector
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.