Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Mandiant details how ShinyHunters abuse SSO to steal cloud data
    Cybersecurity

    Mandiant details how ShinyHunters abuse SSO to steal cloud data

    adminBy adminJanuary 31, 2026No Comments5 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Hacker staring at a box
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Hacker staring at a box

    Mandiant says a wave of recent ShinyHunters SaaS data-theft attacks is being fueled by targeted voice phishing (vishing) attacks and company-branded phishing sites that steal single sign-on (SSO) credentials and multi-factor authentication (MFA) codes.

    As first reported by BleepingComputer, threat actors are impersonating corporate IT and helpdesk staff and calling employees directly, claiming that MFA settings need to be updated. During the call, the targeted employee is directed to a phishing site that resembles their company’s login portal.

    According to Okta, these sites are using advanced phishing kits that allow threat actors to display interactive dialogs while on the phone with a victim.

    Wiz

    While still talking to a targeted employee, the attacker relays stolen credentials in real time, triggers legitimate MFA challenges, and tells the target how to respond, including approving push notifications or entering one-time passcodes.

    This allows attackers to successfully authenticate with stolen credentials and enroll their own devices in MFA.

    Once they gain access to an account, they log in to an organization’s Okta, Microsoft Entra, or Google SSO dashboard, which acts as a centralized hub listing all SaaS applications the user has permission to access.

    Example Microsoft Entra SSO Dashboard
    Example Microsoft Entra SSO Dashboard

    These applications include Salesforce, a primary target of ShinyHunters, Microsoft 365, SharePoint, DocuSign, Slack, Atlassian, Dropbox, Google Drive, and many other internal and third-party platforms.

    For threat actors focused on data theft and extortion, the SSO dashboard becomes a springboard to a company’s cloud data, allowing them to access multiple services from a single compromised account.

    The ShinyHunters extortion group confirmed to BleepingComputer that they and some of their affiliates are behind these attacks. The extortion group also claims that other threat actors have since conducted similar attacks.

    Soon after the information about these attacks became public, the ShinyHunters extortion gang launched a data-leak site, where it began leaking data associated with these attacks.

    Today, Google Threat Intelligence Group/Mandiant released a report saying it is tracking this activity across different threat clusters tracked as UNC6661, UNC6671, and UNC6240 (ShinyHunters).

    Multiple threat actors are conducting attacks

    Mandiant says UNC6661 poses as IT staff when calling targeted employees and directs them to company-branded phishing domains used to capture SSO credentials and MFA codes. After logging in, the attackers registered their own MFA device to retain access.

    They used this access to steal data from cloud applications based on whatever permissions were available through the compromised SSO session. Mandiant believes this activity is opportunistic, with the threat actors targeting whatever SaaS applications are available.

    However, it should be noted that ShinyHunters has told BleepingComputer in the past that their primary focus is Salesforce data.

    Vishing attack phases
    Vishing attack phases
    Source: Mandiant

    Mandiant shared examples of logs that were created during the data theft attacks:

    • Microsoft 365 and SharePoint events showing file downloads where the User-Agent identifies PowerShell, indicating scripts or tools were used to download data.
    • Salesforce login activity originating from IP addresses later identified as used by the threat actors.
    • DocuSign audit logs showing bulk document downloads tied to the same IOCs.

    In one breach involving an Okta customer, Mandiant says the attackers enabled a Google Workspace add-on called “ToogleBox Recall,” a tool they used to search for and delete emails to hide their activity.

    “In at least one incident where the threat actor gained access to an Okta customer account, UNC6661 enabled the ToogleBox Recall add-on for the victim’s Google Workspace account, a tool designed to search for and permanently delete emails,” explains Mandiant.

    “They then deleted a “Security method enrolled” email from Okta, almost certainly to prevent the employee from identifying that their account was associated with a new MFA device.

    Mandiant says that internet domains used in the UNC6661 attacks were registered through NICENIC and commonly used the format sso.com or internal.com.

    While the initial intrusion and data theft attacks are attributed to UNC6661, Mandiant says the extortion demands were sent by ShinyHunters, aka UNC6240, and included a Tox messenger ID used by them in past extortion attempts.

    Snippet of the ShinyHunters ransom note
    Snippet of the ShinyHunters ransom note
    Source: Mandiant

    Mandiant says another threat cluster tracked as UNC6671 is using similar vishing techniques, but with their phishing domains registered through Tucows instead.

    Unlike UNC6661, UNC6671’s extortion demands were not sent under the ShinyHunters name, used a different Tox ID for negotiation, and used aggressive pressure tactics, including harassing company personnel.

    Mandiant says the phishing domains used in these attacks follow common naming patterns designed to impersonate corporate portals.

    • Corporate SSO portals: sso[.]com, mysso[.]com, and my-sso[.]com
    • Internal portals: internal[.]com, www.internal[.]com, and myinternal[.]com
    • Support and helpdesk themes: support[.]com, ticket-[.]support, and support-[.]com
    • Identity provider impersonation: okta[.]com, azure[.]com, and onzendesk[.]com
    • Access portals: access[.]com, www.access[.]com, and myacess[.]com

    For example, matchinternal[.]com was used in the recent breach at Match Group, which exposed data for the popular Hinge, Tinder, OkCupid, and Match dating sites.

    Mandiant notes that many IP addresses tied to the campaign belong to commercial VPN services or residential proxy networks, such as Mullvad, Oxylabs, NetNut, 9Proxy, Infatica, and nsocks

    Mandiant also says that defenders should prioritize the following behavior detection to identity these types of attacks:

    • SSO account compromise followed by rapid data exfiltration from SaaS platforms.
    • PowerShell User-Agent accessing SharePoint or OneDrive
    • Unexpected Google Workspace OAuth authorization for ToogleBox Recall
    • Deletion of MFA modification notification emails

    To help organizations defend against these types of attacks, Mandiant has released hardening, logging, and detection recommendations against ShinyHunters vishing attacks.

    This guidance is organized around hardening identity workflows and authentication resets, logging the right telemetry, and detections designed to find post-vishing behavior before data theft occurs.

    Mandiant has also released rules for Google SecOps to detect ShinyHunters activity.


    Wiz

    As MCP (Model Context Protocol) becomes the standard for connecting LLMs to tools and data, security teams are moving fast to keep these new services safe.

    This free cheat sheet outlines 7 best practices you can start using today.

    Abuse Cloud data details Mandiant ShinyHunters SSO steal
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleToday is your last chance to get the Xreal One Pro at its pre-tariff price before it rises again on Feb 1st!
    Next Article vivo V70 and V70 Elite’s camera sensors and colors officially confirmed
    admin
    • Website

    Related Posts

    Fig Security emerges from stealth with $38 million to resilience-proof enterprise security

    March 3, 2026

    I finally have full control of my Bambu Lab printer, but it meant ditching Bambu’s cloud

    March 3, 2026

    Pro-Russia actors team with Iran-linked hackers in attacks

    March 3, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Fig Security emerges from stealth with $38 million to resilience-proof enterprise security

    March 3, 2026

    EFF to Supreme Court: Shut Down Unconstitutional Geofence Searches

    March 3, 2026

    SEO’s 5 Stages of Grief (And How to Adapt to AI SEO)

    March 3, 2026

    I finally have full control of my Bambu Lab printer, but it meant ditching Bambu’s cloud

    March 3, 2026
    Categories
    • Blogging (32)
    • Cybersecurity (581)
    • Privacy & Online Earning (83)
    • SEO & Digital Marketing (364)
    • Tech Tools & Mobile / Apps (717)
    • WiFi / Internet & Networking (103)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Fig Security emerges from stealth with $38 million to resilience-proof enterprise security

    March 3, 2026

    EFF to Supreme Court: Shut Down Unconstitutional Geofence Searches

    March 3, 2026

    SEO’s 5 Stages of Grief (And How to Adapt to AI SEO)

    March 3, 2026
    Most Popular
    • Fig Security emerges from stealth with $38 million to resilience-proof enterprise security
    • EFF to Supreme Court: Shut Down Unconstitutional Geofence Searches
    • SEO’s 5 Stages of Grief (And How to Adapt to AI SEO)
    • I finally have full control of my Bambu Lab printer, but it meant ditching Bambu’s cloud
    • Pro-Russia actors team with Iran-linked hackers in attacks
    • 8 Best Student Checking Accounts of March 2026
    • Builderius WordPress Page Builder Integrates Claude AI
    • Google is cutting Chrome’s release cycle in half
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.