Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»ShinyHunters escalates tactics in extortion campaign linked to Okta environments
    Cybersecurity

    ShinyHunters escalates tactics in extortion campaign linked to Okta environments

    adminBy adminFebruary 2, 2026No Comments2 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    ShinyHunters escalates tactics in extortion campaign linked to Okta environments
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Researchers warn that a recently disclosed extortion campaign linked to ShinyHunters represents an escalation of tactics used by the group. 

    ShinyHunters late last month claimed credit for a series of voice phishing attacks that led to extortion demands against five organizations. 

    Multiple groups linked to a ShinyHunters-branded campaign that leverages voice phishing and victim-branded credential-harvesting sites to gain access to corporate environments by gaining access to single sign-on credentials and multifactor authentication codes, according to Mandiant, the incident response arm of Google Threat Intelligence Group. 

    After gaining access, the threat groups target cloud-based software-as-a-service applications in order to steal sensitive data and other internal documents for use in future extortion campaigns. 

    GTIG researchers are tracking the threat groups as UNC6661, UNC6671 and UNC6240. 

    Since mid-January, hackers from UNC6661 called employees at victim organizations under the guise of being IT staffers. The hackers falsely claimed the company was updating multifactor settings and directed the workers to a branded credential harvesting site. This allowed the site to capture MFA codes and single sign-on credentials. 

    Mandiant confirmed that, in certain cases, hackers gained access to accounts belonging to Okta customers. This activity was referenced in a January blog post from Okta about a campaign using phishing kits. 

    Based on several overlapping issues, including the use of a common Tox account as part of negotiations, researchers linked the subsequent extortion activity to UNC6240. Extortion emails provided some details of what was stolen and demanded payment within 72 hours. 

    Researchers confirmed a new data leak site posted in late January with information about alleged victims. As previously reported, security researcher Alon Gal told Cybersecurity Dive that hacks against five organizations were claimed. 

    Hackers linked to UNC6671 have conducted similar attacks, impersonating IT staff, since in early January. The credential-harvesting domains used the same structure to those used by UNC6661, but were registered through a different service.

    Campaign Environments Escalates extortion linked Okta ShinyHunters tactics
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous Article5 Proven Strategies to Rank Higher
    Next Article Eying AI factories, Nvidia buys bigger stake in CoreWeave
    admin
    • Website

    Related Posts

    Apple account change alerts abused to send phishing emails

    April 19, 2026

    Social media bans might steer kids into riskier corners of the internet

    April 19, 2026

    Vercel confirms breach as hackers claim to be selling stolen data

    April 19, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Monitor spec sheets hide the one thing that actually decides whether a display feels premium

    April 19, 2026

    Apple account change alerts abused to send phishing emails

    April 19, 2026

    Apple AirPods Pro 3 review: A masterclass in sound, a lesson in lock-in

    April 19, 2026

    Samsung Galaxy S23 Ultra versus vivo X300 Ultra

    April 19, 2026
    Categories
    • Blogging (65)
    • Cybersecurity (1,403)
    • Privacy & Online Earning (172)
    • SEO & Digital Marketing (850)
    • Tech Tools & Mobile / Apps (1,682)
    • WiFi / Internet & Networking (232)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Monitor spec sheets hide the one thing that actually decides whether a display feels premium

    April 19, 2026

    Apple account change alerts abused to send phishing emails

    April 19, 2026

    Apple AirPods Pro 3 review: A masterclass in sound, a lesson in lock-in

    April 19, 2026
    Most Popular
    • Monitor spec sheets hide the one thing that actually decides whether a display feels premium
    • Apple account change alerts abused to send phishing emails
    • Apple AirPods Pro 3 review: A masterclass in sound, a lesson in lock-in
    • Samsung Galaxy S23 Ultra versus vivo X300 Ultra
    • Here’s How Netflix Plans to Add TikTok-Style Videos to Its Mobile App
    • Social media bans might steer kids into riskier corners of the internet
    • eSIM was supposed to replace SIM cards, but carriers turned it into a trap
    • Vercel confirms breach as hackers claim to be selling stolen data
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.