Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»ShinyHunters flip the script on MFA in new data theft attacks
    Cybersecurity

    ShinyHunters flip the script on MFA in new data theft attacks

    adminBy adminFebruary 2, 2026No Comments4 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    ShinyHunters flip the script on MFA in new data theft attacks
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Multi-factor authentication (MFA) is supposed to defend against phishing attacks, but threat actors operating under the ShinyHunters banner are using it as a pretext in ongoing social engineering attacks aimed at bypassing it.

    Among those successfully targeted in these latest hacking spree are Panera Bread, SoundCloud, Match Group (owner of online dating services Tinder, Hinge, Match and OkCupid) and Crunchbase.

    There will likely be many more victims, as Silent Push researchers detected active targeting or infrastructure preparation directed at domains of a wide variety of organizations in the tech and fintech, financial services, real estate, energy, healthcare, logistics, retail, and many other sectors.

    Synchronized vishing-phishing attacks

    Ten days ago, Okta warned about a new tool used by threat actors who specialize in voice phishing: custom-made phishing kits that allow them to syncronize the authentication flow on phishing pages with the request they make over the phone.

    “It’s worth noting that these hybrid phishing operations are also capable of bypassing push notifications that use number challenge/number matching as an additional method of verification,” Okta researchers noted.

    “A social engineer interacting on the phone with a targeted user can simply request a user to choose or enter a specific number.”

    Identifying the attack groups

    Mandiant, Google Cloud’s threat intelligence and incident response arm, says there are several seemingly independent groups that are using the same or a similar approach: UNC6661 and UNC6671.

    “In incidents spanning early to mid-January 2026, UNC6661 pretended to be IT staff and called employees at targeted victim organizations claiming that the company was updating MFA settings. The threat actor directed the employees to victim-branded credential harvesting sites to capture their SSO credentials and MFA codes, and then registered their own device for MFA. In at least some cases, the threat actor gained access to accounts belonging to Okta customers,” the researchers noted.

    The attackers moved laterally through victim customer environments to access various SaaS platforms and exfiltrate specific data from them: they searched for documents containing personally identifiable information, but also containing words such as “poc,” “confidential,” “internal,” “proposal,” “salesforce,” and “vpn”.

    In at least one incident where these attacker gained access to an Okta customer account, the group tried to minimize the possibility of detection by deleting a “Security method enrolled” email from Okta, and by deleting phishing emails sent from compromised email accounts to contacts working at cryptocurrency-focused companies.

    Around the same time, the UNC6671 threat actor impersonated IT staff over the phone and directed victims to enter their credentials and MFA authentication codes into phishing sites that were made to look like they belonged to their employer.

    Once they gained access to Okta customer accounts, the group leveraged PowerShell to download sensitive data from SharePoint and OneDrive. And after they made off with the data, during the extortion process, they used aggressive tactics such as harassing the victimized personnel.

    Based on details such as phishing domain hosting, Tox Chat accounts used for negotiation and other indicators, Mandiant researchers believe these are two separate groups or individuals.

    Based on overlapping tactics, techniques, and procedures used, UNC6661 can be tied to UNC6040, i.e., the ShinyHunters cyber extortion group.

    “GTIG also observed extortion text messages sent to employees and received reports of victim websites being targeted with distributed denial-of-service (DDoS) attacks,” the researchers also shared.

    The researchers have shared indicators of compromise related to the attacks as well as threat hunting queries. Mandiant has also published thorough guidance for organizations on how to avoid becoming a victim in these attacks, how to detect intrusions, and how to minimize the scope of the compromise if they do become a victim.

    Subscribe to our breaking news e-mail alert to never miss out on the latest breaches, vulnerabilities and cybersecurity threats. Subscribe here!

    attacks data flip MFA script ShinyHunters theft
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleIs SEO Dead in 2026? (A Data-Driven Answer)
    Next Article 18 Best Social Media Scheduling Tools For 2026 (Comparison)
    admin
    • Website

    Related Posts

    Apple account change alerts abused to send phishing emails

    April 19, 2026

    Social media bans might steer kids into riskier corners of the internet

    April 19, 2026

    Vercel confirms breach as hackers claim to be selling stolen data

    April 19, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    I replaced my entire streaming setup with a $30 device and free apps

    April 20, 2026

    Blood Strike – FPS for all 1.003.650015 APK Download by NetEase Games

    April 20, 2026

    The Ray-Ban Meta (Gen 1) smart glasses just scored a rare 25% discount at Amazon

    April 20, 2026

    The best robot vacuum in Australia: reliable, effective, effort-free automated cleaners

    April 20, 2026
    Categories
    • Blogging (65)
    • Cybersecurity (1,403)
    • Privacy & Online Earning (172)
    • SEO & Digital Marketing (850)
    • Tech Tools & Mobile / Apps (1,686)
    • WiFi / Internet & Networking (232)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    I replaced my entire streaming setup with a $30 device and free apps

    April 20, 2026

    Blood Strike – FPS for all 1.003.650015 APK Download by NetEase Games

    April 20, 2026

    The Ray-Ban Meta (Gen 1) smart glasses just scored a rare 25% discount at Amazon

    April 20, 2026
    Most Popular
    • I replaced my entire streaming setup with a $30 device and free apps
    • Blood Strike – FPS for all 1.003.650015 APK Download by NetEase Games
    • The Ray-Ban Meta (Gen 1) smart glasses just scored a rare 25% discount at Amazon
    • The best robot vacuum in Australia: reliable, effective, effort-free automated cleaners
    • Monitor spec sheets hide the one thing that actually decides whether a display feels premium
    • Apple account change alerts abused to send phishing emails
    • Apple AirPods Pro 3 review: A masterclass in sound, a lesson in lock-in
    • Samsung Galaxy S23 Ultra versus vivo X300 Ultra
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.