Executive Summary
In January 2026, the cybercriminal group ShinyHunters orchestrated a series of sophisticated voice phishing (vishing) attacks targeting single sign-on (SSO) credentials across multiple organizations. By impersonating IT support personnel, they deceived employees into providing their SSO credentials and multi-factor authentication (MFA) codes on counterfeit login portals. This enabled unauthorized access to various connected SaaS applications, including Salesforce, Microsoft 365, and Slack, leading to significant data breaches. Notable companies such as Panera Bread, Crunchbase, and Betterment confirmed unauthorized access and data exfiltration resulting from these attacks. (zerofox.com)
This incident underscores the evolving threat landscape where attackers combine social engineering with advanced phishing techniques to bypass MFA protections. The widespread adoption of SSO systems amplifies the potential impact of such breaches, as compromising a single account can grant access to multiple platforms. Organizations must enhance their security awareness training and implement robust monitoring to detect and mitigate such sophisticated attacks.
Why This Matters Now
The ShinyHunters campaign highlights the urgent need for organizations to reassess their security protocols, especially concerning SSO and MFA implementations. As attackers refine their social engineering tactics, the risk of large-scale data breaches increases, necessitating immediate action to bolster defenses against such sophisticated threats.
Attack Path Analysis
ShinyHunters initiated the attack by impersonating IT support through vishing calls, directing employees to phishing sites to steal SSO credentials and MFA codes. With these credentials, they accessed the SSO dashboard, enrolling their own devices for persistent access. They then moved laterally across integrated SaaS platforms like Salesforce and Microsoft 365, exploiting OAuth tokens to access and exfiltrate sensitive data. The attackers established command and control by maintaining access through registered devices and OAuth tokens. They exfiltrated large volumes of data from cloud applications, including customer records and business intelligence. Finally, they impacted organizations by issuing extortion demands, threatening to leak stolen data unless ransoms were paid.
Kill Chain Progression
Initial Compromise
Description
ShinyHunters initiated vishing calls, impersonating IT support to direct employees to phishing sites that mimicked company SSO portals, capturing SSO credentials and MFA codes.
MITRE ATT&CK® Techniques
Phishing: Spearphishing Voice
Valid Accounts
Modify Authentication Process: Multi-Factor Authentication
Application Layer Protocol: Web Protocols
Email Collection: Remote Email Collection
Exfiltration Over Web Service: Exfiltration to Cloud Storage
Potential Compliance Exposure
Mapping incident impact across multiple compliance frameworks.
PCI DSS 4.0 – Multi-Factor Authentication for All Access
Control ID: 8.3.6
NYDFS 23 NYCRR 500 – Multi-Factor Authentication
Control ID: 500.12
DORA – ICT Risk Management Framework
Control ID: Article 6
CISA ZTMM 2.0 – Identity Verification and Authentication
Control ID: Identity Pillar
NIS2 Directive – Cybersecurity Risk Management Measures
Control ID: Article 21
Sector Implications
Industry-specific impact of the vulnerabilities, including operational, regulatory, and cloud security risks.
Financial Services
SSO credential theft targeting cloud applications exposes sensitive financial data, regulatory violations, and potential lateral movement across interconnected banking systems and platforms.
Information Technology/IT
Vishing attacks exploiting SSO dashboards create cascading breaches across multiple SaaS platforms, compromising client data and internal systems through credential abuse.
Health Care / Life Sciences
Multi-factor authentication bypass enables unauthorized access to patient data across cloud applications, triggering HIPAA violations and potential medical identity theft.
Professional Training
Corporate training platforms vulnerable to phishing campaigns targeting employee credentials, enabling data exfiltration from learning management systems and sensitive corporate information.
Sources
- Mandiant details how ShinyHunters abuse SSO to steal cloud datahttps://www.bleepingcomputer.com/news/security/mandiant-details-how-shinyhunters-abuse-sso-to-steal-cloud-data/Verified
- Mandiant Warns of Active ShinyHunters Vishing Campaign Targeting Enterprise Identity Systemshttps://kbi.media/press-release/mandiant-warns-of-active-shinyhunters-vishing-campaign-targeting-enterprise-identity-systems/Verified
- Wave of ShinyHunters vishing attacks spreading fasthttps://www.computerweekly.com/news/366637762/Wave-of-ShinyHunters-vishing-attacks-spreading-fastVerified
Frequently Asked Questions
Cloud Native Security Fabric Mitigations and ControlsCNSF
Aviatrix Zero Trust CNSF is pertinent to this incident as it could have limited the attacker's lateral movement and data exfiltration by enforcing strict segmentation and identity-aware policies within the cloud environment.
Control: Cloud Native Security Fabric (CNSF)
Mitigation: While Aviatrix CNSF may not prevent credential theft via social engineering, it could limit unauthorized access by enforcing strict identity-based policies and monitoring for anomalous access patterns.
Control: Zero Trust Segmentation
Mitigation: Aviatrix Zero Trust Segmentation could likely limit the attacker's ability to escalate privileges by enforcing least-privilege access controls and segmenting network access based on identity and context.
Control: East-West Traffic Security
Mitigation: Aviatrix East-West Traffic Security could likely limit lateral movement by monitoring and controlling internal traffic flows, detecting and restricting unauthorized access between workloads.
Control: Multicloud Visibility & Control
Mitigation: Aviatrix Multicloud Visibility & Control could likely detect and limit unauthorized command and control activities by providing comprehensive monitoring and control over cross-cloud communications.
Control: Egress Security & Policy Enforcement
Mitigation: Aviatrix Egress Security & Policy Enforcement could likely limit data exfiltration by monitoring and controlling outbound traffic, detecting and blocking unauthorized data transfers.
While Aviatrix CNSF may not prevent extortion attempts, its enforcement of segmentation and egress controls could likely limit the volume of data exfiltrated, thereby reducing the potential impact of such threats.
Impact at a Glance
Affected Business Functions
- Customer Relationship Management (CRM)
- Document Management
- Internal Communications
- Cloud Storage
Estimated downtime: 3 days
Estimated loss: $500,000
Customer PII, internal documents, and sensitive business data
Recommended Actions
Key Takeaways & Next Steps
- • Implement robust multi-factor authentication (MFA) methods resistant to phishing, such as FIDO2 security keys, to prevent unauthorized access.
- • Enforce strict zero trust segmentation to limit lateral movement across SaaS platforms and internal networks.
- • Deploy egress security and policy enforcement to monitor and control outbound data transfers, mitigating unauthorized data exfiltration.
- • Utilize threat detection and anomaly response systems to identify and respond to unusual access patterns and data exfiltration activities.
- • Regularly conduct security awareness training for employees to recognize and report social engineering attempts, including vishing and phishing attacks.



