HighData Breach

ShinyHunters Claims Credit for SSO Vishing Attacks Driving Data Theft and Extortion

ShinyHunters says it is behind ongoing vishing campaigns targeting single sign-on (SSO) accounts for downstream data theft and extortion. The group's relaunched leak site lists SoundCloud, Betterment, and Crunchbase, with Crunchbase confirming a corporate network data theft incident. The activity aligns with Okta's warning on real-time 'vishing kits' designed to defeat non-phishing-resistant MFA.

Evan Mael
Evan Mael
Enterprise5views
Threat actorShinyHunters
Attack vectorSSO vishing with real-time MFA bypass
Named victimsSoundCloud, Betterment, Crunchbase
Confirmed breachCrunchbase (data exfiltration)

What's happening

The operational pattern is increasingly consistent across identity-centric intrusions:

  1. Initial access is gained by socially engineering users over the phone (often impersonating internal IT/helpdesk)
  2. Credential harvesting - Attackers harvest SSO credentials + MFA material (OTP/TOTP or push approvals) using real-time phishing infrastructure
  3. SaaS pivot - After gaining SSO access, they move into high-value SaaS (commonly CRM, productivity suites, file storage, and support tooling) and exfiltrate data quickly
  4. Monetization - The extortion phase (pay to prevent leaks) is reinforced with the credibility pressure of a public data leak site
Attack Chain

Phone call → Real-time credential capture → SSO access → SaaS data theft → Extortion

Why ShinyHunters' claim matters

Even if a "brand" claim is not the same as definitive attribution, it is operationally important for defenders because:

FactorImplication
Sets expectationsRapid exfiltration, fast extortion follow-up, public leak pressure
Narrows the playbookIdentity-driven access, not exploit-driven access
Signals intelligence reuseAttackers leverage data from prior breaches (names, roles, phone numbers) to make calls more convincing
Named Victims

SoundCloud, Betterment, Crunchbase (confirmed data exfiltration)

Known / claimed impacted organizations

Based on the leak-site listings and reporting around the claim:

  • SoundCloud - Listed on leak site
  • Betterment - Listed on leak site
  • Crunchbase - Confirmed exfiltration of certain corporate documents; stated operations were not disrupted

How the SSO vishing chain works

Okta's threat intelligence describes modern vishing kits as "operator consoles" for phone-based social engineering:

Attack sequence

StepAction
1. ReconnaissanceIdentify the employee, their role, apps used, and helpdesk/IT context
2. Phone callImpersonate IT/security; create urgency (e.g., "passkey enrollment," "security verification," "account lockout")
3. Real-time phishing siteVictim is guided to a spoofed login page; credentials are captured and forwarded immediately
4. MFA handlingThe kit dynamically changes prompts so the victim sees exactly what the attacker needs (OTP entry, push approval, number matching)
5. SSO dashboard pivotOnce in, attackers enumerate accessible apps and target the easiest data-exfil paths
6. ExtortionPayment demand shortly after detection, often with proof-of-access and samples
Real-Time Proxying

The vishing kit acts as a live proxy, forwarding credentials and MFA tokens to the real site before they expire

Defensive priorities (what to do first)

1) Enforce phishing-resistant MFA

Move critical identity flows to phishing-resistant options and enforce those policies for SSO and admin actions:

MethodPhishing Resistant
FIDO2 / Security KeysYes
PasskeysYes
Smart CardsYes
SMS OTPNo
TOTP (Authenticator app)No
Push notificationsNo

2) Treat helpdesk identity verification as a security control

If your service desk can reset passwords or modify factors, it is part of your identity perimeter:

  • Standardize caller verification procedures
  • Restrict who can reset factors
  • Use time-bound, scoped recovery mechanisms instead of broad resets

3) Reduce blast radius inside SaaS

  • Lock down who can export large datasets (CRM, support platforms, collaboration suites)
  • Apply least privilege to connected apps / OAuth grants
  • Alert on new connected apps, unusual token grants, and bulk export behavior

Detection: correlate identity + SaaS signals

High-signal combinations to monitor:

Signal PatternRisk
Unusual sign-in + new device + immediate MFA eventsHigh
MFA approvals initiated during inbound "IT support" callsCritical
New session creation followed by bulk downloads/exports in Salesforce/CRMCritical
Sudden access to high-value data repositories not typical for that userHigh
New OAuth app grants shortly after authenticationMedium
Detection Priority

Correlate identity events with downstream SaaS activity within short time windows (minutes to hours)

Incident response checklist

If you suspect SSO vishing has occurred:

Immediate containment

  1. Contain identity first - Revoke sessions, reset credentials, rotate tokens, invalidate suspicious factor enrollments
  2. Audit MFA and factor changes - Identify who/what changed authenticators, recovery methods, or policies
  3. Inventory SaaS access - Review app dashboards, OAuth grants, connected apps, API usage, and export logs

Investigation

  1. Hunt for secondary access paths - Mailbox rules/forwarders, additional IdP accounts, support-tool enrollments
  2. Timeline reconstruction - Map the attack chain from initial call to data exfiltration

Preparation

  1. Prepare for extortion - Preserve evidence, coordinate legal/comms, and validate any leaked samples

Conclusion

The ShinyHunters claim reinforces a growing pattern: identity is the perimeter, and voice-based social engineering combined with real-time phishing infrastructure can defeat traditional MFA.

Key Action

Move to phishing-resistant MFA (FIDO2/passkeys) for SSO and admin accounts as a priority

Organizations should treat this as a wake-up call to:

  1. Enforce phishing-resistant MFA
  2. Harden helpdesk verification procedures
  3. Restrict and monitor SaaS bulk exports
  4. Build detection around identity-to-SaaS correlation

Frequently Asked Questions

ShinyHunters is a threat actor group known for data breaches and extortion. They operate a leak site to pressure victims into paying to prevent data publication. The group has been linked to numerous high-profile breaches.

SSO vishing combines voice phishing (phone calls impersonating IT/helpdesk) with real-time phishing infrastructure to steal single sign-on credentials and bypass MFA. Attackers guide victims through fake login flows while capturing credentials and MFA tokens in real time.

Modern vishing kits act as real-time proxies. When the victim enters an OTP or approves a push notification, the kit immediately forwards it to the real login page. This defeats MFA methods that are not cryptographically bound to the legitimate site (non-phishing-resistant MFA).

Phishing-resistant MFA includes FIDO2 security keys, passkeys, and smart cards that cryptographically verify the legitimate site before authenticating. These cannot be proxied because the authentication is bound to the real domain.

Enforce phishing-resistant MFA for SSO and admin accounts, strengthen helpdesk identity verification procedures, restrict bulk data exports from SaaS applications, and monitor for unusual sign-in patterns followed by large data access.

Look for: unusual sign-ins with new devices followed by immediate MFA events, MFA approvals during reported IT support calls, bulk downloads or exports from CRM/SaaS shortly after authentication, and new OAuth app grants or connected apps.

Comments

Want to join the discussion?

Create an account to unlock exclusive member content, save your favorite articles, and join our community of IT professionals.

Sign in