ShinyHunters Leads Surge in Vishing Attacks to Steal SaaS Data
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内。用户的要求是直接写文章描述,不需要特定的开头。首先,我得仔细阅读文章,抓住主要信息。 文章主要讲的是Google的Mandiant安全研究人员发现ShinyHunters团伙及其关联的威胁组织发起了大量网络攻击。攻击手段包括语音钓鱼、窃取SSO和MFA凭证,进而入侵企业环境,窃取敏感数据进行勒索。此外,攻击范围扩大,手法升级,甚至骚扰受害者。 接下来,我需要将这些要点浓缩到100字以内。确保涵盖攻击者、手段、目标和影响。避免使用复杂的术语,保持简洁明了。 最后,检查字数是否符合要求,并确保信息准确无误。 </think> Google研究人员发现ShinyHunters团伙及其关联组织正通过语音钓鱼和窃取SSO/MFA凭证对企业发起大规模网络攻击,目标是入侵云平台窃取敏感数据并进行勒索。攻击手法不断升级,涉及更多高价值企业,并出现骚扰受害者等新战术。 2026-2-2 16:39:20 Author: securityboulevard.com(查看原文) 阅读量:10 收藏

Google’s Mandiant security researchers are tracking a surge of attacks that have the hallmarks of ShinyHunters campaigns, adding that the attacks appear to the work of not only the high-profile cybercrime group itself but also other threat groups.

The extortion-focused attacks, which have been underway since at least last month, feature tactics and techniques that are consistent with earlier ShinyHunters attacks, including the use of sophisticated voice phishing (vishing) schemes and credential harvesting sites that appear related to targeted companies, the researchers wrote in a report.

The bad actors gain access to corporate environments through stolen single sign-on (SSO) and multifactor authentication (MFA) codes and then target software-as-a-service (SaaS) applications to exfiltrate sensitive data and internal communications, which they then use in their extortion demands.

The researchers wrote that the Google Threat Intelligence Group (GTIC) is tracking three threat clusters – UNC6240 (which is ShinyHunters), UNC6661, and UNC6671 – as it looks to better understand how these may groups intertwine.

“While this methodology of targeting identity providers and SaaS platforms is consistent with our prior observations of threat activity preceding ShinyHunters-branded extortion, the breadth of targeted cloud platforms continues to expand as these threat actors seek more sensitive data for extortion,” the Mandiant researchers wrote. “Further, they appear to be escalating their extortion tactics with recent incidents, including harassment of victim personnel, among other tactics.”

Reports From All Over

The report came days after cybersecurity firm Silent Push outlined a campaign that appears to dovetail with what Mandiant found. Silent Push reported what its researchers called an active “massive identity-theft campaign” that is targeting Okta SSO and other SSO platform accounts across more than 100 “high-value enterprises.”

Again, the tactics, techniques, and procedures (TTPs) behind the campaign mirror those of SLSH, an alliance between ShinyHunters and two other high-profile threat groups, Scattered Spider and Lapsus$.

“This isn’t a standard automated spray-and-pray attack; it is a human-led, high-interaction voice phishing (‘vishing’) operation designed to bypass even hardened Multi-Factor Authentication (MFA) setups,” the Silent Push researchers wrote.

Custom Vishing Kits

In a report last month, Okta Threat Intelligence researchers noted that a number of custom phishing kits used by bad actors have been enhanced to be usable in vishing campaigns. The kits are available to threat groups as a service and are increasingly being used to target Google, Microsoft, Okta, and a range of cryptocurrency providers, they wrote.

The Mandiant researchers wrote that “while [Okta researchers] associate this activity with multiple threat clusters, at least some of the activity appears to overlap with the ShinyHunters-branded operations tracked by GTIG.”

Such campaigns are raising concerns about ShinyHunters ramping up its efforts to steal information and use it to extort companies. The threat group last week announced on X (formerly Twitter) that it had stolen 14 million records that contain the sensitive information of Panera Bread customers.

“ShinyHunters’ intensified aggressive campaign represents a substantial escalation in extortion-as-a-service,” said Noelle Murata, senior security engineer with cybersecurity vendor Xcape. ” The group has moved beyond simple data theft and are systematically eroding the digital trust of prominent brands. By releasing 14 million Panera Bread records, along with vast datasets from SoundCloud, Crunchbase, and Betterment, ShinyHunters is executing a rapid attack cycle that outpaces conventional incident response.”

A Shift in Tactics

Murata noted the group’s shift to compromising identity platforms via vishing-based SSO attacks, which, as Mandiant noted, is becoming a trademark of their efforts in this new year.

It “demonstrates that even strong security perimeters are susceptible to sophisticated, human-focused exploits,” she said. “This is not just a collection of isolated breaches; it’s a calculated ‘shaming campaign’ aimed at punishing companies that refuse to pay ransoms by permanently damaging their customer relationships through leaked personally identifiable information (PII).”

The campaigns outlined by Mandiant are relatively simple. The bad actors contact targets through vishing, send the victims a phishing link used to steal SSO and MFA credentials, and use those credentials to gain access into companies’ environments. From there, they compromise and steal information from cloud applications.

Company-Branded Attacks

The UNC6661 group, since mid-January have run a campaign in which it pretends to be part of a target company’s IT staff and contacts employees claiming that they are updating MFA settings. They’re directed to credential harvesting sites that appear to be legitimate sites of the company. Their SSO and MFA credentials are captured and the bad actor registers their own device for MFA.

“In at least one case, after conducting the initial data theft, UNC6661 used their newly obtained access to compromised email accounts to send additional phishing emails to contacts at cryptocurrency-focused companies,” the researchers wrote. “The threat actor then deleted the outbound emails, likely in an attempt to obfuscate their malicious activity.”

They attributed the extortion efforts after the compromise to ShinyHunters, noting a common account used for negotiations, the “ShinyHunters-branded extortion emails,” and the use of LimeWire to host samples of the stolen data.

Similar but Different

Vishing operations tagged to UNC6671 were similar to those of UNC6661, though there were some differences, such as using a different registry for its credential harvesting domains, PowerShell to download data from Microsoft SharePoint and OneDrive, and an unbranded extortion email. The threat actors also were aggressive in their extortion tactics, including harassing people within the victim company

“The extortion tactics and difference in domain registrars suggest that separate individuals may be involved with these sets of activity,” they wrote.

Along with the report, Mandiant also released a guide to proactive defense measures organizations can take.

“I think the big takeaway here for cybersecurity practitioners should be that this isn’t just data theft, it’s ammunition collection for future attacks,” said. Denis Calderone, COO and chief revenue officer for security firm Suzu Labs. “When we see that names, phone numbers, addresses, dates of birth have been collected from 14 million Panera customers, 30 million SoundCloud users, and 20 million Betterment account holders, we immediately start imagining the new phishing attacks that are almost certainly on their way.”

Recent Articles By Author


文章来源: https://securityboulevard.com/2026/02/shinyhunters-leads-surge-in-vishing-attacks-to-steal-saas-data/
如有侵权请联系:admin#unsafe.sh