By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Wave of ShinyHunters vishing attacks spreading fast | Computer Weekly
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > News > Wave of ShinyHunters vishing attacks spreading fast | Computer Weekly
News

Wave of ShinyHunters vishing attacks spreading fast | Computer Weekly

News Room
Last updated: 2026/01/27 at 4:32 PM
News Room Published 27 January 2026
Share
Wave of ShinyHunters vishing attacks spreading fast | Computer Weekly
SHARE

A new and distinct wave of voice phishing (vishing) attacks attributed to the notorious ShinyHunters hacking collective is spreading fast, with defenders urged to be on their guard following breaches affecting at least three major organisations so far.

The campaign appears to involve custom vishing kits targeting Google, Microsoft and Okta environments – as Okta itself warned last week – and may have already ensnared business intelligence specialist Crunchbase, music streaming platform SoundCloud, and financial planning and investment firm Betterment.

Charles Carmakal, chief technology officer at Google Cloud’s Mandiant, is among those following the campaign as it develops.

“Mandiant is tracking a new, ongoing ShinyHunters-branded campaign using evolved vishing techniques to successfully compromise SSO credentials from victim organisations, and enrol threat actor controlled devices into victim MFA solutions,” he told Computer Weekly via email.

“This is an active and ongoing campaign. After gaining initial access, these actors pivot into SaaS environments to exfiltrate sensitive data. An actor that identifies as ShinyHunters has approached some of the victim organisations with an extortion demand.

“While this is not the result of a security vulnerability in vendors’ products or infrastructure, we strongly recommend moving toward phishing-resistant MFA, such as FIDO2 security keys or passkeys where possible,” said Carmakal.

“These protections are resistant to social engineering attacks in ways that push-based or SMS authentication are not. Administrators should also implement strict app authorisation policies and monitor logs for anomalous API activity or unauthorised device enrolments.”

Reseachers at Sophos’ Counter Threat Unit (CTU) told our sister title Cybersecurity Dive that they had been tracking about 150 hacker-controlled domains used in the campaign, most of which seem to have been created in December 2025.

CTU threat intel director Rafe Pilling said he was unable to confirm if all of those domains had been used, but noted that the attackers appeared to be using them to create target-specific phishing websites, often impersonating authentication providers, including Okta.

Victims speak out

Crunchbase has already confirmed that hackers stole and leaked a 402MB compressed archive after failing to extort its victim, but that day-to-day operations were not affected, and it has otherwise fully contained the breach. It is working with the US authorities on its investigation, and is reviewing the leaked data to determine if it needs to legally notify any users.

Separately, SoundCloud and Betterment have also disclosed data breaches. SoundCloud, which was breached in December 2025 said the intrusion took the form of unauthorised activity in an ancillary service dashboard – although its notification makes no mention of social engineering or vishing as its source. It said that the compromised data took the form of email addresses and publicly available information posted on about 20% of SoundCloud user profiles.

Betterment, meanwhile, said it detected a breach on 9 January when “an unauthorised individual gained access to certain Betterment systems through social engineering” against its marketing and operations teams. The attackers used their access to send a fraudulent cryptocurrency-related message to some customers, all of whom have been notified.

Adaptive vishing

In Okta’s advisory, the supplier warned that threat actors are rapidly iterating custom vishing kits in order to meet the specific needs of their social engineering staff.

Such kits – which likely evolved from the same lineage – are ‘sold’ on an as-a-service basis and are designed not only to intercept an unwitting victim’s credentials, but also to provide their users with the supporting, on-the-fly context they need to get their targets to approve multifactor authentication (MFA) challenges or take other actions as needed.

For example, said Okta, they could be adapted to control what pages are presented in the user’s web browser to sync to the caller’s script.

“Once you get into the driver’s seat of one of these tools, you can immediately see why we are observing higher volumes of voice-based social engineering,” said Moussa Diallo, threat researcher at Okta Threat Intelligence.

“Using these kits, an attacker on the phone to a targeted user can control the authentication flow as that user interacts with credential phishing pages. They can control what pages the target sees in their browser in perfect synchronisation with the instructions they are providing on the call.

“The threat actor can use this synchronisation to defeat any form of MFA that is not phishing-resistant,” said Diallo.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Pornhub to restrict access for UK users from next week Pornhub to restrict access for UK users from next week
Next Article New Intel Linux Driver Workaround Halves Initial Game Load Time For MHW New Intel Linux Driver Workaround Halves Initial Game Load Time For MHW
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

GNU C Library Moving From Sourceware To Linux Foundation Hosted CTI
GNU C Library Moving From Sourceware To Linux Foundation Hosted CTI
Computing
Scientists Are Using AI to Help Identify Dinosaur Footprints
Scientists Are Using AI to Help Identify Dinosaur Footprints
News
8 things your phone knows about you
8 things your phone knows about you
Mobile
WhatsApp’s new ‘lockdown’ settings add another layer of protection against cyberattacks
WhatsApp’s new ‘lockdown’ settings add another layer of protection against cyberattacks
News

You Might also Like

Scientists Are Using AI to Help Identify Dinosaur Footprints
News

Scientists Are Using AI to Help Identify Dinosaur Footprints

5 Min Read
WhatsApp’s new ‘lockdown’ settings add another layer of protection against cyberattacks
News

WhatsApp’s new ‘lockdown’ settings add another layer of protection against cyberattacks

2 Min Read
One of Apple TV’s Most Popular Shows Gets Renewal
News

One of Apple TV’s Most Popular Shows Gets Renewal

4 Min Read
Track Your Wallet, Passport, and More With a Slim AirTag Alternative Deal
News

Track Your Wallet, Passport, and More With a Slim AirTag Alternative Deal

3 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?