Mandiant Says ShinyHunters Use Voice Phishing to Compromise SSO and Steal Cloud Data

Related

CISOs and Security Leaders to Watch in Australian Media and Entertainment

Cybersecurity in media and entertainment has quietly become one...

Moltbook AI Vulnerability Exposes Email Addresses, Login Tokens, and API Keys

What happened A security vulnerability in the Moltbook AI agent...

Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing Data

What happened Socket researchers uncovered multiple malicious Chrome extensions that...

NationStates Confirms Data Breach and Temporarily Shuts Down Game Site

What happened NationStates confirmed a data breach after unauthorized remote...

Iran-Linked RedKitten Cyber Campaign Targets Human Rights NGOs and Activists

What happened A cyber espionage campaign attributed to an Iran-linked...

Share

What happened

Mandiant has reported that threat activity linked to ShinyHunters is using voice phishing to compromise single sign-on credentials and access cloud-hosted data. The activity involves impersonation of corporate IT or helpdesk staff during live phone calls, directing targeted employees to phishing sites that mimic legitimate SSO login portals. These sites capture both credentials and MFA codes during the interaction, allowing attackers to authenticate into enterprise SSO dashboards. Once access is obtained, the compromised identity is used to move laterally into connected SaaS platforms and extract data. Mandiant described the activity as part of a broader wave of SaaS-focused data theft incidents.

Who is affected

Organizations using SSO-connected SaaS platforms are affected when employees are successfully targeted by voice phishing campaigns that lead to unauthorized access.

Why CISOs should care

The activity shows how social engineering can bypass identity controls such as SSO and MFA, enabling attackers to misuse legitimate access paths to steal cloud data.

3 practical actions

  • Review SSO authentication logs. Look for anomalous access patterns following user phone interactions.
  • Strengthen anti-phishing training. Include voice-based social engineering scenarios.
  • Evaluate identity security controls. Assess additional safeguards beyond standard MFA.