Mandiant Says ShinyHunters Use Voice Phishing to Compromise SSO and Steal Cloud Data

Related

ShinyHunters Defaces Canvas Login Portals at 330 Schools in Escalating Extortion Campaign

What happened ShinyHunters escalated its ongoing extortion campaign against Instructure...

Share

What happened

Mandiant has reported that threat activity linked to ShinyHunters is using voice phishing to compromise single sign-on credentials and access cloud-hosted data. The activity involves impersonation of corporate IT or helpdesk staff during live phone calls, directing targeted employees to phishing sites that mimic legitimate SSO login portals. These sites capture both credentials and MFA codes during the interaction, allowing attackers to authenticate into enterprise SSO dashboards. Once access is obtained, the compromised identity is used to move laterally into connected SaaS platforms and extract data. Mandiant described the activity as part of a broader wave of SaaS-focused data theft incidents.

Who is affected

Organizations using SSO-connected SaaS platforms are affected when employees are successfully targeted by voice phishing campaigns that lead to unauthorized access.

Why CISOs should care

The activity shows how social engineering can bypass identity controls such as SSO and MFA, enabling attackers to misuse legitimate access paths to steal cloud data.

3 practical actions

  • Review SSO authentication logs. Look for anomalous access patterns following user phone interactions.
  • Strengthen anti-phishing training. Include voice-based social engineering scenarios.
  • Evaluate identity security controls. Assess additional safeguards beyond standard MFA.
IMG 0514 2
+ posts

John Kevin Hao is a news and feature writer covering cybersecurity, technology, and business targeted for professional audiences.