Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    World Liberty Financial Crashes 30% Amid Trump’s Canada Tariff Threats

    Bitcoin Price Hits 9-Month Low Amid $2.6 Billion Liquidation: What’s Next?

    BitMine Bleeds $6 Billion: Has Tom Lee’s Ethereum Supercycle Bet Turned Fatal?

    Facebook X (Twitter) Instagram
    • Artificial Intelligence
    • Business Technology
    • Cryptocurrency
    • Gadgets
    • Gaming
    • Health
    • Software and Apps
    • Technology
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Tech AI Verse
    • Home
    • Artificial Intelligence

      To avoid accusations of AI cheating, college students are turning to AI

      January 29, 2026

      ChatGPT can embrace authoritarian ideas after just one prompt, researchers say

      January 24, 2026

      Ashley St. Clair, the mother of one of Elon Musk’s children, sues xAI over Grok sexual images

      January 17, 2026

      Anthropic joins OpenAI’s push into health care with new Claude tools

      January 12, 2026

      The mother of one of Elon Musk’s children says his AI bot won’t stop creating sexualized images of her

      January 7, 2026
    • Business

      New VoidLink malware framework targets Linux cloud servers

      January 14, 2026

      Nvidia Rubin’s rack-scale encryption signals a turning point for enterprise AI security

      January 13, 2026

      How KPMG is redefining the future of SAP consulting on a global scale

      January 10, 2026

      Top 10 cloud computing stories of 2025

      December 22, 2025

      Saudia Arabia’s STC commits to five-year network upgrade programme with Ericsson

      December 18, 2025
    • Crypto

      World Liberty Financial Crashes 30% Amid Trump’s Canada Tariff Threats

      February 1, 2026

      Bitcoin Price Hits 9-Month Low Amid $2.6 Billion Liquidation: What’s Next?

      February 1, 2026

      BitMine Bleeds $6 Billion: Has Tom Lee’s Ethereum Supercycle Bet Turned Fatal?

      February 1, 2026

      The Binance Playbook: Why Crypto Twitter Hates the Biggest Exchange?

      January 31, 2026

      How Europe’s Right Wing Weaponized Crypto After Trump’s Election

      January 31, 2026
    • Technology

      This Could Save Laptop Makers From The Global RAM Shortage

      February 1, 2026

      Bikers Say This Upgrade Is Worth It For The Motorcycle You Ride Daily

      February 1, 2026

      5 Tools Craftsman Makes That DeWalt Doesn’t

      February 1, 2026

      Samsung Frame TVs Are Great, But Smart Money Shoppers Buy This Brand Instead

      February 1, 2026

      This US City Continues To Rack Up Deadly Crashes After Promising To End Them

      February 1, 2026
    • Others
      • Gadgets
      • Gaming
      • Health
      • Software and Apps
    Check BMI
    Tech AI Verse
    You are at:Home»Technology»Mandiant details how ShinyHunters abuse SSO to steal cloud data
    Technology

    Mandiant details how ShinyHunters abuse SSO to steal cloud data

    TechAiVerseBy TechAiVerseFebruary 1, 2026No Comments5 Mins Read2 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    Mandiant details how ShinyHunters abuse SSO to steal cloud data
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    Mandiant details how ShinyHunters abuse SSO to steal cloud data

    Mandiant says a wave of recent ShinyHunters SaaS data-theft attacks is being fueled by targeted voice phishing (vishing) attacks and company-branded phishing sites that steal single sign-on (SSO) credentials and multi-factor authentication (MFA) codes.

    As first reported by BleepingComputer, threat actors are impersonating corporate IT and helpdesk staff and calling employees directly, claiming that MFA settings need to be updated. During the call, the targeted employee is directed to a phishing site that resembles their company’s login portal.

    According to Okta, these sites are using advanced phishing kits that allow threat actors to display interactive dialogs while on the phone with a victim.

    While still talking to a targeted employee, the attacker relays stolen credentials in real time, triggers legitimate MFA challenges, and tells the target how to respond, including approving push notifications or entering one-time passcodes.

    This allows attackers to successfully authenticate with stolen credentials and enroll their own devices in MFA.

    Once they gain access to an account, they log in to an organization’s Okta, Microsoft Entra, or Google SSO dashboard, which acts as a centralized hub listing all SaaS applications the user has permission to access.

    Example Microsoft Entra SSO Dashboard

    These applications include Salesforce, a primary target of ShinyHunters, Microsoft 365, SharePoint, DocuSign, Slack, Atlassian, Dropbox, Google Drive, and many other internal and third-party platforms.

    For threat actors focused on data theft and extortion, the SSO dashboard becomes a springboard to a company’s cloud data, allowing them to access multiple services from a single compromised account.

    The ShinyHunters extortion group confirmed to BleepingComputer that they and some of their affiliates are behind these attacks. The extortion group also claims that other threat actors have since conducted similar attacks.

    Soon after the information about these attacks became public, the ShinyHunters extortion gang launched a data-leak site, where it began leaking data associated with these attacks.

    Today, Google Threat Intelligence Group/Mandiant released a report saying it is tracking this activity across different threat clusters tracked as UNC6661, UNC6671, and UNC6240 (ShinyHunters).

    Multiple threat actors are conducting attacks

    Mandiant says UNC6661 poses as IT staff when calling targeted employees and directs them to company-branded phishing domains used to capture SSO credentials and MFA codes. After logging in, the attackers registered their own MFA device to retain access.

    They used this access to steal data from cloud applications based on whatever permissions were available through the compromised SSO session. Mandiant believes this activity is opportunistic, with the threat actors targeting whatever SaaS applications are available.

    However, it should be noted that ShinyHunters has told BleepingComputer in the past that their primary focus is Salesforce data.

    Vishing attack phases
    Source: Mandiant

    Mandiant shared examples of logs that were created during the data theft attacks:

    • Microsoft 365 and SharePoint events showing file downloads where the User-Agent identifies PowerShell, indicating scripts or tools were used to download data.
    • Salesforce login activity originating from IP addresses later identified as used by the threat actors.
    • DocuSign audit logs showing bulk document downloads tied to the same IOCs.

    In one breach involving an Okta customer, Mandiant says the attackers enabled a Google Workspace add-on called “ToogleBox Recall,” a tool they used to search for and delete emails to hide their activity.

    “In at least one incident where the threat actor gained access to an Okta customer account, UNC6661 enabled the ToogleBox Recall add-on for the victim’s Google Workspace account, a tool designed to search for and permanently delete emails,” explains Mandiant.

    “They then deleted a “Security method enrolled” email from Okta, almost certainly to prevent the employee from identifying that their account was associated with a new MFA device.

    Mandiant says that internet domains used in the UNC6661 attacks were registered through NICENIC and commonly used the format sso.com or internal.com.

    While the initial intrusion and data theft attacks are attributed to UNC6661, Mandiant says the extortion demands were sent by ShinyHunters, aka UNC6240, and included a Tox messenger ID used by them in past extortion attempts.

    Snippet of the ShinyHunters ransom note
    Source: Mandiant

    Mandiant says another threat cluster tracked as UNC6671 is using similar vishing techniques, but with their phishing domains registered through Tucows instead.

    Unlike UNC6661, UNC6671’s extortion demands were not sent under the ShinyHunters name, used a different Tox ID for negotiation, and used aggressive pressure tactics, including harassing company personnel.

    Mandiant says the phishing domains used in these attacks follow common naming patterns designed to impersonate corporate portals.

    • Corporate SSO portals: sso[.]com, mysso[.]com, and my-sso[.]com
    • Internal portals: internal[.]com, www.internal[.]com, and myinternal[.]com
    • Support and helpdesk themes: support[.]com, ticket-[.]support, and support-[.]com
    • Identity provider impersonation: okta[.]com, azure[.]com, and onzendesk[.]com
    • Access portals: access[.]com, www.access[.]com, and myacess[.]com

    For example, matchinternal[.]com was used in the recent breach at Match Group, which exposed data for the popular Hinge, Tinder, OkCupid, and Match dating sites.

    Mandiant notes that many IP addresses tied to the campaign belong to commercial VPN services or residential proxy networks, such as Mullvad, Oxylabs, NetNut, 9Proxy, Infatica, and nsocks

    Mandiant also says that defenders should prioritize the following behavior detection to identity these types of attacks:

    • SSO account compromise followed by rapid data exfiltration from SaaS platforms.
    • PowerShell User-Agent accessing SharePoint or OneDrive
    • Unexpected Google Workspace OAuth authorization for ToogleBox Recall
    • Deletion of MFA modification notification emails

    To help organizations defend against these types of attacks, Mandiant has released hardening, logging, and detection recommendations against ShinyHunters vishing attacks.

    This guidance is organized around hardening identity workflows and authentication resets, logging the right telemetry, and detections designed to find post-vishing behavior before data theft occurs.

    Mandiant has also released rules for Google SecOps to detect ShinyHunters activity.


    The future of IT infrastructure is here

    Modern IT infrastructure moves faster than manual workflows can handle.

    In this new Tines guide, learn how your team can reduce hidden manual delays, improve reliability through automated response, and build and scale intelligent workflows on top of tools you already use.

    Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
    Previous ArticleAltra Promo Codes: Get 20% Off Plus Free Shipping
    Next Article Cloud storage payment scam floods inboxes with fake renewals
    TechAiVerse
    • Website

    Jonathan is a tech enthusiast and the mind behind Tech AI Verse. With a passion for artificial intelligence, consumer tech, and emerging innovations, he deliver clear, insightful content to keep readers informed. From cutting-edge gadgets to AI advancements and cryptocurrency trends, Jonathan breaks down complex topics to make technology accessible to all.

    Related Posts

    This Could Save Laptop Makers From The Global RAM Shortage

    February 1, 2026

    Bikers Say This Upgrade Is Worth It For The Motorcycle You Ride Daily

    February 1, 2026

    5 Tools Craftsman Makes That DeWalt Doesn’t

    February 1, 2026
    Leave A Reply Cancel Reply

    Top Posts

    Ping, You’ve Got Whale: AI detection system alerts ships of whales in their path

    April 22, 2025647 Views

    Lumo vs. Duck AI: Which AI is Better for Your Privacy?

    July 31, 2025242 Views

    6.7 Cummins Lifter Failure: What Years Are Affected (And Possible Fixes)

    April 14, 2025143 Views

    6 Best MagSafe Phone Grips (2025), Tested and Reviewed

    April 6, 2025111 Views
    Don't Miss
    Cryptocurrency February 1, 2026

    World Liberty Financial Crashes 30% Amid Trump’s Canada Tariff Threats

    World Liberty Financial Crashes 30% Amid Trump’s Canada Tariff ThreatsTrump remarks triggered panic selling as…

    Bitcoin Price Hits 9-Month Low Amid $2.6 Billion Liquidation: What’s Next?

    BitMine Bleeds $6 Billion: Has Tom Lee’s Ethereum Supercycle Bet Turned Fatal?

    Gold and Silver Erased $7 Trillion From Global Markets, Will Bitcoin Follow?

    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    About Us
    About Us

    Welcome to Tech AI Verse, your go-to destination for everything technology! We bring you the latest news, trends, and insights from the ever-evolving world of tech. Our coverage spans across global technology industry updates, artificial intelligence advancements, machine learning ethics, and automation innovations. Stay connected with us as we explore the limitless possibilities of technology!

    Facebook X (Twitter) Pinterest YouTube WhatsApp
    Our Picks

    World Liberty Financial Crashes 30% Amid Trump’s Canada Tariff Threats

    February 1, 20262 Views

    Bitcoin Price Hits 9-Month Low Amid $2.6 Billion Liquidation: What’s Next?

    February 1, 20263 Views

    BitMine Bleeds $6 Billion: Has Tom Lee’s Ethereum Supercycle Bet Turned Fatal?

    February 1, 20263 Views
    Most Popular

    A Team of Female Founders Is Launching Cloud Security Tech That Could Overhaul AI Protection

    March 12, 20250 Views

    7 Best Kids Bikes (2025): Mountain, Balance, Pedal, Coaster

    March 13, 20250 Views

    VTOMAN FlashSpeed 1500: Plenty Of Power For All Your Gear

    March 13, 20250 Views
    © 2026 TechAiVerse. Designed by Divya Tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions

    Type above and press Enter to search. Press Esc to cancel.