900,000 records (35,000 direct customers)
Aura, a company that sells identity theft protection services, has ironically become the victim of a data breach that exposed the records of approximately 900,000 people. The breach, confirmed on March 20, 2026, was initiated by a voice phishing (vishing) attack against an employee. The compromised credentials provided an attacker access to an internal marketing database. The ShinyHunters cybercrime group has claimed responsibility for the breach. The exposed data includes the personally identifiable information (PII) of 35,000 current and former Aura customers, including full names, email addresses, phone numbers, and physical addresses. The incident serves as a stark reminder that human-targeted attacks can bypass even robust technical security controls.
The attack on Aura demonstrates the effectiveness of social engineering as an initial access vector. Instead of exploiting a technical vulnerability, the attackers targeted a human.
Initial Access: The attack began with a vishing call (T1566.003 - Phishing: Voice). An attacker, posing as a legitimate party, manipulated an Aura employee over the phone into divulging their access credentials.
Access & Discovery: Using the stolen credentials (T1078 - Valid Accounts), the attacker gained access to Aura's internal network. They discovered a legacy marketing database, reportedly from a company Aura had acquired in 2021. This highlights the significant risk posed by incomplete integration and oversight of legacy systems during mergers and acquisitions.
Data Exfiltration: The ShinyHunters group claims to have exfiltrated 12GB of data (T1567.002 - Exfiltration Over Web Service: Exfiltration to Cloud Storage). The data was then likely put up for sale or used for further attacks.
The core of this incident is not a complex technical exploit but a failure of human and process controls.
Detecting vishing-initiated breaches requires a focus on post-compromise activity.
log_sourceVPN/SSO Logsnetwork_traffic_pattern(large data transfer)log_sourceDatabase Audit Logsuser_account_pattern(credential stuffing)Implement continuous security awareness training focused on identifying and reporting social engineering attempts like vishing.
Deploy phishing-resistant MFA (e.g., FIDO2) to protect accounts even if credentials are stolen.
Ensure legacy systems from acquisitions are integrated into security monitoring and audit processes.
Decommission or isolate legacy systems to prevent them from being used as a pivot point into the broader network.
Aura acquires a company, inheriting a marketing database that would later be compromised.
Aura confirms it suffered a data breach originating from a vishing attack. ShinyHunters claims responsibility.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.