ShinyHunters Claims Breach of Crunchbase, Betterment via Okta Vishing Attacks

Extortion Group ShinyHunters Alleges Compromise of Crunchbase and Betterment Using Okta Voice Phishing

HIGH
January 25, 2026
5m read
PhishingData BreachThreat Actor

Related Entities

Threat Actors

ShinyHunters

Organizations

Hudson Rock

Products & Tech

Other

Crunchbase Betterment

Full Report

Executive Summary

The prominent cyber extortion group ShinyHunters has claimed to have breached Crunchbase, a business intelligence platform, and Betterment, a US-based financial advisory firm. The threat actor alleged on January 24, 2026, that they achieved initial access by targeting employees with voice phishing (vishing) attacks. These attacks were designed to steal credentials and session tokens for the companies' Okta single sign-on (SSO) environments. This incident highlights a dangerous trend of attackers using social engineering to bypass multi-factor authentication (MFA), particularly non-phishing-resistant methods like push notifications and one-time codes. As of this report, the claims have not been verified by Crunchbase or Betterment.


Threat Overview

The core of this threat is the evolution of phishing from email-based attacks to sophisticated, interactive voice-based social engineering. By engaging a target in a real-time conversation, attackers can build trust and guide them through actions that compromise their accounts, even when protected by MFA.

Threat Actor: ShinyHunters

  • Type: Cyber extortion and data brokerage group.
  • Known For: Breaching high-profile companies and selling or leaking the stolen data on dark web forums. They are known for their skill in gaining initial access and exfiltrating large databases.

Attack Vector: Vishing for SSO Credentials

  • Method: The attacker calls an employee, posing as IT support or a help desk agent.
  • Tactic: The attacker directs the employee to a malicious website that looks identical to their company's Okta login page. As the employee enters their username and password, the attacker captures them in real-time. When the MFA prompt (e.g., a push notification or SMS code) is sent, the attacker instructs the employee to approve it or read the code back to them. This provides the attacker with the credentials and the session token needed to access the corporate network.

Technical Analysis

This attack bypasses the security of many common MFA implementations by targeting the human element.

MITRE ATT&CK Techniques

Impact Assessment

If ShinyHunters' claims are true, the impact could be severe:

  • Full Account Takeover: Compromising an Okta SSO account can grant the attacker access to dozens or hundreds of downstream applications connected to the identity provider, including email, source code repositories, cloud infrastructure, and HR systems.
  • Data Breach: The attackers could access and exfiltrate vast amounts of sensitive data from Crunchbase (proprietary company data) and Betterment (sensitive customer financial data).
  • Regulatory and Financial Fallout: For Betterment, a breach involving customer financial information would trigger significant regulatory scrutiny from the SEC, FINRA, and state regulators, likely resulting in heavy fines and lawsuits.
  • Loss of Trust: For both companies, a confirmed breach originating from a failure to protect administrative access would severely damage customer and partner trust.

Cyber Observables for Detection

Detecting vishing-based SSO compromise requires looking for anomalies in authentication patterns.

Type Value Description
log_source Okta System Log Look for a successful user login from an IP address with no company history, or from an ISP instead of a corporate network, especially if the user is typically on-prem.
other Mismatched Geolocation An authentication request originating from one location (the user's real location) and the subsequent session activity from another (the attacker's location).
other Rapid session usage A new session being used to access an unusual number of applications in a short period of time, indicative of attacker reconnaissance.

Detection & Response

  • Detection: Implement User and Entity Behavior Analytics (UEBA) on top of Okta logs. Configure alerts for 'impossible travel' scenarios, logins from anonymous proxies (Tor, VPNs), and unusual MFA events (e.g., multiple MFA denials followed by a success). D3FEND technique D3-UGLPA: User Geolocation Logon Pattern Analysis is directly applicable.
  • Response: If a compromise is suspected, the immediate response is to terminate all active sessions for the user account in Okta, force a password reset, and temporarily disable the account. An investigation must then trace all actions taken by the compromised session to determine the extent of the breach.

Mitigation

  1. Phishing-Resistant MFA: The most effective mitigation is to move away from phishable MFA methods. Implement FIDO2/WebAuthn (e.g., YubiKeys, Windows Hello) for all users, especially privileged ones. These methods bind the authentication to the hardware and the origin domain, making it impossible for a user to complete a login on a fake site. This is the core of D3FEND's D3-MFA: Multi-factor Authentication.
  2. User Training: Conduct specific training on vishing attacks. Teach employees to be suspicious of unsolicited calls from 'IT support' and to never approve MFA prompts they did not initiate themselves. Establish a clear out-of-band procedure for verifying the identity of help desk staff.
  3. Conditional Access Policies: Configure Okta policies to restrict logins based on risk signals, such as device posture, network location, and time of day. For example, block logins from anonymous proxies or require a phishing-resistant authenticator when logging in from an untrusted network.

Timeline of Events

1
January 24, 2026
Alon Gal of Hudson Rock reports the claim by ShinyHunters regarding the breaches of Crunchbase and Betterment.
2
January 25, 2026
This article was published

MITRE ATT&CK Mitigations

Crucially, this involves deploying phishing-resistant MFA like FIDO2/WebAuthn, as push-based and OTP methods were bypassed.

Train employees specifically on vishing tactics and how to verify requests from purported IT staff.

Audit

M1047enterprise

Implement behavioral analytics on authentication logs to detect anomalous session activity.

D3FEND Defensive Countermeasures

The most critical defense against the vishing technique used to compromise Okta is to upgrade from phishable MFA to phishing-resistant MFA. Organizations must prioritize the deployment of FIDO2/WebAuthn compliant authenticators, such as YubiKeys or platform authenticators like Windows Hello and Apple Touch ID. These methods create a cryptographic binding between the user, the device, and the legitimate service origin (e.g., company.okta.com). When the ShinyHunters attacker directs an employee to a fake login page, a FIDO2-compliant authenticator will refuse to operate because the origin of the authentication request does not match what is registered. This completely neutralizes the attack, as the attacker cannot capture a credential or token that can be replayed.

Enhance Okta's security posture by implementing risk-based authentication policies that leverage geolocation and IP reputation. Configure rules to flag or block logins where the session usage IP differs significantly from the authentication IP. For example, if the initial authentication comes from a known residential IP in New York, but the session is immediately used from a VPN provider's IP in Romania, this should trigger a high-risk alert and potentially step-up authentication or session termination. This technique, often part of a UEBA platform, helps detect session hijacking in near real-time by identifying the geographical and network disconnect between the legitimate user and the attacker who has stolen the session token.

Sources & References

Okta users under attack: Modern phishing kits are turbocharging vishing attacks
Help Net Security (helpnetsecurity.com) January 24, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

ShinyHuntersvishingsocial engineeringOktaMFA bypassCrunchbaseBetterment

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading