The prominent cyber extortion group ShinyHunters has claimed to have breached Crunchbase, a business intelligence platform, and Betterment, a US-based financial advisory firm. The threat actor alleged on January 24, 2026, that they achieved initial access by targeting employees with voice phishing (vishing) attacks. These attacks were designed to steal credentials and session tokens for the companies' Okta single sign-on (SSO) environments. This incident highlights a dangerous trend of attackers using social engineering to bypass multi-factor authentication (MFA), particularly non-phishing-resistant methods like push notifications and one-time codes. As of this report, the claims have not been verified by Crunchbase or Betterment.
The core of this threat is the evolution of phishing from email-based attacks to sophisticated, interactive voice-based social engineering. By engaging a target in a real-time conversation, attackers can build trust and guide them through actions that compromise their accounts, even when protected by MFA.
This attack bypasses the security of many common MFA implementations by targeting the human element.
T1566.004 - Phishing: Vishing: The primary technique used for social engineering the target over the phone.T1555.003 - Credentials from Password Stores: Credentials from Web Browsers: While not directly used, the goal is the same: to obtain credentials that would be stored or used in a web browser.T1539 - Steal Web Session Cookie: The ultimate goal of the vishing attack is to capture the authenticated session cookie after the user completes the MFA challenge, allowing the attacker to impersonate the user without needing to re-authenticate.T1133 - External Remote Services: The compromised Okta credentials provide the attacker with access to the organization's cloud applications and other remote services.If ShinyHunters' claims are true, the impact could be severe:
Detecting vishing-based SSO compromise requires looking for anomalies in authentication patterns.
| Type | Value | Description |
|---|---|---|
| log_source | Okta System Log | Look for a successful user login from an IP address with no company history, or from an ISP instead of a corporate network, especially if the user is typically on-prem. |
| other | Mismatched Geolocation | An authentication request originating from one location (the user's real location) and the subsequent session activity from another (the attacker's location). |
| other | Rapid session usage | A new session being used to access an unusual number of applications in a short period of time, indicative of attacker reconnaissance. |
D3-UGLPA: User Geolocation Logon Pattern Analysis is directly applicable.D3-MFA: Multi-factor Authentication.Crucially, this involves deploying phishing-resistant MFA like FIDO2/WebAuthn, as push-based and OTP methods were bypassed.
Train employees specifically on vishing tactics and how to verify requests from purported IT staff.
The most critical defense against the vishing technique used to compromise Okta is to upgrade from phishable MFA to phishing-resistant MFA. Organizations must prioritize the deployment of FIDO2/WebAuthn compliant authenticators, such as YubiKeys or platform authenticators like Windows Hello and Apple Touch ID. These methods create a cryptographic binding between the user, the device, and the legitimate service origin (e.g., company.okta.com). When the ShinyHunters attacker directs an employee to a fake login page, a FIDO2-compliant authenticator will refuse to operate because the origin of the authentication request does not match what is registered. This completely neutralizes the attack, as the attacker cannot capture a credential or token that can be replayed.
Enhance Okta's security posture by implementing risk-based authentication policies that leverage geolocation and IP reputation. Configure rules to flag or block logins where the session usage IP differs significantly from the authentication IP. For example, if the initial authentication comes from a known residential IP in New York, but the session is immediately used from a VPN provider's IP in Romania, this should trigger a high-risk alert and potentially step-up authentication or session termination. This technique, often part of a UEBA platform, helps detect session hijacking in near real-time by identifying the geographical and network disconnect between the legitimate user and the attacker who has stolen the session token.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats