ShinyHunters Claims Breach of Crunchbase, Betterment via Okta Vishing Attacks

Extortion Group ShinyHunters Alleges Compromise of Crunchbase and Betterment Using Okta Voice Phishing

HIGH
January 25, 2026
January 29, 2026
5m read
PhishingData BreachThreat Actor

Related Entities(initial)

Threat Actors

ShinyHunters

Organizations

Hudson Rock

Products & Tech

Okta

Other

BettermentCrunchbase

Full Report(when first published)

Executive Summary

The prominent cyber extortion group ShinyHunters has claimed to have breached Crunchbase, a business intelligence platform, and Betterment, a US-based financial advisory firm. The threat actor alleged on January 24, 2026, that they achieved initial access by targeting employees with voice phishing (vishing) attacks. These attacks were designed to steal credentials and session tokens for the companies' Okta single sign-on (SSO) environments. This incident highlights a dangerous trend of attackers using social engineering to bypass multi-factor authentication (MFA), particularly non-phishing-resistant methods like push notifications and one-time codes. As of this report, the claims have not been verified by Crunchbase or Betterment.


Threat Overview

The core of this threat is the evolution of phishing from email-based attacks to sophisticated, interactive voice-based social engineering. By engaging a target in a real-time conversation, attackers can build trust and guide them through actions that compromise their accounts, even when protected by MFA.

Threat Actor: ShinyHunters

  • Type: Cyber extortion and data brokerage group.
  • Known For: Breaching high-profile companies and selling or leaking the stolen data on dark web forums. They are known for their skill in gaining initial access and exfiltrating large databases.

Attack Vector: Vishing for SSO Credentials

  • Method: The attacker calls an employee, posing as IT support or a help desk agent.
  • Tactic: The attacker directs the employee to a malicious website that looks identical to their company's Okta login page. As the employee enters their username and password, the attacker captures them in real-time. When the MFA prompt (e.g., a push notification or SMS code) is sent, the attacker instructs the employee to approve it or read the code back to them. This provides the attacker with the credentials and the session token needed to access the corporate network.

Technical Analysis

This attack bypasses the security of many common MFA implementations by targeting the human element.

MITRE ATT&CK Techniques

Impact Assessment

If ShinyHunters' claims are true, the impact could be severe:

  • Full Account Takeover: Compromising an Okta SSO account can grant the attacker access to dozens or hundreds of downstream applications connected to the identity provider, including email, source code repositories, cloud infrastructure, and HR systems.
  • Data Breach: The attackers could access and exfiltrate vast amounts of sensitive data from Crunchbase (proprietary company data) and Betterment (sensitive customer financial data).
  • Regulatory and Financial Fallout: For Betterment, a breach involving customer financial information would trigger significant regulatory scrutiny from the SEC, FINRA, and state regulators, likely resulting in heavy fines and lawsuits.
  • Loss of Trust: For both companies, a confirmed breach originating from a failure to protect administrative access would severely damage customer and partner trust.

Cyber Observables for Detection

Detecting vishing-based SSO compromise requires looking for anomalies in authentication patterns.

Type Value Description
log_source Okta System Log Look for a successful user login from an IP address with no company history, or from an ISP instead of a corporate network, especially if the user is typically on-prem.
other Mismatched Geolocation An authentication request originating from one location (the user's real location) and the subsequent session activity from another (the attacker's location).
other Rapid session usage A new session being used to access an unusual number of applications in a short period of time, indicative of attacker reconnaissance.

Detection & Response

  • Detection: Implement User and Entity Behavior Analytics (UEBA) on top of Okta logs. Configure alerts for 'impossible travel' scenarios, logins from anonymous proxies (Tor, VPNs), and unusual MFA events (e.g., multiple MFA denials followed by a success). D3FEND technique D3-UGLPA: User Geolocation Logon Pattern Analysis is directly applicable.
  • Response: If a compromise is suspected, the immediate response is to terminate all active sessions for the user account in Okta, force a password reset, and temporarily disable the account. An investigation must then trace all actions taken by the compromised session to determine the extent of the breach.

Mitigation

  1. Phishing-Resistant MFA: The most effective mitigation is to move away from phishable MFA methods. Implement FIDO2/WebAuthn (e.g., YubiKeys, Windows Hello) for all users, especially privileged ones. These methods bind the authentication to the hardware and the origin domain, making it impossible for a user to complete a login on a fake site. This is the core of D3FEND's D3-MFA: Multi-factor Authentication.
  2. User Training: Conduct specific training on vishing attacks. Teach employees to be suspicious of unsolicited calls from 'IT support' and to never approve MFA prompts they did not initiate themselves. Establish a clear out-of-band procedure for verifying the identity of help desk staff.
  3. Conditional Access Policies: Configure Okta policies to restrict logins based on risk signals, such as device posture, network location, and time of day. For example, block logins from anonymous proxies or require a phishing-resistant authenticator when logging in from an untrusted network.

Timeline of Events

1
January 24, 2026
Alon Gal of Hudson Rock reports the claim by ShinyHunters regarding the breaches of Crunchbase and Betterment.
2
January 25, 2026
This article was published

Article Updates

January 29, 2026

Severity increased

ShinyHunters campaign expands, now impacting Bumble, Panera Bread, and Match Group. Crunchbase confirms corporate document compromise, adding to the scope of social engineering attacks.

The ShinyHunters cyber extortion group's campaign has expanded, now claiming breaches against Bumble Inc., Panera Bread Co., and Match Group Inc., in addition to previously reported incidents. Bumble confirmed a contractor's account was phished, leading to brief network access, while Match Group acknowledged limited user data exposure. Panera Bread reported access to customer contact information. Crucially, Crunchbase, previously unconfirmed, has now reported that corporate network documents were affected in a contained incident. These new disclosures highlight the broader impact of ShinyHunters' social engineering tactics, which primarily target credentials and contact data for potential follow-on attacks.

Sources & References(when first published)

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

BettermentCrunchbaseMFA bypassOktaShinyHunterssocial engineeringvishing

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading