The prominent cyber extortion group ShinyHunters has claimed to have breached Crunchbase, a business intelligence platform, and Betterment, a US-based financial advisory firm. The threat actor alleged on January 24, 2026, that they achieved initial access by targeting employees with voice phishing (vishing) attacks. These attacks were designed to steal credentials and session tokens for the companies' Okta single sign-on (SSO) environments. This incident highlights a dangerous trend of attackers using social engineering to bypass multi-factor authentication (MFA), particularly non-phishing-resistant methods like push notifications and one-time codes. As of this report, the claims have not been verified by Crunchbase or Betterment.
The core of this threat is the evolution of phishing from email-based attacks to sophisticated, interactive voice-based social engineering. By engaging a target in a real-time conversation, attackers can build trust and guide them through actions that compromise their accounts, even when protected by MFA.
This attack bypasses the security of many common MFA implementations by targeting the human element.
T1566.004 - Phishing: Vishing: The primary technique used for social engineering the target over the phone.T1555.003 - Credentials from Password Stores: Credentials from Web Browsers: While not directly used, the goal is the same: to obtain credentials that would be stored or used in a web browser.T1539 - Steal Web Session Cookie: The ultimate goal of the vishing attack is to capture the authenticated session cookie after the user completes the MFA challenge, allowing the attacker to impersonate the user without needing to re-authenticate.T1133 - External Remote Services: The compromised Okta credentials provide the attacker with access to the organization's cloud applications and other remote services.If ShinyHunters' claims are true, the impact could be severe:
Detecting vishing-based SSO compromise requires looking for anomalies in authentication patterns.
| Type | Value | Description |
|---|---|---|
| log_source | Okta System Log | Look for a successful user login from an IP address with no company history, or from an ISP instead of a corporate network, especially if the user is typically on-prem. |
| other | Mismatched Geolocation | An authentication request originating from one location (the user's real location) and the subsequent session activity from another (the attacker's location). |
| other | Rapid session usage | A new session being used to access an unusual number of applications in a short period of time, indicative of attacker reconnaissance. |
D3-UGLPA: User Geolocation Logon Pattern Analysis is directly applicable.D3-MFA: Multi-factor Authentication.ShinyHunters campaign expands, now impacting Bumble, Panera Bread, and Match Group. Crunchbase confirms corporate document compromise, adding to the scope of social engineering attacks.
The ShinyHunters cyber extortion group's campaign has expanded, now claiming breaches against Bumble Inc., Panera Bread Co., and Match Group Inc., in addition to previously reported incidents. Bumble confirmed a contractor's account was phished, leading to brief network access, while Match Group acknowledged limited user data exposure. Panera Bread reported access to customer contact information. Crucially, Crunchbase, previously unconfirmed, has now reported that corporate network documents were affected in a contained incident. These new disclosures highlight the broader impact of ShinyHunters' social engineering tactics, which primarily target credentials and contact data for potential follow-on attacks.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats