A sophisticated voice phishing (vishing) campaign active in 2026 is targeting organizations' Okta identity environments to gain a foothold for large-scale data theft. Analysis from Obsidian Security reveals that the campaign's tactics, techniques, and procedures (TTPs) are consistent with the tradecraft of the ShinyHunters threat group and show overlaps with Scattered Spider. The attack chain involves socially engineering help desk staff or users to gain initial access to an Okta account, immediately enrolling an attacker-controlled MFA device for persistence, and then pivoting to connected SaaS applications to exfiltrate data. This highlights a critical attack path where the compromise of a central identity provider (IdP) is used as a springboard to breach multiple downstream applications.
The attack follows a clear, multi-stage pattern:
Initial Access - Vishing (T1598.002 - Spearphishing Voice): The attacker calls an organization's IT help desk or a targeted user directly. They use social engineering to convince the target to reset a password or perform an action that gives the attacker control of their Okta account.
Persistence - MFA Manipulation (T1556.006 - Multi-Factor Authentication): Immediately upon gaining access, the attacker navigates to the Okta security settings. They enroll a new MFA factor that they control. The report notes the frequent use of emulated Android devices with Okta FastPass for this purpose. This action grants them persistent access, as they can now approve MFA prompts for the compromised account.
Discovery - Application Enumeration (T1069.003 - Cloud Groups): With persistent access to Okta, the attacker enumerates all the single sign-on (SSO) applications assigned to the compromised user. This gives them a map of what they can now access.
Lateral Movement & Exfiltration - Pivot to SaaS (T1530 - Data from Cloud Storage Object): The attacker uses their authenticated Okta session to seamlessly access connected SaaS platforms (e.g., Salesforce, GitHub, Google Workspace). Once inside these applications, they perform high-volume file access and data exfiltration.
This attack pattern is highly effective because it abuses the trust inherent in SSO. Once the identity provider is compromised, the keys to the kingdom (all connected apps) are handed over.
The impact of this campaign can be devastating. By compromising a single privileged Okta account, an attacker can gain access to a multitude of sensitive systems, including:
The result is a multi-application data breach originating from a single point of failure in the identity management layer. This can lead to intellectual property theft, massive customer data exposure, and severe business disruption.
Detecting this attack requires correlating events across the IdP and the SaaS applications.
D3-ANET: Authentication Event Thresholding to detect and alert on suspicious MFA modification events.Train IT help desk staff and all employees on the threat of voice phishing and establish strong identity verification procedures for account resets.
Implement policies that restrict or require higher scrutiny for MFA enrollment, especially after a recent password reset or from an untrusted network.
Mapped D3FEND Techniques:
Use security analytics to correlate events between the identity provider (Okta) and downstream SaaS apps to detect the full attack chain.
Mapped D3FEND Techniques:
To detect the vishing campaign targeting Okta, organizations must implement Authentication Event Thresholding focused on MFA enrollment. This involves creating high-fidelity alerts in your SIEM by correlating multiple suspicious events from the Okta System Log. The core detection rule should be: (Event: Password Reset SUCCESS) AND (Event: New MFA Device Enrolled) WITHIN 10 minutes AND (Source IP is NOT from Corporate Network). This rule specifically targets the attacker's TTP of gaining access and immediately establishing persistence. You can further enhance this by adding context like (Device is NOT Corporate-Managed) or (Source ASN is a Residential ISP). When this alert fires, it should trigger an automated response, such as temporarily suspending the account and notifying the security team and the user (via a separate channel) to investigate. This moves beyond simple, noisy alerts and creates a specific, actionable detection for this dangerous attack pattern.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats