ForensicsS | Private Detective & Digital Forensics Investigation Experts
  • info@forensicss.com

    Send Email

  • 11400 West Olympic Blvd, Los Angeles, CA 90064

  • Home
  • About Us
  • Services
    • Domestic Investigation
      • Los Angeles Private Eye
      • Catch Cheater
      • Infidelity Investigations
      • Asset Investigations
      • Private Detective Orange County
      • Child Custody Investigations
      • Missing Person Locates
      • Wire Fraud
      • Corporate Security Investigations
      • Surveillance Operations
      • Financial Fraud Investigations
      • Bug Sweep TSCM Investigation
      • Workers Compensation Fraud Investigation
      • Asset and Hidden Finances Investigations
    • Cyber Security
      • DIGITAL EVIDENCE AUTHENTICATION
      • Cyber Bullying Online Investigation
      • Penetration Testing Service
      • Social Media Monitoring
      • Romance Scam Investigator
      • Cyber Stalking Investigation
      • Crypto Scam Investigation
      • Cyber Security Assessment
      • Cyber Harassment Online Investigator
      • Ransomware Attack Investigation
      • Social Media Investigator
      • Extortion Investigation services
      • Background Screening
      • Insurance Fraud Detective
      • Forensic Accounting
      • Online Identity Theft
      • Online Blackmail
      • Cell Phone Forensics
      • Automotive Forensics
      • Audio Video Forensics
      • E-Discovery
      • Assets Search 
      • Computer and Cell Phone Forensics
  • Closed Cases
    • Closed Cases
    • Case Details
  • News
  • Contact
310-270-0598

Confidentiality Guaranteed

310-270-0598

Confidentiality Guaranteed

Logo

Contact Info

  • 11400 West Olympic Blvd, Los Angeles, CA 90064
  • 310-270-0598
  • info@forensicss.com

    Blog Details

      ForensicsS | Private Detective & Digital Forensics Investigation Experts > News > Uncategorized > ShinyHunters issue to be in the back of SSO-account facts theft assaults
    ShinyHunters issue to be in the back of SSO-account facts theft assaults
    23
    Jan
    • ForensicsS
    • 0 Comments

    ShinyHunters issue to be in the back of SSO-account facts theft assaults

    Identity theft

    identity theft Hacker making phone calls

    The ShinyHunters extortion gang claims it is in the back of a wave of ongoing divulge phishing assaults focusing on single imprint-on (SSO) accounts at Okta, Microsoft, and Google, enabling threat actors to breach corporate SaaS platforms and clutch firm facts for extortion.

    In these assaults, threat actors impersonate IT give a increase to and talk to employees, tricking them into coming into their credentials and multi-ingredient authentication (MFA) codes on phishing web sites that impersonate firm login portals.

    Once compromised, the attackers create rep entry to to the sufferer’s SSO account, which will provide rep entry to to assorted connected enterprise capabilities and services.

    identity theft Wiz

    SSO services from Okta, Microsoft Entra, and Google enable corporations to hyperlink third-event capabilities into a single authentication lope alongside with the circulation, giving employees rep entry to to cloud services, internal instruments, and industry platforms with a single login. 

    These SSO dashboards in general list all connected services, making a compromised account a gateway into corporate methods and facts.

    Platforms steadily connected by SSO consist of Salesforce, Microsoft 365, Google Workspace, Dropbox, Adobe, SAP, Slack, Zendesk, Atlassian, and a total lot of others.

    identity theft Microsoft Entra single sign-on (SSO) dashboard
    Microsoft Entra single imprint-on (SSO) dashboard
    Source: Microsoft

    Identity theft Vishing assaults historic for facts theft

    As first reported by BleepingComputer, threat actors were accomplishing these assaults by calling employees and posing as IT crew, the spend of social engineering to persuade them to log into phishing pages and entire MFA challenges in true time.

    After having rep entry to to a sufferer’s SSO account, the attackers browse the list of connected capabilities and originate harvesting facts from the platforms on hand to that particular person.

    BleepingComputer is mindful of more than one corporations focused in these assaults that own since bought extortion requires signed by ShinyHunters, indicating that the crew turned into once in the back of the intrusions.

    BleepingComputer contacted Okta earlier this week referring to the breaches, however the firm declined to observation on the solutions theft assaults.

    Then all yet again, Okta launched a describe the day gone by describing the phishing kits historic in these divulge-based assaults, which match what BleepingComputer has been knowledgeable.

    Essentially based on Okta, the phishing kits consist of a web-based control panel that enables attackers to dynamically change what a sufferer sees on a phishing site whereas talking to them on the phone. This enables threat actors to manual victims by each and each step of the login and MFA authentication process.

    If the attackers enter stolen credentials into the true service and are brought on for MFA, they’ll picture unique dialog bins on the phishing site in true time to issue a sufferer to approve a push notification, enter a TOTP code, or make assorted authentication steps.

    identity theft Phishing kit letting attackers display different dialogs while calling victims
    A phishing kit lets attackers picture assorted dialogs whereas calling victims
    Source: Okta

    ShinyHunters issue duty

    Whereas ShinyHunters declined to observation on the assaults remaining night, the crew confirmed to BleepingComputer this morning that it is to blame for a couple of of the social engineering assaults.

    “We confirm we are behind the attacks,” ShinyHunters knowledgeable BleepingComputer. “We are unable to share further details at this time, besides the fact that Salesforce remains our primary interest and target, the rest are benefactors.”

    The crew furthermore confirmed assorted aspects of BleepingComputer’s reporting, alongside side exiguous print referring to the phishing infrastructure and domains historic in the campaign. Then all yet again, it disputed that a screenshot of a phishing kit issue-and-control server shared by Okta turned into once for its platform, claiming as an alternative that theirs turned into once constructed in-residence.

    ShinyHunters claimed it is focusing on now now not finest Okta however furthermore Microsoft Entra and Google SSO platforms.

    Microsoft talked about it has nothing to section at the moment, and Google talked about it had no evidence its merchandise were being abused in the campaign.

    “At this time, we have no indication that Google itself or its products are affected by this campaign,” a Google spokesperson knowledgeable BleepingComputer.

    ShinyHunters claims to be the spend of facts stolen in earlier breaches, such because the in style Salesforce facts theft assaults, to title and talk to employees. This facts comprises phone numbers, job titles, names, and diverse exiguous print historic to manufacture the social-engineering calls more convincing.

    Closing night, the crew relaunched its Tor facts leak site, which for the time being lists breaches at SoundCloud, Betterment, and Crunchbase.

    SoundCloud beforehand disclosed a facts breach in December 2025, whereas Betterment confirmed this month that its email platform had been abused to ship cryptocurrency scams and that facts turned into once stolen.

    Crunchbase, which had now now not beforehand disclosed a breach, confirmed this day that facts turned into once stolen from its corporate network.

    “Crunchbase detected a cybersecurity incident where a threat actor exfiltrated certain documents from our corporate network,” a firm spokesperson knowledgeable BleepingComputer. “No business operations have been disrupted by this incident. We have contained the incident and our systems are secure.”

    “Upon detecting the incident we engaged cybersecurity experts and contacted federal law enforcement. We are reviewing the impacted information to determine if any notifications are required consistent with applicable legal requirements.”


    identity theft Wiz

    Identity theft The 2026 CISO Budget Benchmark

    It be funds season! Over 300 CISOs and safety leaders own shared how they’re planning, spending, and prioritizing for the 300 and sixty five days ahead. This describe compiles their insights, allowing readers to benchmark methods, title emerging traits, and evaluate their priorities as they head into 2026.

    Learn the style prime leaders are turning investment into measurable influence.

    Read More

    • Tags

    • claim cybercrime email-fraud forensics|digital-forensics fraud Investigation malware online-scam online-scamphishing-attack private-detective scam|fraud private-eye cyber|cybersecurity private-eye phishing|phishing-attack private-investigator private-investigator hacking|hacker ShinyHunters

    Recent Posts

    • Trump’s FBI says ‘Epstein’ penal advanced postcard to pedophile Larry Nassar is FAKE
    • Epstein’s brother’s wild converse that Trump authorized his homicide is unearthed in DOJ files
    • Informant steered FBI that Jeffrey Epstein had a ‘non-public hacker’
    • Fireblocks CEO says North Korea-linked job recruitment scam centered LinkedIn profiles
    • How Criminal Millions Sprinted Via Binance, OKX, and Thoroughly different High Crypto Exchanges

    Recent Comments

    No comments to show.

    Categories

    • cybersecurity
    • Investigations
    • Uncategorized

    Recent Posts

    Trump’s FBI says ‘Epstein’ penal advanced postcard to pedophile Larry Nassar is FAKE
    January 30, 2026
    Trump’s FBI says ‘Epstein’ penal advanced postcard to pedophile Larry Nassar is FAKE
    Epstein’s brother’s wild converse that Trump authorized his homicide is unearthed in DOJ files
    January 30, 2026
    Epstein’s brother’s wild converse that Trump authorized his homicide is unearthed in DOJ files
    Informant steered FBI that Jeffrey Epstein had a ‘non-public hacker’
    January 30, 2026
    Informant steered FBI that Jeffrey Epstein had a ‘non-public hacker’

    Popular Tags

    administration calls Confirms Crypto Cyber cybercrime cybercrimefraud cybercrimehacker cybercrimephishing-attack cybersecurity Department digital-forensics email-fraud Epstein forensics|digital-forensics Former fraud hacker hackers Investigation investigationfraud Justice Korean Launches malware malwarefraud malwarephishing-attack Microsoft Million Minnesota North online-scam online-scamphishing-attack orders Patel phishing-attack Police private-detective scam|fraud private-eye cyber|cybersecurity private-eye phishing|phishing-attack private-investigator private-investigator hacking|hacker probe Trump warns

    Forensics – Trusted Experts in Surveillance, Cyber Security, Background Checks, and Digital Forensics across California.

    • 310-270-0598
    • info@forensicss.com
    • 11400 West Olympic Blvd, Los Angeles, CA 90064

    Explore

    • News
    • About
    • Our Services
    • Find A Person
    • Child Custody
    • Contact Us
    • Los Angeles
    • Orange County
    • San Diego

    Services

    • Cyber Security
    • Online Blackmail
    • Cell Phone Forensics
    • Domestic Investigation
    • Social Media Investigator
    • Crypto Scam Investigation

    Newsletter

    Sign up email to get our daily latest news & updates from us

    © Copyright 2021 by KRIGO