Close Menu
    Main Menu
    • Home
    • News
    • Tech
    • Robotics
    • ML & Research
    • AI
    • Digital Transformation
    • AI Ethics & Regulation
    • Thought Leadership in AI

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Iran-Linked Hacktivists Declare Harmful Cyberattack on Medtech Agency Stryker

    March 15, 2026

    Right this moment’s NYT Mini Crossword Solutions for March 15

    March 15, 2026

    Multilingual Reasoning Gymnasium: Multilingual Scaling of Procedural Reasoning Environments

    March 15, 2026
    Facebook X (Twitter) Instagram
    UK Tech InsiderUK Tech Insider
    Facebook X (Twitter) Instagram
    UK Tech InsiderUK Tech Insider
    Home»AI Ethics & Regulation»Mandiant Finds ShinyHunters-Fashion Vishing Assaults Stealing MFA to Breach SaaS Platforms
    AI Ethics & Regulation

    Mandiant Finds ShinyHunters-Fashion Vishing Assaults Stealing MFA to Breach SaaS Platforms

    Declan MurphyBy Declan MurphyFebruary 1, 2026No Comments4 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    Mandiant Finds ShinyHunters-Fashion Vishing Assaults Stealing MFA to Breach SaaS Platforms
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link


    Ravie LakshmananJan 31, 2026Social Engineering / SaaS Safety

    Google-owned Mandiant on Friday stated it recognized an “growth in risk exercise” that makes use of tradecraft in step with extortion-themed assaults orchestrated by a financially motivated hacking group referred to as ShinyHunters.

    The assaults leverage superior voice phishing (aka vishing) and bogus credential harvesting websites mimicking focused corporations to achieve unauthorized entry to sufferer environments by amassing sign-on (SSO) credentials and multi-factor authentication (MFA) codes.

    The top purpose of the assaults is to focus on cloud-based software-as-a-service (SaaS) functions to siphon delicate information and inside communications and extort victims.

    The tech big’s risk intelligence crew stated it is monitoring the exercise below a number of clusters, together with UNC6661, UNC6671, and UNC6240 (aka ShinyHunters), in order to account for the chance that these teams might be evolving their modus operandi or mimicking beforehand noticed ways.

    Cybersecurity

    “Whereas this technique of concentrating on identification suppliers and SaaS platforms is in step with our prior observations of risk exercise previous ShinyHunters-branded extortion, the breadth of focused cloud platforms continues to develop as these risk actors search extra delicate information for extortion,” Mandiant famous.

    “Additional, they look like escalating their extortion ways with current incidents, together with harassment of sufferer personnel, amongst different ways.”

    Particulars of the vishing and credential theft exercise are as follows –

    • UNC6661 has been noticed pretending to be IT workers in calls to staff at focused sufferer organizations, directing them to credential harvesting hyperlinks below the guise of instructing them to replace their multi-factor authentication (MFA) settings. The exercise was recorded between early and mid-January 2026.
    • The stolen credentials are then used to register their very own machine for MFA after which transfer laterally throughout the community to exfiltrate information from SaaS platforms. In a minimum of one case, the risk actor weaponized their entry to compromised e-mail accounts to ship extra phishing emails to contacts at cryptocurrency-focused corporations. The emails have been subsequently deleted to cowl up the tracks. That is adopted by extortion exercise carried out by UNC6240.
    • UNC6671 has additionally been recognized as impersonating IT workers to deceive victims as a part of efforts to acquire their credentials and MFA authentication codes on victim-branded credential harvesting websites since early January 2026. In a minimum of some situations, the risk actors gained entry to Okta buyer accounts. UNC6671 has additionally leveraged PowerShell to obtain delicate information from SharePoint and OneDrive.
    • The variations between UNC6661 and UNC6671 relate to the usage of completely different area registrars for registering the credential harvesting domains (NICENIC for UNC6661 and Tucows for UNC6671), in addition to the truth that an extortion e-mail despatched following UNC6671 exercise didn’t overlap with recognized UNC6240 indicators.
    • This means that completely different units of individuals could also be concerned, illustrating the amorphous nature of those cybercrime teams. What’s extra, the concentrating on of cryptocurrency companies means that the risk actors may be trying to discover additional avenues for monetary acquire.
    Cybersecurity

    To counter the risk posed to SaaS platforms, Google has outlined an extended listing of hardening, logging, and detection suggestions –

    • Enhance assist desk processes, together with requiring personnel to require a reside video name to confirm their identification
    • Restrict entry to trusted egress factors and bodily areas; implement robust passwords; and take away SMS, cellphone name, and e-mail as authentication strategies
    • Limit management-plane entry, audit for uncovered secrets and techniques and implement machine entry controls
    • Implement logging to extend visibility into identification actions, authorizations, and SaaS export behaviors
    • Detect MFA machine enrollment and MFA life cycle adjustments; search for OAuth/app authorization occasions that recommend mailbox manipulation exercise utilizing utilities like ToogleBox E mail Recall, or identification occasions occurring outdoors regular enterprise hours

    “This exercise isn’t the results of a safety vulnerability in distributors’ merchandise or infrastructure,” Google stated. “As an alternative, it continues to spotlight the effectiveness of social engineering and underscores the significance of organizations transferring in direction of phishing-resistant MFA the place potential. Strategies equivalent to FIDO2 safety keys or passkeys are immune to social engineering in ways in which push-based, or SMS authentication usually are not.”

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Declan Murphy
    • Website

    Related Posts

    Iran-Linked Hacktivists Declare Harmful Cyberattack on Medtech Agency Stryker

    March 15, 2026

    INC Ransom Menace Targets Australia And Pacific Networks

    March 15, 2026

    ShinyHunters Claims 1 Petabyte Information Breach at Telus Digital

    March 14, 2026
    Top Posts

    Evaluating the Finest AI Video Mills for Social Media

    April 18, 2025

    Utilizing AI To Repair The Innovation Drawback: The Three Step Resolution

    April 18, 2025

    Midjourney V7: Quicker, smarter, extra reasonable

    April 18, 2025

    Meta resumes AI coaching utilizing EU person knowledge

    April 18, 2025
    Don't Miss

    Iran-Linked Hacktivists Declare Harmful Cyberattack on Medtech Agency Stryker

    By Declan MurphyMarch 15, 2026

    A hacktivist group with alleged hyperlinks to Iran’s intelligence companies has claimed accountability for a…

    Right this moment’s NYT Mini Crossword Solutions for March 15

    March 15, 2026

    Multilingual Reasoning Gymnasium: Multilingual Scaling of Procedural Reasoning Environments

    March 15, 2026

    Knowledge safety is the muse of belief in bodily AI

    March 15, 2026
    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    UK Tech Insider
    Facebook X (Twitter) Instagram
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms Of Service
    • Our Authors
    © 2026 UK Tech Insider. All rights reserved by UK Tech Insider.

    Type above and press Enter to search. Press Esc to cancel.