Source: BleepingComputer
Author: Lawrence Abrams
URL: https://www.bleepingcomputer.com/news/security/mandiant-details-how-shinyhunters-abuse-sso-to-steal-cloud-data/
ONE SENTENCE SUMMARY:
Mandiant reports ShinyHunters using advanced phishing and vishing tactics to steal SSO credentials, leading to widespread data theft.
MAIN POINTS:
- ShinyHunters employs voice phishing to impersonate IT staff and target MFA details.
- Phishing sites mimic company login portals to steal credentials and MFA codes.
- Attackers use advanced kits to interact with victims, guiding them through MFA challenges.
- Access to SSO dashboards allows exploitation of multiple SaaS services.
- ShinyHunters and affiliates confirmed involvement and launched a data-leak site.
- UNC6661, UNC6671, and UNC6240 clusters tracked by Mandiant, highlighting attack patterns.
- Phishing domains impersonate corporate identities, supporting data theft and extortion.
- Threat actors use compromised SSO sessions to steal sensitive cloud data.
- Mandiant shares behavior detection tips and hardening recommendations for organizations.
- The report emphasizes emerging security trends and priorities for leaders into 2026.
TAKEAWAYS:
- Vishing and phishing remain critical threat vectors for stealing credentials.
- Centralized SSO access is a significant risk for data exploitation.
- Organizations must strengthen MFA and monitor for unusual account activities.
- Collaborative efforts necessary to counteract sophisticated phishing attacks.
- Security hardening and logging practices are essential for proactive defense.