Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Mandiant Finds ShinyHunters-Style Vishing Attacks Stealing MFA to Breach SaaS Platforms

Posted on January 31, 2026January 31, 2026 By CWS

Ravie LakshmananJan 31, 2026Social Engineering / SaaS Safety
Google-owned Mandiant on Friday stated it recognized an “enlargement in risk exercise” that makes use of tradecraft in line with extortion-themed assaults orchestrated by a financially motivated hacking group referred to as ShinyHunters.
The assaults leverage superior voice phishing (aka vishing) and bogus credential harvesting websites mimicking focused corporations to achieve unauthorized entry to sufferer environments by amassing sign-on (SSO) credentials and multi-factor authentication (MFA) codes.
The top objective of the assaults is to focus on cloud-based software-as-a-service (SaaS) purposes to siphon delicate knowledge and inner communications and extort victims.
The tech large’s risk intelligence crew stated it is monitoring the exercise underneath a number of clusters, together with UNC6661, UNC6671, and UNC6240 (aka ShinyHunters), in order to account for the chance that these teams may very well be evolving their modus operandi or mimicking beforehand noticed ways.

“Whereas this technique of focusing on id suppliers and SaaS platforms is in line with our prior observations of risk exercise previous ShinyHunters-branded extortion, the breadth of focused cloud platforms continues to broaden as these risk actors search extra delicate knowledge for extortion,” Mandiant famous.

“Additional, they look like escalating their extortion ways with latest incidents, together with harassment of sufferer personnel, amongst different ways.”

Particulars of the vishing and credential theft exercise are as follows –

UNC6661 has been noticed pretending to be IT workers in calls to workers at focused sufferer organizations, directing them to credential harvesting hyperlinks underneath the guise of instructing them to replace their multi-factor authentication (MFA) settings. The exercise was recorded between early and mid-January 2026.
The stolen credentials are then used to register their very own system for MFA after which transfer laterally throughout the community to exfiltrate knowledge from SaaS platforms. In not less than one case, the risk actor weaponized their entry to compromised e-mail accounts to ship extra phishing emails to contacts at cryptocurrency-focused corporations. The emails had been subsequently deleted to cowl up the tracks. That is adopted by extortion exercise performed by UNC6240.
UNC6671 has additionally been recognized as impersonating IT workers to deceive victims as a part of efforts to acquire their credentials and MFA authentication codes on victim-branded credential harvesting websites since early January 2026. In not less than some cases, the risk actors gained entry to Okta buyer accounts. UNC6671 has additionally leveraged PowerShell to obtain delicate knowledge from SharePoint and OneDrive.
The variations between UNC6661 and UNC6671 relate to using completely different area registrars for registering the credential harvesting domains (NICENIC for UNC6661 and Tucows for UNC6671), in addition to the truth that an extortion e-mail despatched following UNC6671 exercise didn’t overlap with recognized UNC6240 indicators.
This means that completely different units of individuals could also be concerned, illustrating the amorphous nature of those cybercrime teams. What’s extra, the focusing on of cryptocurrency corporations means that the risk actors may additionally be seeking to discover additional avenues for monetary achieve.

To counter the risk posed to SaaS platforms, Google has outlined a protracted listing of hardening, logging, and detection suggestions –

Enhance assist desk processes, together with requiring personnel to require a dwell video name to confirm their id
Restrict entry to trusted egress factors and bodily places; implement sturdy passwords; and take away SMS, telephone name, and e-mail as authentication strategies
Limit management-plane entry, audit for uncovered secrets and techniques and implement system entry controls
Implement logging to extend visibility into id actions, authorizations, and SaaS export behaviors
Detect MFA system enrollment and MFA life cycle adjustments; search for OAuth/app authorization occasions that counsel mailbox manipulation exercise utilizing utilities like ToogleBox E-mail Recall, or id occasions occurring exterior regular enterprise hours

“This exercise just isn’t the results of a safety vulnerability in distributors’ merchandise or infrastructure,” Google stated. “As a substitute, it continues to focus on the effectiveness of social engineering and underscores the significance of organizations transferring in direction of phishing-resistant MFA the place doable. Strategies resembling FIDO2 safety keys or passkeys are proof against social engineering in ways in which push-based, or SMS authentication will not be.”

The Hacker News Tags:Attacks, Breach, Finds, Mandiant, MFA, Platforms, SaaS, ShinyHuntersStyle, Stealing, Vishing

Post navigation

Previous Post: CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms
Next Post: SCADA Vulnerability Triggers DoS, Potentially Disrupting Industrial Operations

Related Posts

Five New Exploited Bugs Land in CISA’s Catalog — Oracle and Microsoft Among Targets The Hacker News
RondoDox Botnet Exploits Flaws in TBK DVRs and Four-Faith Routers to Launch DDoS Attacks The Hacker News
U.K. Arrests Two Teen Scattered Spider Hackers Linked to August 2024 TfL Cyber Attack The Hacker News
RaccoonO365 Phishing Network Dismantled as Microsoft, Cloudflare Take Down 338 Domains The Hacker News
295 Malicious IPs Launch Coordinated Brute-Force Attacks on Apache Tomcat Manager The Hacker News
Qilin Ransomware Turns South Korean MSP Breach Into 28-Victim ‘Korean Leaks’ Data Heist The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • SCADA Vulnerability Triggers DoS, Potentially Disrupting Industrial Operations
  • Mandiant Finds ShinyHunters-Style Vishing Attacks Stealing MFA to Breach SaaS Platforms
  • CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms
  • Metasploit Releases 7 New Exploit Modules covering FreePBX, Cacti and SmarterMail
  • In Other News: Paid for Being Jailed, Google’s $68M Settlement, CISA Chief’s ChatGPT Leak

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • SCADA Vulnerability Triggers DoS, Potentially Disrupting Industrial Operations
  • Mandiant Finds ShinyHunters-Style Vishing Attacks Stealing MFA to Breach SaaS Platforms
  • CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms
  • Metasploit Releases 7 New Exploit Modules covering FreePBX, Cacti and SmarterMail
  • In Other News: Paid for Being Jailed, Google’s $68M Settlement, CISA Chief’s ChatGPT Leak

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark