Okta researchers reported a wave of voice-enabled phishing (vishing) attacks, which used phishing kits featuring real-time session orchestration to target users of Google, Microsoft, Okta, and cryptocurrency providers, aiming to bypass MFA and steal credentials. News outlets indicated that attackers sought to then exfiltrate data, targeting “sensitive” information.
Extortion demands received by some victims were "signed" by ShinyHunters, an extortion group tied to several high-profile attacks last year that targeted data stored in cloud & SaaS environments.
Threat-Led Defense commentary: Enforce phishing-resistant authentication methods for access to resources, such as Okta FastPass or FIDO passkeys. Consider implementing/utilizing live caller checks, where users can sign into a mobile app to verify if they are on a call with an authorized representative.
Threat-Led Defense commentary: Prevention or detection of the earlier social engineering phase (above) could mitigate this step of the attack chain. Detection of app-based exfiltration efforts provides important redundancy, though.