Netcrook Logo
👤 LOGICFALCON
🗓️ 28 Jan 2026   🌍 North America

Inside the ShinyHunters Heist: How Cybercriminals Orchestrated a Global Phishing Blitz

A sprawling social engineering campaign targets over 100 organizations with real-time phishing and extortion tactics.

In the shadowy corridors of the cyber underworld, a new breed of attackers is rewriting the rules of digital extortion. Over the past month, the notorious ShinyHunters group - alongside their confederates - has unleashed a sophisticated phishing campaign, setting their sights on more than 100 organizations across the globe. From biotech giants to gaming powerhouses, few sectors have been spared. As the dust settles, the question remains: how did this campaign slip past some of the world’s most advanced defenses?

Fast Facts

  • Over 100 organizations across diverse sectors were targeted in the campaign.
  • Attackers created convincing fake domains to launch phishing and "vishing" attacks on employees.
  • Real-time social engineering was used to bypass multi-factor authentication (MFA) on Okta and other identity platforms.
  • Major companies including Atlassian, Canva, Epic Games, and Moderna were named as targets.
  • Stolen data was used for extortion and published on leak sites, with millions of records exposed.

Security firm Silent Push first sounded the alarm, uncovering a web of fake domains designed to mimic corporate login pages. The campaign’s technical backbone? A blend of traditional phishing and voice phishing (“vishing”), with attackers calling employees to walk them through fake authentication steps. Their main target: single sign-on (SSO) accounts, particularly those protected by Okta and similar platforms.

What sets this campaign apart is the attackers’ use of real-time session orchestration. Instead of simply stealing credentials, the hackers deploy client-side scripts that allow them to manipulate the authentication process in a victim’s browser as the victim interacts with them on the phone. This hands-on approach convinces targets to approve push notifications or supply one-time passcodes - effectively neutralizing standard MFA protections.

The strategy appears to be working. ShinyHunters’ leak site has listed companies like Betterment, Crunchbase, and SoundCloud, all of which have confirmed breaches. Millions of records have been dumped online, and some victims have faced extortion demands. According to Google’s Mandiant unit, once inside, the attackers pivot to steal sensitive data from SaaS environments - potentially impacting customers, partners, and internal operations.

The campaign has not exploited a flaw in the software itself; rather, it preys on human trust and the limitations of push-based MFA. Experts now urge organizations to adopt phishing-resistant technologies like FIDO2 security keys or passkeys, which are less susceptible to social engineering. They also recommend stricter app authorization policies and vigilant monitoring for unusual API activity or device enrollments.

As the ShinyHunters saga unfolds, it’s a stark reminder that the weakest link is often not technology, but people. The campaign’s success hinges on real-time manipulation and psychological pressure - proof that cybercriminals are evolving as quickly as the defenses designed to stop them. For defenders, the lesson is clear: in the age of social engineering, security is a moving target.

WIKICROOK

  • Phishing: Phishing is a cybercrime where attackers send fake messages to trick users into revealing sensitive data or clicking malicious links.
  • Vishing: Vishing is a phone scam where attackers impersonate trusted entities to steal sensitive information or money through deceptive calls.
  • Single Sign: Single Sign-On (SSO) lets users access multiple services with one login, simplifying access but increasing risk if credentials are compromised.
  • Multi: Multi refers to using a combination of different technologies or systems - like LEO and GEO satellites - to improve reliability, coverage, and security.
  • FIDO2 Security Key: A FIDO2 Security Key is a small device that lets you securely log in to accounts without passwords, using USB, NFC, or Bluetooth.
ShinyHunters phishing extortion

LOGICFALCON LOGICFALCON
Log Intelligence Investigator
← Back to news