Okta has issued a warning about a new wave of highly sophisticated voice-based social engineering (vishing) attacks using custom phishing kits designed to steal Single Sign-On (SSO) credentials. These phishing kits are sold under a “phishing-as-a-service” model and are actively used by multiple threat groups to target identity providers such as Okta, Microsoft, and Google, as well as cryptocurrency platforms. Unlike traditional phishing pages, these kits operate as adversary-in-the-middle (AiTM) platforms that enable real-time interaction during voice calls. Attackers impersonate corporate IT or helpdesk staff and guide victims to specially crafted phishing websites. As users enter their credentials, the data is instantly relayed to attackers, who attempt to authenticate in real time. When MFA challenges appear, the phishing page dynamically updates to match the legitimate login flow, making fraudulent prompts appear genuine. Threat actors conduct reconnaissance on targeted employees, learning which applications they use and spoofing corporate phone numbers to gain trust. Victims are often tricked into providing MFA one-time passwords or approving push notifications, allowing attackers to fully bypass modern push-based MFA controls, including number matching. Once compromised, attackers gain access to the victim’s Okta SSO dashboard, which acts as a gateway to critical enterprise platforms such as Microsoft 365, Google Workspace, Salesforce, Slack, Zoom, Dropbox, and Jira. This enables large-scale data theft, with Salesforce being a frequent target due to its ease of data extraction. After exfiltration, attackers issue extortion demands, threatening to leak stolen data. Some attacks have been linked to the ShinyHunters extortion group. These campaigns are currently targeting organizations in the financial, fintech, wealth management, and advisory sectors. Okta strongly recommends adopting phishing-resistant MFA, including Okta FastPass, FIDO2 security keys, or passkeys, and emphasizes continuous employee security awareness training to reduce the risk of social engineering attacks.
A critical security vulnerability has been disclosed in the GNU InetUtils telnet daemon (telnetd) that allows remote attackers to gain unauthorized root access to affected systems....
Oracle has released its January 2026 Critical Patch Update (CPU), delivering 337 security patches that address around 230 unique CVEs across more than 30 Oracle product families. T...
The attack begins with a fraudulent PNB MetLife payment gateway webpage designed to closely mimic the insurer’s legitimate premium payment portal. Victims are typically lured via...