Hackers Use Fake IT Calls to Breach Okta Accounts

Hackers Use Fake IT Calls to Breach Okta Accounts

An urgent phone call from someone claiming to be from the internal IT department has become the gateway for a sophisticated cyberattack campaign targeting corporate environments through their reliance on Okta’s single sign-on (SSO) services. Researchers have identified a concerning escalation in tactics from the notorious extortion group ShinyHunters, which has claimed responsibility for these recent breaches. This operation is not the work of a single entity but a coordinated effort involving multiple threat actor clusters, tracked as UNC6661, UNC6671, and UNC6240. These groups have developed a multi-stage intrusion method that cleverly blends traditional social engineering with modern cloud identity abuse. The attack’s success hinges on manipulating an organization’s most unpredictable asset: its employees. By exploiting the trust individuals place in their IT support staff, these attackers have found a way to circumvent otherwise robust security measures, demonstrating that the human element remains a critical vector for network infiltration in an increasingly complex digital landscape.

The Anatomy of the Attack

The Initial Contact via Voice Phishing

The attack chain commences with a highly deceptive social engineering tactic known as voice phishing, or “vishing,” executed by operatives from groups like UNC6661. These threat actors place direct calls to targeted employees, skillfully impersonating members of the company’s internal IT help desk. They create a convincing narrative, often centered around a mandatory and time-sensitive company-wide multifactor authentication (MFA) update. This pretext is specifically designed to lower the employee’s guard and instill a sense of urgency, making them more likely to comply with unusual requests. During the call, the attacker guides the unsuspecting employee to a sophisticated credential-harvesting website. This phishing site is not a generic template; it is meticulously crafted to mirror the victim organization’s legitimate branding and SSO login portal, further cementing its authenticity in the target’s mind. The combination of a live, persuasive human voice and a visually convincing digital environment makes this initial step incredibly effective at bypassing the skepticism that might be triggered by a standard phishing email.

Credential Harvesting and MFA Bypass

Once the employee is on the fraudulent website, the second stage of the attack unfolds with precision. The victim is prompted to enter their SSO credentials—username and password—which are immediately captured by the attackers. However, the true sophistication of this scheme lies in how it overcomes MFA, a security layer designed to prevent exactly this type of breach. As the employee enters their credentials, the phishing site’s backend system uses them in real-time to initiate a legitimate login attempt to the company’s actual Okta service. This action triggers a genuine MFA prompt on the employee’s registered device. The attacker, still on the phone, instructs the employee to enter the one-time code they just received into the phishing site. This live MFA code is then relayed by the attackers to complete their own login session, granting them authenticated access to the corporate network. This method effectively turns MFA into an unwitting tool for the breach, as the system’s security check is satisfied by a valid, user-provided token, all while the user believes they are participating in a routine IT procedure.

The Aftermath and Extortion Tactics

Data Exfiltration and Lateral Movement

With successful authentication, the threat actors gain a powerful foothold within the victim’s digital ecosystem. The compromised Okta SSO account acts as a master key, unlocking access to a wide array of integrated cloud-based software-as-a-service (SaaS) applications. The attackers immediately pivot from the initial point of entry to these connected platforms, which often house the organization’s most sensitive information, including financial records, customer data, intellectual property, and internal communications. Their primary objective at this stage is data exfiltration. They systematically navigate through applications like Microsoft 365, Salesforce, or internal document repositories, identifying and downloading large volumes of valuable data. This lateral movement is often difficult to detect in its early stages, as the attackers’ activities are masked by the legitimate credentials of the compromised employee account. The breach expands silently, far beyond a single user’s access, as the attackers map out the cloud environment to maximize their data haul before their presence is discovered.

The Extortion Play and Public Pressure

The final act of this coordinated campaign shifts from covert intrusion to overt extortion. A related group, identified as UNC6240, steps in to monetize the breach. They make contact with the compromised organization, presenting undeniable proof of the stolen data to validate their claims and demonstrate the severity of the situation. This proof often includes samples of highly confidential internal documents or sensitive customer information. The attackers then issue a stark ultimatum: a significant ransom payment must be made within a tight 72-hour deadline. To amplify the pressure and increase the likelihood of payment, the group has established a dedicated data leak site. They threaten to publish the entirety of the exfiltrated data on this site if their demands are not met, a move that would result in severe reputational damage, regulatory fines, and a loss of customer trust for the victim company. This calculated, high-pressure tactic transforms the technical breach into a high-stakes business crisis, forcing leadership into a difficult and time-sensitive decision.

A Coordinated Threat Evolution

The campaign highlighted the sophisticated and collaborative nature of modern cybercrime syndicates. The seamless handoff between different threat actor clusters, from the social engineers at UNC6661 who initiated the breach to the extortion specialists at UNC6240 who monetized it, pointed to a well-organized and highly specialized operation. This division of labor allowed each group to focus on their area of expertise, increasing the overall efficiency and effectiveness of the attack. The strategy represented a significant evolution from less coordinated “smash-and-grab” data thefts of the past. It was a clear demonstration of how attackers have adapted their methods to exploit the interconnectedness of modern corporate IT environments, where a single compromised identity could unlock access to an entire ecosystem of cloud services. This incident underscored the critical need for organizations to look beyond purely technical defenses and develop a more holistic security posture that accounted for the persistent and ever-evolving human element of cyber risk.

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later