Threat Intelligence

ShinyHunters SaaS Theft: Mandiant Hardening Guide

ShinyHunters just bragged about breaching over 20 SaaS companies via slick vishing. Mandiant's got the playbook to shut them down—before your data's next on BreachForums.

ShinyHunters hackers using vishing to target SaaS SSO credentials

Key Takeaways

  • ShinyHunters uses vishing to bypass SSO/MFA without exploits—pure social engineering.
  • Immediate containment: revoke sessions, pause resets/enrollments, enforce device compliance.
  • Hard truth: upgrade to FIDO2/passkeys; train help desk on video ID verification.

Over 20 SaaS breaches claimed by ShinyHunters this year alone. That’s not hype; it’s Mandiant’s tally from their frontline tracking.

Look, I’ve chased cyber crooks from the LAPSUS$ kids to nation-state pros for two decades. And this ShinyHunters crew? They’re not script kiddies. They’re polished extortionists, rebranding old tricks like vishing—voice phishing, for the uninitiated—into a SaaS data grab that’s netting them millions on dark web forums.

But here’s the cynical truth: while vendors peddle ‘zero trust’ as the cure-all, these attacks sidestep it entirely. No exploits. No malware. Just a phone call, some stolen creds, and boom—your Okta or Entra ID is theirs. Mandiant’s report cuts through the noise with actual fixes. Not tomorrow’s AI dream, but today’s grunt work.

This activity is not the result of a security vulnerability in vendors’ products or infrastructure. Instead, these intrusions rely on the effectiveness of social engineering to bypass identity controls and pivot into cloud-based software-as-a-service (SaaS) environments.

Damn right. Vendors won’t like hearing it, but their MFA push notifications? Laughably weak against a good actor spoofing ‘urgent IT reset’ over a call.

How ShinyHunters Vish Their Way Past Your SSO

Picture this: attacker dials your help desk, poses as exec Bob from sales. Knows Bob’s manager, last four of SSN, even that recent vacation (pulled from LinkedIn or a prior breach). ‘Hey, lost my phone—MFA push isn’t working. Reset me quick?’

Help desk caves—because policy’s a joke—and enrolls a burner device. Next? SSO creds harvested via fake branded login pages, straight to SaaS loot like Snowflake or HubSpot. Mandiant’s seen it hit dozens: telecoms, healthcare, you name it.

And the escalation? They’re branding dumps as ‘ShinyHunters’ on BreachForums, auctioning terabytes. Who profits? Not victims. These guys, plus the forum admins raking ad fees.

Short para for emphasis: It’s social engineering 2.0—polished, persistent, profitable.

Now, Mandiant’s containment bible. If you’re mid-breach — and trust me, if you’re SaaS-heavy, you might be — hit these hard.

First, nuke sessions. Revoke every OAuth token, IdP login, SaaS auth. Compromised accounts? Disable ‘em yesterday.

Password resets? Lock the self-service portal. No more ‘forgot password’ for admins, period.

MFA enrollments? Pause ‘em. No new devices joining the party.

VPNs, VDI? Clamp down to compliant boxes only. Shields up: tell service desk to eyeball every SMS ‘from colleague’ claiming emergencies.

That’s table stakes. But long game? Ditch SMS and push MFA for FIDO2 keys or passkeys. Social engineering can’t phish a hardware token dangling from your lanyard.

Why Your ‘Modern’ MFA is ShinyHunters’ Best Friend

Push auth feels slick—tap approve on your phone. But attackers game it. Vish the user: ‘Approve this reset?’ User, half-asleep, taps yes. Done.

Mandiant nails it: transition to phishing-resistant MFA. I’ve seen orgs drag feet here, citing ‘user friction.’ Friction saves money—your data exfil costs way more.

Unique angle nobody’s saying: this reeks of 2022’s LAPSUS$ playbook, but evolved. Back then, teen hackers vished Nvidia. Now pros target enterprise SaaS for steady extortion cash. Prediction? AI voice clones next—Deepfake your CFO begging for a reset. Banks are testing it already; your IT team better.

Hardening details — because containment’s just the start.

Help desk? Mandate live video ID checks. User holds gov ID to face; agent verifies match, cross-checks HR records, pings manager out-of-band. No SSN guesses, no ‘I know my manager’s name.’ ShinyHunters posse thrives on that lazy crap.

Vendor impersonation? Train ‘em to spot it. ‘Third-party SaaS install request’? Manual approval only, with callback to known numbers.

Device compliance — enforce it. IdP access from managed laptops only, trusted IPs. Non-corp phone trying SSO? Blocked.

Logging? Amp it up. IdP event logs for anomalous enrollments, geos, session spikes. SIEM rules: alert on MFA device adds from new UAs.

Can You Actually Stop ShinyHunters Cold?

Yes — if you gut-check processes. I’ve covered breaches where ‘we had MFA’ was the punchline. It wasn’t phishing-resistant.

Manual verification during threats: route resets via video KYC. HR in loop for offboarding checks. No SMS ops changes—ever.

And communicate. Blast users: ‘Suspicious calls? Hang up, report.’ Business units on alert.

Cynical aside: SaaS vendors profit from breaches (upsell security add-ons), but won’t fix help desk flaws. That’s on you.

Dense dive: consider integration. Pair IdP with EDR on endpoints—block non-compliant auth attempts pre-grant. Hunt queries in your SIEM for ‘enroll device’ spikes tied to vishing hours (off-hours, funny). Behavioral analytics flag Bob logging from Mumbai when he’s in Seattle. Tools like Splunk or Elastic? Feed ‘em IdP streams now.

Historical parallel: Remember SolarWinds? Supply chain hit. This is human chain—same fix, harden links.

Bold call: Orgs ignoring this get hit quarterly. ShinyHunters won’t stop; SaaS data’s too juicy.

FAQ

What is ShinyHunters data theft?

Extortion crew using vishing to steal SSO creds, raid SaaS for customer data, then sell dumps online.

How to contain ShinyHunters breach?

Revoke sessions, lock resets/enrollments, restrict access to compliant devices—per Mandiant.

Does FIDO2 stop vishing attacks?

Yes, hardware keys can’t be remotely approved like push MFA; social engineering fails.


🧬 Related Insights

Aisha Patel
Written by

Former ML engineer turned writer. Covers computer vision and robotics with a practitioner perspective.

Frequently asked questions

🧬 Related Insights?
- **Read more:** [Fortinet's FortiClient Zero-Day Lets Hackers Slip Past Logins—Patch or Perish](https://threatdigest.io/article/fortinet-issues-emergency-patch-for-forticlient-zero-day/) - **Read more:** [Germany Names REvil's Ringleaders: 130 Attacks, €35M in Pain – Justice or Just a Whack-a-Mole?](https://threatdigest.io/article/bka-identifies-revil-leaders-behind-130-german-ransomware-attacks/)

Worth sharing?

Get the best Cybersecurity stories of the week in your inbox — no noise, no spam.

Originally reported by Mandiant Blog

Stay in the loop

The week's most important stories from Threat Digest, delivered once a week.