Scattered LAPSUS$ Hunters Targeting Okta SSO Credentials in Massive Vishing Campaign

Scattered LAPSUS$ Hunters are conducting a large-scale vishing campaign targeting Okta Single Sign-On credentials across over 100 enterprises.

Scattered LAPSUS$ Hunters Targeting Okta SSO Credentials in Massive Vishing Campaign
Andrew Wallace

Andrew Wallace

Professional Tech Editor

Focuses on professional-grade hardware, software, and enterprise solutions.

A sophisticated identity theft operation is underway, with the Scattered LAPSUS$ Hunters (SLH) cybercriminal group targeting Okta Single Sign-On (SSO) credentials across more than 100 major enterprises. This campaign employs advanced voice phishing (vishing) techniques to infiltrate corporate infrastructures and exfiltrate sensitive data.

The Threat: Scattered LAPSUS$ Hunters (SLH)

SLH is a formidable cybercrime collective formed by the merger of Scattered Spider, LAPSUS$, and ShinyHunters. This alliance leverages the social engineering prowess of Scattered Spider, the extortion strategies of LAPSUS$, and the data theft capabilities of ShinyHunters to execute complex attacks targeting enterprise identity providers. (silentpush.com)

Vishing Campaign Details

The attackers utilize a 'Live Phishing Panel' to conduct real-time interception of login credentials and Multi-Factor Authentication (MFA) tokens. During vishing calls, they guide victims through login processes while simultaneously capturing sensitive information, effectively bypassing security measures. (silentpush.com)

Targeted Organizations

Approximately 100 organizations spanning various industries are under attack. Notable targets include Atlassian, Morningstar, American Water, GameStop, and Telstra. While these companies have been identified as targets, there is currently no confirmed evidence of successful breaches. (silentpush.com)

Potential Risks and Implications

If attackers gain access to Okta sessions, they obtain a 'skeleton key' to all applications within the corporate environment. This access facilitates data exfiltration, lateral movement within networks, and potential data encryption for ransom demands. Traditional security awareness training may be insufficient against such sophisticated threats, as SLH operators employ highly persuasive tactics, often manipulating live phishing pages to match specific login prompts. (silentpush.com)

Protective Measures

Organizations are advised to:

  • Educate Employees: Raise awareness about ongoing vishing campaigns and encourage reporting of suspicious communications.
  • Audit Access Logs: Review Okta and other SSO provider logs for unusual activities, such as new device enrollments followed by logins from unfamiliar IP addresses.
  • Implement Phishing-Resistant MFA: Adopt FIDO2-based MFA solutions to enhance security against phishing attacks.
  • Verify IT Support Communications: Establish official channels to confirm the legitimacy of IT support requests.

By proactively addressing these areas, organizations can bolster their defenses against SLH's sophisticated vishing campaigns.

  • Silent Push's Announcement on Vishing Campaign Targeting Okta (einpresswire.com)
  • UpGuard's Report on Okta Data Breach (upguard.com)

React to this story

Related Posts