Okta SSO accounts targeted in vishing-based data theft attacks
Recorded: Jan. 22, 2026, 10:03 p.m.
| Original | Summarized |
Okta SSO accounts targeted in vishing-based data theft attacks News Featured Zendesk ticket systems hijacked in massive global spam wave Hackers breach Fortinet FortiGate devices, steal firewall configs Fake Lastpass emails pose as password vault backup alerts Hackers exploit 29 zero-days on second day of Pwn2Own Automotive Okta SSO accounts targeted in vishing-based data theft attacks This $35 Swifdoo PDF editor license lasts for life Curl ending bug bounty program after flood of AI slop reports SmarterMail auth bypass flaw now exploited to hijack admin accounts Tutorials Latest How to access the Dark Web using the Tor Browser How to enable Kernel-mode Hardware-enforced Stack Protection in Windows 11 How to use the Windows Registry Editor How to backup and restore the Windows Registry How to start Windows in Safe Mode How to remove a Trojan, Virus, Worm, or other Malware How to show hidden files in Windows 7 How to see hidden files in Windows Webinars Latest Qualys BrowserCheck STOPDecrypter AuroraDecrypter FilesLockerDecrypter AdwCleaner ComboFix RKill Junkware Removal Tool Deals Categories eLearning IT Certification Courses Gear + Gadgets Security VPNs Popular Best VPNs How to change IP address Access the dark web safely Best VPN for YouTube Forums Virus Removal Guides HomeNewsSecurityOkta SSO accounts targeted in vishing-based data theft attacks Okta SSO accounts targeted in vishing-based data theft attacks By Lawrence Abrams January 22, 2026 Okta is warning about custom phishing kits built specifically for voice-based social engineering (vishing) attacks. BleepingComputer has learned that these kits are being used in active attacks to steal Okta SSO credentials for data theft. The core features of these phishing kits are real-time manipulation of targets through scripts that give the caller direct control over the victim's authentication process. A C2 panel allowing real-time control of authentication flowsSource: Okta Okta SSO dashboard gives SSO access to a company's platformsSource: Okta The 2026 CISO Budget Benchmark Related Articles: Data Theft Lawrence Abrams Previous Article Post a Comment Community Rules You need to login in order to post a comment You may also like: Popular Stories Fortinet admins report patched FortiGate firewalls getting hacked Ingram Micro says ransomware attack affected 42,000 people Tesla hacked, 37 zero-days demoed at Pwn2Own Automotive 2026 Sponsor Posts Identity Governance & Threat Detection in one: Get a guided tour of our platform Overdue a password health-check? Audit your Active Directory for free Discover how phishing kits are sold and deployed. Download the full research report. Upcoming Webinar Follow us: Main Sections News Community Forums Useful Resources Welcome Guide Company About BleepingComputer Terms of Use - Privacy Policy - Ethics Statement - Affiliate Disclosure Copyright @ 2003 - 2026 Bleeping Computer® LLC - All Rights Reserved Login Username Password Remember Me Sign in anonymously Sign in with Twitter Not a member yet? Register Now Help us understand the problem. What is going on with this comment? Spam Abusive or Harmful Inappropriate content Strong language Other Read our posting guidelinese to learn what content is prohibited. Submitting... |
Okta is issuing a critical warning regarding a sophisticated, newly emerging threat vector: adversary-in-the-middle phishing kits specifically designed for voice-based social engineering attacks, commonly referred to as “vishing.” BleepingComputer has investigated this trend, revealing that these kits are being actively utilized by multiple hacking groups to steal Okta Single Sign-On (SSO) credentials, impacting organizations across various sectors including Fintech, wealth management, and financial services. This methodology represents a significant escalation in social engineering tactics, exploiting the increasing reliance on SSO systems. The core of the threat lies in the creation of “as a service” phishing kits. These kits are not static pages but rather dynamic platforms that adapt to the ongoing conversation with the targeted employee. Unlike traditional phishing websites, these kits are built around live interactions via voice calls. They allow attackers to manipulate the authentication process in real-time, directly responding to the employee's input within the call. This capability is achieved through custom scripts that give the caller immediate control over the victim’s authentication flow. Threat actors meticulously plan these attacks, performing reconnaissance on targeted employees. This reconnaissance includes identifying the applications they use, and most importantly, obtaining their phone numbers. Based on this information, attackers craft meticulously tailored phishing pages that resemble legitimate corporate or helpdesk websites. They then initiate contact with the victim, presenting themselves as IT staff and offering assistance with setting up passkeys – a common method for securing Okta SSO access. During the call, the attacker guides the employee to visit the specially designed phishing site. As the employee enters their username and password on the site, the credentials are immediately relayed to the attacker’s backend, often utilizing Telegram channels. A critical component of these kits is a C2 (Command and Control) panel, which facilitates real-time control over the authentication process. This C2 panel synchronizes the phishing website with the ongoing voice call, ensuring that the authentication prompts accurately reflect the information being presented during the call. For instance, if a push notification or Time-Based One-Time Password (TOTP) challenge is presented, the attacker can instantly update the phishing site to display the corresponding prompt, further enhancing the deception. Okta researchers have discovered that these vishing kits are particularly effective at bypassing modern push-based MFA systems. The attackers skillfully instruct victims on which number to select during a push notification, effectively neutralizing the security measure. The effectiveness of these attacks is bolstered by the attackers’ ability to maintain a continuous, live connection with the victim. The attacker uses the C2 panel to select the next challenge while talking with the victim, and captures the information entered by the victim in real time. Central to the operation is the real-time exploitation of vulnerabilities within Okta SSO dashboards. Once the attacker has obtained the credentials, they immediately log into the dashboard to identify all the platforms to which the victim has access. These platforms range from widely-used applications like Salesforce, Microsoft 365, and Google Workspace, to more specialized tools like Atlassian Jira and Confluence. This immediate access allows the attacker to exfiltrate sensitive data, with reports indicating that Salesforce is a primary target due to the ease with which data can be extracted from it. The threat actors are not simply content with collecting credentials; they are actively attempting to leverage their access to exfiltrate valuable data, including sensitive financial information, customer data, and intellectual property. Following initial compromise, the threat actors immediately send extortion emails to the affected company, demanding payment to prevent the public release of the stolen information. Notably, some extortion demands are being made by ShinyHunters, a notorious extortion group known for widespread data breaches, including the Salesforce data theft attacks of last year. Okta is proactively mitigating this threat by continuously monitoring for and neutralizing phishing infrastructure. They routinely identify and notify vendors of identified phishing kits, demonstrating a defensive posture. Okta's Defensive Cyber Operations team is actively working to proactively mitigate phishing kits. As a result of this complex and rapidly evolving threat, Okta recommends its customers implement robust phishing resistant MFA methods, such as Okta FastPass, FIDO2 security keys, or passkeys. This emphasizes the need for a layered security approach that includes both technical controls and employee training to combat increasingly sophisticated social engineering tactics. Furthermore, Okta is highlighting the importance of vigilant security best practices and comprehensive employee education. |