top of page

ShinyHunters Attacks Further Validate the Need for Identity Observability Driven Threat Prevention

  • Ryan Rowcliffe
  • 3 hours ago
  • 9 min read
Illustration representing ShinyHunters cyber attacks and identity-based data breaches

How ShinyHunters Carry Out Their Attacks


The ShinyHunters cybercrime group spent the first weeks of 2026 proving something uncomfortable that security teams have been avoiding: you can't prevent every social engineering attack. It doesn't matter how sophisticated your MFA implementation is, or how robust your security awareness training is . Determined attackers with convincing pretexts and victim-branded phishing infrastructure will eventually breach your perimeter. The question isn't if, it's when and what happens after.


According to Google's Mandiant threat intelligence team, ShinyHunters (tracked as UNC6661, UNC6671, and UNC6240) compromised over 100 organizations between early and mid-January 2026 through sophisticated voice phishing campaigns. These weren't opportunistic attacks exploiting software vulnerabilities. Attackers impersonated IT staff, convinced employees that MFA settings were being updated, directed victims to meticulously crafted credential harvesting sites, and successfully registered their own devices for multi-factor authentication.


The victims read like a roster of organizations that presumably had their security fundamentals in place: Harvard University (115,000 records), University of Pennsylvania (1.2 million records), Panera Bread (5.1 million records), SoundCloud (30 million records), Crunchbase, Betterment, and dozens more across education, financial services, real estate, energy, healthcare, and retail sectors. These weren't mom-and-pop shops lacking basic controls. These were institutions with security teams, compliance frameworks, and presumably functioning MFA implementations.


So what went wrong? And more importantly, what could have limited the blast radius once the initial compromise occurred?


The Prevention Paradox: Why Traditional Security Controls Hit a Wall


The ShinyHunters playbook exposes a gap in how most organizations think about identity security. We've spent years focused on authentication as the primary battleground: implementing MFA, deploying passwordless solutions, enforcing conditional access policies. These controls matter. They've raised the bar significantly for attackers. But prevention-focused strategies share a dangerous assumption: that authentication events tell you everything you need to know about identity risk.


They don't.


When a ShinyHunters operator successfully convinces an employee to authenticate through a harvested credential site and approve an MFA push notification, your authentication logs will show exactly what you'd expect to see. A successful login, proper MFA challenge and response, and legitimate access to sanctioned applications. Your identity provider (whether Okta, Microsoft Entra, or Google Workspace) dutifully records these events and moves on. From a traditional security monitoring perspective, everything looks normal.


Identity observability becomes critical here. Authentication logs capture who logged in and when. Identity observability platforms track what they did next. That distinction is often the difference between containing a breach in hours versus discovering months later that terabytes of customer data walked out your SSO portal.


Mandiant's analysis of ShinyHunters intrusions reveals a pattern that traditional audit logs miss entirely. After gaining initial access, attackers moved laterally through victim environments targeting Salesforce, SharePoint, OneDrive, DocuSign, and Slack. They searched for documents containing specific keywords: "poc," "confidential," "internal," "proposal," "salesforce," "vpn." They exfiltrated personally identifiable information from CRM systems. In at least one case, they installed the ToogleBox Recall add-on for Google Workspace (a tool designed to permanently delete emails) specifically to remove Okta's "Security method enrolled" notification before the victim employee could realize their account had been associated with a new MFA device.


Traditional security tools captured fragments of this activity. SharePoint logged file downloads. Salesforce recorded logins. Google Workspace showed API authorizations. But these discrete events, scattered across different log sources, failed to coalesce into actionable intelligence until damage was done. The attackers operated freely for hours or days, systematically pillaging sensitive data while staying well within the bounds of "normal" user behavior patterns that wouldn't trigger conventional security alerts.


The Visibility Gap: What Authentication Logs Don't Tell You


Here's what makes identity-driven attacks so insidious: every action ShinyHunters took after initial compromise was technically authorized. The stolen credentials weren't fake. The MFA codes were legitimate. The OAuth tokens granting access to third-party applications were properly issued. From an authentication perspective, these sessions were completely valid.


This is the identity observability gap in action. Your identity provider knows that user@company.com authenticated successfully at 2:47 PM using valid MFA. What it doesn't know (and wasn't designed to track).


This user typically accesses Salesforce once per week but just downloaded 50 different customer records in 12 minutes. The IP address resolves to a VPN exit node in Poland despite the user normally working from Maryland. PowerShell commands are being executed against SharePoint when this user has never previously run automated scripts. The user account just authorized a third-party application with broad Gmail access at 3:15 PM, then immediately searched email for terms like "MFA," "security," and "device enrollment." High-value documents containing "confidential" and "proposal" are being systematically downloaded despite this user having no legitimate business need for them.


Each of these behaviors, taken individually, might have plausible explanations. Collectively, within a compressed timeframe, they constitute a clear attack pattern. But without comprehensive identity observability that correlates authentication events with post-authentication behavior, these signals remain invisible until you're responding to an extortion demand.


The ShinyHunters campaign demonstrates why the security industry's longstanding focus on "preventing unauthorized access" misses half the threat landscape. Unauthorized access is a problem, sure. But in 2026, increasingly sophisticated social engineering campaigns mean that authorized access by unauthorized actors has become the more pernicious challenge. Once attackers obtain legitimate credentials through vishing, phishing, or credential stuffing, they don't need to "hack" anything in the traditional sense. They simply log in and operate like authorized users, albeit with malicious intent.


Phishing-Resistant MFA: Necessary But Insufficient


Both Mandiant and Okta's threat intelligence teams correctly emphasize that organizations should deploy phishing-resistant multi-factor authentication, specifically FIDO2 security keys or passkeys. This recommendation is sound. FIDO-based authentication fundamentally solves the credential harvesting problem that enabled ShinyHunters' initial access.


Traditional MFA methods like push notifications, SMS codes, or TOTP authenticators are vulnerable to real-time phishing attacks. When an attacker calls your employee claiming to be from IT support and directs them to a convincing replica of your SSO login page, these MFA methods can be intercepted and replayed in real-time. The attacker sits in the middle, forwards credentials to the real authentication server, captures the MFA response, and gains authenticated access before the session expires.


FIDO2 security keys and passkeys resist this attack vector through cryptographic binding between the authentication credential and the legitimate domain. When you authenticate with a FIDO2 token, the cryptographic exchange is tied specifically to the actual domain name of your identity provider. A typosquatted phishing site (even one that looks pixel-perfect identical) cannot complete the authentication handshake because the domain doesn't match. The security key simply refuses to authenticate.


This protection is substantial, and organizations without phishing-resistant MFA should prioritize deploying it. The ShinyHunters campaign would have been significantly disrupted if target organizations had implemented FIDO2 across their workforce. Mandiant's data shows that credential harvesting was the primary initial access vector, and phishing-resistant MFA would have blocked this technique outright.


But (and this is critical) phishing-resistant MFA is a preventive control, not a detective one. It raises the bar for attackers but doesn't fundamentally change the post-compromise detection challenge. Sophisticated threat actors already adapt to phishing-resistant MFA through alternative techniques: targeting administrators with privileged access to bypass MFA enforcement, compromising workstations where users have existing authenticated sessions, exploiting OAuth token persistence, or simply shifting focus to organizations without phishing-resistant controls.


As Brian Krebs noted in his analysis of the ShinyHunters threat, "the only winning move is not to pay" the extortion demands because this particular threat group has demonstrated operational dysfunction and unreliability that makes any negotiation futile. That's accurate from an extortion response perspective. But from an identity security perspective, the only winning move is to assume prevention will eventually fail and build your detection and response capabilities accordingly.


Detection Over Prevention: Building Post-Compromise Visibility


If we accept that determined attackers with sophisticated social engineering tactics will occasionally succeed in obtaining legitimate credentials (and the ShinyHunters campaign provides overwhelming evidence that this assumption is correct), then security architecture needs to shift focus from "preventing every intrusion" to "detecting intrusions immediately and minimizing damage."


Identity observability platforms accomplish this by continuously monitoring the behavior patterns associated with authenticated identities across your entire SaaS and cloud environment. Rather than simply logging authentication events, these systems track what matters: the actual behavior.


Behavioral analytics establish baseline patterns for each identity. Typical application access times, geographic locations, data volumes handled, API call patterns. When an attacker authenticates as a legitimate user, their post-authentication behavior rarely matches the actual user's established patterns. That deviation is detectable if you're looking for it.


Cross-application correlation matters because most organizations use dozens of SaaS applications, each with its own audit logs. Identity observability platforms aggregate these disparate log sources and correlate activity across applications. This reveals attack patterns that are invisible when viewing individual application logs in isolation, like the ToogleBox Recall installation in Google Workspace immediately followed by deletion of MFA enrollment emails in Okta.


Tracking privilege escalation means monitoring not just authentication events but changes to permissions, role assignments, and access grants. ShinyHunters frequently gained access to lower-privileged accounts initially, then moved laterally or elevated privileges to reach sensitive data repositories. Identity observability platforms flag these privilege changes in real-time.


OAuth and third-party application monitoring addresses a gap most security tools miss. Traditional approaches treat OAuth authorization events as binary (allowed/blocked) without assessing risk based on the requesting application, scope of access requested, or behavioral context of the authorization. Identity observability platforms evaluate these authorization events against risk baselines.


Data exfiltration pattern recognition is perhaps most critical. When ShinyHunters searched SharePoint for documents containing specific keywords and downloaded 50+ files in 15 minutes, traditional tools logged these events as "FileDownloaded" without understanding the attack context. Identity observability platforms recognize this behavior as high-risk based on deviation from normal patterns and data sensitivity.


The value proposition is straightforward: identity observability brings the "what happened next" question (the question traditional authentication logs can't answer) into focus with the same clarity that authentication logs bring to the "who logged in" question. For identity-driven attacks, that post-authentication visibility is where the battle is won or lost.


The AuthMind Approach: Identity Observability driven advanced ITDR 


The ShinyHunters campaign illustrates precisely why AuthMind was architected from first principles around post-authentication visibility rather than retrofitting authentication logs with behavioral analytics as an afterthought. When attackers leverage legitimate credentials obtained through social engineering, the authentication event itself tells you nothing useful. The attack signature exists entirely in what happens after successful authentication.


AuthMind's identity observability platform enable organizations with advanced ITDR that continuously monitors behavior patterns across SaaS applications, cloud infrastructure, and identity providers, correlating authentication events with post-authentication actions to detect attacks that traditional security tools miss. When an attacker successfully phishes credentials and authenticates as a legitimate user, AuthMind identifies the compromise through behavioral anomalies: unusual geographic access patterns, atypical data access volumes, privilege escalation attempts, or OAuth authorizations inconsistent with the user's established baseline.


This approach directly addresses the detection gap that enabled ShinyHunters to operate undetected for hours or days after initial compromise. While phishing-resistant MFA provides valuable prevention, AuthMind focuses on the scenario where prevention fails, because eventually, it will. Whether through vishing, compromised administrator accounts, OAuth token theft, or the next novel attack vector, determined adversaries will find ways to obtain authenticated access to your environment. Identity observability ensures that when they do, their post-authentication behavior triggers immediate detection and response before catastrophic data exfiltration occurs.


The distinction matters because the security landscape has fundamentally changed. Ten years ago, the perimeter was the battleground. Five years ago, it was endpoint detection and response. Today, identity is the perimeter. Just as we learned that preventing every malware infection was impossible and shifted to detecting post-compromise activity on endpoints, we need to accept that preventing every identity compromise is equally impossible. The shift to detecting post-authentication anomalies in identity systems isn't optional anymore.



Don’t wait for a ShinyHunters-style breach to reveal your blind spots.

See how AuthMind detects risky identity behavior before data is stolen.




Beyond ShinyHunters: The Future of Identity-Driven Extortion


The ShinyHunters campaign won't be the last time we see sophisticated social engineering paired with methodical post-compromise data exfiltration from SaaS environments. The tactics they pioneered (vishing for SSO credentials, registering attacker-controlled MFA devices, systematically searching cloud applications for high-value data, covering tracks through strategic log manipulation) represent a mature and effective attack pattern that other threat actors will inevitably replicate.


What makes this threat particularly concerning is its scalability. Traditional ransomware operations required extensive infrastructure: developing encryption malware, establishing command-and-control networks, deploying payloads across enterprise networks. Identity-driven extortion requires comparatively minimal technical infrastructure. Some domain registrations for credential harvesting sites, VPN or residential proxy access for anonymity, and social engineering scripts. The highest-value assets (the cloud applications containing your sensitive data) are already internet-accessible by design. Attackers don't need to breach firewalls, exploit vulnerabilities, or evade EDR solutions. They just need to convince one employee to authenticate.


This asymmetry heavily favors attackers unless organizations deploy identity observability capabilities that level the playing field through post-authentication visibility. As Allison Nixon from Unit 221B correctly noted, "the only winning move is not to pay" the extortion demands. But the winning move for preventing extortion scenarios in the first place is deploying identity observability that detects compromise during the hours-long window between initial authentication and data exfiltration, when attackers are still operating within your environment but haven't yet completed their mission.


Organizations that treat identity security as purely an authentication problem (implementing MFA, enforcing conditional access policies, deploying passwordless authentication) will continue experiencing breaches where attackers operate as authenticated users with legitimate access. Organizations that embrace identity observability as a core security control (monitoring not just who logged in but what they did after authentication) will detect these attacks in progress and contain damage before it becomes catastrophic.


The ShinyHunters campaign should be a wake-up call. Prevention-focused identity security has reached its ceiling. It's time to build comprehensive identity observability into your security architecture before you're the next organization negotiating an extortion demand with stolen customer data already posted on their leak site.


Human nature being what it is, vishing attacks will never be completely solved. But with the right identity observability platform in place, detection moves to the forefront, allowing security teams to identify compromises within minutes rather than months and mitigate damage before it becomes catastrophic. That's the difference between a contained security incident and a front-page breach disclosure.

bottom of page