The call that opens the cloud: the vishing that steals SSO and MFA to dominate the SaaS ecosystem

Published 5 min de lectura 137 reading

In recent weeks, a wave of intrusions has emerged that combines the old crafts of telephone deception with very sophisticated phishing tools, and whose aim is not to take a single account but to open the door to the entire cloud ecosystem of a company. Mandiant and Google's intelligence team researchers have been tracking multiple campaigns that, according to their analysis, take advantage of directed calls - the well-known vishing - and false portals with the company's brand to steal unique start-up credentials (SSO) and multi-factor authentication codes or approvals (MFA). The public report describing this activity is available on the Google Cloud blog. Here..

The modus operandi combines two elements: on the one hand, the attacker contacts the victim by posing as IT personnel or support; on the other, he directs it to an access page that imitates exactly the corporate portal. Identity companies such as Okta have shown how phishing kits have evolved to incorporate interactive dialogues that guide the attacker and victim in real time during the call, which facilitates receiving credentials and manipulating MFA responses while the employee is still on the line.

The call that opens the cloud: the vishing that steals SSO and MFA to dominate the SaaS ecosystem
Image generated with IA.

Once the offender has access to an SSO account - for example in Okta, Microsoft Enter or Google - the picture changes radically: from that central panel you can reach dozens of applications in the cloud that the user has authorized. Documents in Salesforce, mailboxes and files in Microsoft 365 and SharePoint, contracts in DocuSign, files in Dropbox or Google Drive, Slack channels and spaces in Atlassian are common objectives. For groups focused on theft and extortion, that board acts as a launch ramp to copy large volumes of data with a single compromised account.

The teams investigating these campaigns have categorized several groups of actors. Mandiant speaks of clusters identified as UNC6661, UNC6671 and the extortion band known as ShinyHunters (sometimes referred to as UNC6240). In some incidents, initial access and exfiltration seem to be the work of an opportunist group, and subsequent rescue demands are claimed by ShinyHunters or by members who replicate the technique. BleepingComputer was one of the media that advanced details about calls pretending to be corporate support; its chronicle offers context on how calls and false pages develop, and can be consulted Here..

Researchers have published technical evidence to identify malicious activity after intrusion. These include records of mass downloads from SharePoint or OneDrive where the user agent is PowerShell, login to Salesforce from IP addresses linked to attackers and mass downloads in DocuSign. In at least one case, the intruders activated a Google Workspace plugin called the TogleBox Recall to search for and delete emails that would report the registration of a new MFA method, a maneuver to prevent the victim from receiving the notifications that might alert it; the function of that plugin is described on the supplier's site. Here..

Fraudulent domains are often registered with names that simulate legitimate portals of the company: variants with words such as "sso," "internal," "support" or even combinations that include names of identity providers to gain credibility. Mandiant has observed records through registration entities and the use of commercial residential proxy or VPN networks to hide the origin of the connections, which complicates immediate IP blocking.

From the point of view of detection, experts recommend prioritizing the identification of behavioral patterns rather than relying only on lock lists. Behaviour as a SSO commitment followed by quick or massive downloads from several SaaS applications, PowerShell's presence accessing SharePoint and OneDrive, unexpected OAuth authorizations in third-party applications and the removal of MFA change reporting emails are signs that should activate deeper research.

Mandiant has published practical recommendations to tighten identity flows, ensure authentication restoration processes and improve telemetry registration to be able to detect post-vishing activity before data theft is completed. They have also made available rules for security operations platforms that can help find indicators related to ShinyHunters; a summary of those rules for Google SecOps is available in this link.

For companies, the central lesson is that MFA is no longer a panacea on its own: when attackers control social dialogue and present convincing interfaces in real time, they can persuade an employee to deliver what is required to register an adversary device or approve access. For this reason, in addition to maintaining MFA, it is appropriate to tighten the telephone support procedures, require additional checks on changes in authentication methods and closely monitor any OAuth authorisation records or new MFA device inscriptions.

The call that opens the cloud: the vishing that steals SSO and MFA to dominate the SaaS ecosystem
Image generated with IA.

In the field of operation, it is appropriate to review the SaaS application access policies to limit the required permissions, activate alerts to abnormal download patterns and maintain long audit records to enable the activity to be rebuilt. Coordination between security teams, identity providers and cloud application managers is essential to reduce the exposure window when an account is compromised.

The campaign that ShinyHunters and associated actors have launched shows how business security must be adapted to hybrid attacks that mix social engineering and technical automation. Understanding the path that follows the attacker - the call of vishing, the falsified portal, the capture of credentials, the handling of MFA and the use of SSO as a lever - helps to design controls that, together, will close many of the access routes that are being exploited today.

If you want to deepen the findings and specific recommendations for defenders, the report and the guides of Mandiant and Google Cloud are a good starting point; the main research is on Google Cloud's blog published by Mandiant / Google, and Okta shares analysis on the evolution of interactive phishing kits on your intelligence blog. For a journalistic summary of the first public cases, you can read the coverage of BleepingComputer.

Coverage

Related

More news on the same subject.