Vishing as the Front Door to MFA Bypass
Threat reporting tied to ShinyHunters and Scattered Spider-linked activity shows voice phishing (vishing) being operationalized as a coordinated access vector against enterprise identity systems.
Rather than relying solely on email-based phishing, attackers now call employees directly, impersonating IT support, security teams, or identity administrators. These calls are not random — they are tightly coupled with live phishing infrastructure and identity workflows.
The goal is not to “steal a password”; it is to walk the victim through a legitimate authentication event while the attacker intercepts the outcome.
This is why legacy MFA continues to “work,” yet organizations are still getting breached.
The post How to Prevent Vishing Attacks Targeting Okta and other IDPs appeared first on Security Boulevard.
Read the original article: