❌

Reading view

How to Prevent Vishing Attacks Targeting Okta and other IDPs

Vishing as the Front Door to MFA Bypass

Threat reporting tied to ShinyHunters and Scattered Spider-linked activity shows voice phishing (vishing) being operationalized as a coordinated access vector against enterprise identity systems.

Rather than relying solely on email-based phishing, attackers now call employees directly, impersonating IT support, security teams, or identity administrators. These calls are not random β€” they are tightly coupled with live phishing infrastructure and identity workflows.

The goal is not to β€œsteal a password”; it is to walk the victim through a legitimate authentication event while the attacker intercepts the outcome.

This is why legacy MFA continues to β€œwork,” yet organizations are still getting breached.

The post How to Prevent Vishing Attacks Targeting Okta and other IDPs appeared first on Security Boulevard.

  •