Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Why AI’s Rise Makes Protecting Personal Data More Critical Than Ever

February 6, 2026

New RCEs, Darknet Busts, Kernel Bugs & 25+ More Stories

February 6, 2026

Survey of 100+ Energy Systems Reveals Critical OT Cybersecurity Gaps

February 6, 2026
Facebook X (Twitter) Instagram
Friday, February 6
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Okta Flags Customised, Reactive Vishing Attacks Which Bypass MFA
News

Okta Flags Customised, Reactive Vishing Attacks Which Bypass MFA

Team-CWDBy Team-CWDJanuary 27, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Cybercriminals are combining vishing attacks with phishing sites which can be altered in real-time to social engineer victims and bypass multi-factor authentication (MFA) protection, Okta Threat Intelligence has warned.

The alert, issued on January 22, cautioned how the phishing kits are growing in use in vishing campaigns, as cybercriminals attempt to gain access to corporate Google, Microsoft and Okta accounts, as well as user logins for a range of cryptocurrency services.

The phishing kits identified by Okta allow attackers to set up a customized phishing site designed to spoof the service provider they’re attempting to steal login credentials for. The site the victim is directed to can be adapted in real-time in order to appear legitimate.

“This real-time session orchestration provides a new level of control and visibility to the social engineer,” warned the Okta blog post.

Typically, the campaigns begin with the threat actor performing extensive reconnaissance on the target, learning the names of users within the company, the applications and services they run and the phone numbers used in IT support calls.

Using this information, the attacker sets up a customized phishing page designed to look like the service being targeted, before making the vishing call, which spoofs the legitimate phone number of that company’s IT support services.

Attackers Pose as IT Support to Steal Credentials

Posing as IT support on a call, the attacker users social engineering to convince the user to visiting the phishing page. If the user enters their username and password, this is sent to a Telegram channel used by the attackers.

The attackers then leverage the stolen credentials to attempt to login to the legitimate sign-in page of the targeted user. It’s here the attackers assess the situation and adapt their campaign depending on what MFA or authentication solution the target is using.

The phishing kit allows them to quickly generate a fake version of the notification for the MFA tool the organization uses, one which the victim expects to see.

Still on the phone, the attackers then encourage the target to access the MFA push notification. If they do so, they unwittingly allow the attackers to bypass MFA protections and gain full control of the account.

“Using these kits, an attacker on the phone to a targeted user can control the authentication flow as that user interacts with credential phishing pages,” said Moussa Diallo, threat researcher at Okta Threat Intelligence.

“They can control what pages the target sees in their browser in perfect synchronization with the instructions they are providing on the call. The threat actor can use this synchronization to defeat any form of MFA that is not phishing resistant.”

To help prevent employees falling victim to voice-based phishing attacks organizations ought to encourage employees to be wary about unexpected phone calls. Especially those which appear to come from within the organization and demand urgent action be taken.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleLastPass Warns of Fake Maintenance Messages Targeting Users’ Master Passwords
Next Article VoidLink Linux Malware Framework Built with AI Assistance Reaches 88,000 Lines of Code
Team-CWD
  • Website

Related Posts

News

New RCEs, Darknet Busts, Kernel Bugs & 25+ More Stories

February 6, 2026
News

Survey of 100+ Energy Systems Reveals Critical OT Cybersecurity Gaps

February 6, 2026
News

SolarWinds Web Help Desk Vulnerability Actively Exploited

February 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

The WhatsApp screen-sharing scam you didn’t see coming

November 6, 2025

What if your romantic AI chatbot can’t keep a secret?

November 18, 2025

Why LinkedIn is a hunting ground for threat actors – and how to protect yourself

January 16, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.