[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fYlAUYHYh5PvuJfIZOnMrp0IXCCx0CDCesHBIsSwkZ58":3},{"article":4,"iocs":45},{"id":5,"title":6,"slug":7,"summary":8,"ai_summary":9,"brief":10,"full_text":11,"url":12,"image_url":13,"published_at":14,"ingested_at":15,"relevance_score":16,"entities":17,"category_id":24,"category":25,"article_tags":29},"f4358df0-6423-4f8b-a970-f0f2221cd949","Weekly Update 502","weekly-update-502-5e7ed3","It&#x27;s a fascinating display of leverage: the ShinyHunters folks, with very limited resources and experience (their demographic will be teenagers to their early 20s), consistently gaining access to the data of massive brands. Not through technical ingenuity alone (although I&#x27;m sure there&#x27;s a portion of that), but primarily through good","ShinyHunters, a threat group composed primarily of teenagers to early-20-somethings, is successfully breaching major corporations through sophisticated social engineering rather than advanced technical exploits. The group leverages voice phishing (vishing) and credential harvesting to obtain SSO credentials and MFA codes for initial access. Mandiant has documented these tactics, highlighting a trend of minimal-resource threat actors gaining outsized impact through low-tech but effective social engineering methods.","ShinyHunters threat group uses social engineering and phishing to breach major brands despite limited resources.","It's a fascinating display of leverage: the ShinyHunters folks, with very limited resources and experience (their demographic will be teenagers to their early 20s), consistently gaining access to the data of massive brands. Not through technical ingenuity alone (although I'm sure there's a portion of that), but primarily through good ol' social engineering. That's coming through in the disclosure notices from the impacted companies, and Mandiant has a good write-up of it too:These operations primarily leverage sophisticated voice phishing (vishing) and victim-branded credential harvesting sites to gain initial access to corporate environments by obtaining single sign-on (SSO) credentials and multi-factor authentication (MFA) codesQuestion now is how long their run will go for. There's a very predictable ending if things keep going in this direction but right now, they show little sign of abating. Weekly update","https:\u002F\u002Fwww.troyhunt.com\u002Fweekly-update-502\u002F","https:\u002F\u002Fstorage.ghost.io\u002Fc\u002Ffb\u002F33\u002Ffb3391dc-723d-4e74-b95a-d641b5feb38e\u002Fcontent\u002Fimages\u002F2026\u002F05\u002FSplash-Template.jpg","2026-05-06T00:18:00+00:00","2026-05-06T01:00:08.568+00:00",7,[18,21],{"name":19,"type":20},"ShinyHunters","threat_actor",{"name":22,"type":23},"Mandiant","vendor","e7b231c8-5f79-4465-8d38-1ef13aea5a14",{"id":24,"icon":26,"name":27,"slug":28},null,"Threat Intelligence","threat-intelligence",[30,35,40],{"category":31},{"id":32,"icon":26,"name":33,"slug":34},"2c8f44d4-b56e-47cf-9677-04f22c9ee78d","Identity & Access","identity-access",{"category":36},{"id":37,"icon":26,"name":38,"slug":39},"2e06f76c-d5b9-4f54-9eef-4d3447b10730","Breaches","breaches",{"category":41},{"id":42,"icon":26,"name":43,"slug":44},"89f78b1c-3503-45a1-9fc7-e23d2ce1c6d5","Malware","malware",[46],{"type":44,"value":19,"context":47},"Threat group conducting social engineering and credential harvesting attacks against major brands"]