Okta Vishing Attacks: Attackers Are Shifting from Phishing to Identity-Based Attacks

Share:

Attackers now target identity providers (IdPs) like Okta to bypass MFA through social engineering rather than technical exploits. Once compromised, attackers gain immediate SSO-based access to multiple SaaS applications, enabling rapid cloud data exfiltration (e.g., SharePoint, OneDrive). This transforms account compromise into a full-scale data breach scenario.

Severity: High

Attack Chain

StageActionDetails
1.ReconnaissanceHarvest employee names, titles, phone numbers, help desk contacts, internal terminology via LinkedIn, ZoomInfo, company websites, breach data
2.Social Engineering CallImpersonate locked-out employee, traveling exec, or contractor; create urgency (“client meeting in 10 mins”)
3.MFA ManipulationConvince help desk to reset MFA, enroll attacker device, approve push notifications, or disable FIDO2 controls
4.SSO Pivot into SaaS appsLeverage inherited trust to access M365, SharePoint, OneDrive, Salesforce, Slack, VPN portals, HR systems
5.Data Theft / PersistenceBulk download SharePoint/OneDrive, register OAuth apps, create inbox rules, add secondary MFA methods

Why This Vector Is Escalating

  • MFA effectiveness: MFA is technically effective, so attackers route around it via humans
  • Help desk pressure: Incentivized for fast resolution, creating exploitable urgency
  • Remote work normalization: Auth troubleshooting requests are routine and less suspicious
  • Rich OSINT availability: LinkedIn and org charts enable convincing impersonation
  • SSO as single point of failure: One identity provider controls the entire SaaS estate

Indicators Of Attack

Identity Layer

  • MFA reset without clear justification
  • New device enrollment preceding suspicious activity
  • Login from unfamiliar ASN following MFA reset
  • Help desk ticket activity correlating with compromise

M365 / SaaS Layer

  • Abnormal SharePoint access volume or large OneDrive downloads
  • Multiple SaaS logins within minutes of MFA reset
  • OAuth application consent shortly after login
  • Unfamiliar IPs accessing multiple SaaS platforms simultaneously

Recommendations

  1. Enforce strict identity verification for all MFA/password resets
  2. Require manager approval or ticket validation for authentication changes
  3. Mandate phishing-resistant MFA (FIDO2, passkeys, Windows Hello)
  4. Train help desk staff specifically on vishing pretexts
  5. Disable legacy auth protocols that bypass modern MFA
  6. Enforce conditional access based on device posture, geo, and IP reputation
  7. Ingest Okta/IdP logs into SIEM. Correlate with SaaS, VPN, and endpoint telemetry
  8. Alert on MFA reset followed by rapid multi-SaaS access sequences
  9. Restrict OAuth application consent and monitor for newly authorized apps
  10. Periodically review existing MFA methods and remove unused or high-risk factors (SMS, voice)
  11. Audit administrative roles and remove standing Global Admin privileges where possible

Source:

  • https://www.levelblue.com/blogs/spiderlabs-blog/why-attackers-are-bypassing-phishing-emails-and-targeting-identity-instead

Enjoyed reading this Threat Intelligence Advisory? Stay updated with our latest exclusive content by following us on Twitter and LinkedIn

No related posts found.

Ampcus Cyber
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Talk to an expert