Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. Vishing-Based Compromise at Optimizely Highlights Identity Risk

Vishing-Based Compromise at Optimizely Highlights Identity Risk

Scheduled Pinned Locked Moved Uncategorized
infosecvishingoauthiamsso
1 Posts 1 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • technadu@infosec.exchangeT This user is from outside of this forum
    technadu@infosec.exchangeT This user is from outside of this forum
    technadu@infosec.exchange
    wrote last edited by
    #1

    Vishing-Based Compromise at Optimizely Highlights Identity Risk

    Attackers gained access via voice phishing, targeting SSO-linked systems and CRM records.

    No confirmed privilege escalation, but exposure of business contact data reinforces how social engineering bypasses perimeter defenses.

    Activity patterns resemble ShinyHunters campaigns abusing MFA prompts and OAuth 2.0 device authorization flows.

    Common post-access targets include Salesforce, Microsoft 365, Google Workspace, Slack, SAP, Atlassian - wherever SSO tokens provide lateral access.

    Identity is the control plane. Once tokens are compromised, downstream exposure scales quickly.

    Is your organization monitoring abnormal device code authentication and token issuance events?

    Source: https://www.bleepingcomputer.com/news/security/ad-tech-firm-optimizely-confirms-data-breach-after-vishing-attack/

    Engage below.
    Follow @technadu for actionable threat intelligence.

    #Infosec #Vishing #OAuth #IAM #SSO #ZeroTrust #ThreatHunting #SOC #IdentitySecurity #CyberRisk

    Link Preview Image
    1 Reply Last reply
    1
    0
    • R relay@relay.infosec.exchange shared this topic
    Reply
    • Reply as topic
    Log in to reply
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes


    • Login

    • Login or register to search.
    • First post
      Last post
    0
    • Categories
    • Recent
    • Tags
    • Popular
    • World
    • Users
    • Groups