Ad tech firm Optimizely has confirmed a data breach resulting from a voice phishing attack, with attackers stealing business contact information. The incident is linked to the ShinyHunters group, known for targeting high-profile organizations via social engineering.

Ad tech company Optimizely has notified customers of a data breach after threat actors compromised internal systems through a sophisticated voice phishing (vishing) attack. The attackers accessed CRM systems and internal documents containing business contact information, though Optimizely confirmed no operational disruption occurred. With over 10,000 enterprise customers including PayPal, Nike, and Zoom, the incident highlights escalating risks in business communication channels.
Attack Methodology and Attribution
Security experts analyzing the breach note the attackers used caller impersonation techniques, posing as IT support to trick employees into surrendering credentials on fake authentication portals. According to Optimizely's forensic report, the attackers couldn't escalate privileges or install malware but harvested "basic business contact information" from compromised systems.
The tactics align with ShinyHunters' recent operations, an extortion group targeting organizations like Panera Bread, SoundCloud, and Match Group. This collective specializes in vishing attacks against SSO providers (Microsoft Entra, Okta, Google), recently evolving to exploit OAuth 2.0 device authorization flows. As noted by threat intelligence analysts, this technique abuses legitimate authentication processes to bypass MFA, granting access to connected services like Salesforce, Slack, and Microsoft 365.
Practical Defense Strategies
Organizations can mitigate vishing risks through layered security measures:
- Enhanced Verification Protocols: Implement strict authentication requirements for internal requests (e.g., secondary verification via separate channels for credential resets).
- Phishing-Resistant MFA: Prioritize FIDO2 security keys over SMS or push notifications, which are vulnerable to interception. NIST guidelines explicitly recommend phishing-resistant authentication.
- Employee Training Simulations: Conduct realistic vishing drills using services like Cofense or KnowBe4, focusing on caller verification and reporting procedures.
- Cloud Environment Monitoring: Deploy anomaly detection for SSO logins, flagging unusual locations, devices, or access patterns.
Platforms like Wiz offer continuous cloud configuration scanning to identify exposure risks. - Device Code Flow Restrictions: Limit OAuth device authorization usage through conditional access policies in Microsoft Entra or similar IAM systems.
Optimizely's breach underscores how social engineering increasingly bypasses technical controls. "Human factors remain the weakest link," notes cybersecurity researcher Katie Moussouris. "Regular training paired with identity governance that assumes compromise can reduce attack success rates by 70% or more." Organizations should audit third-party access permissions and assume stolen business contacts will fuel follow-on spear phishing campaigns.

Comments
Please log in or register to join the discussion