Custom vishing kits target SSO accounts worldwide

Custom-made vishing kits are attacking single sign-on (SSO) accounts across the globe. Major providers including Google, Microsoft, and Okta face threats from these tools. The effectiveness of the kits is driving increased popularity in vishing attacks.

Vishing, a form of phishing conducted over voice calls, has seen a rise in sophistication with the emergence of custom-made kits. These tools are specifically designed to target SSO accounts, which allow users to access multiple services with one set of credentials. The attacks span the world, putting pressure on key players in the authentication space.

Google, Microsoft, and Okta are highlighted as primary targets under threat from these vishing operations. The kits' high quality enables attackers to mimic legitimate communications convincingly, exploiting trust in voice interactions. As a result, vishing is growing more popular among cybercriminals seeking to bypass traditional security measures.

This development underscores vulnerabilities in SSO systems, which streamline user access but can become single points of failure if compromised. Organizations are urged to enhance employee training on recognizing vishing attempts and implement multi-factor authentication beyond basic setups. The global nature of the attacks suggests a coordinated effort, though specifics on perpetrators remain unclear from available reports.

Verwandte Artikel

IT expert Supangat warns of Lebaran digital scams via WhatsApp and SMS in a press conference illustration.
Bild generiert von KI

It-experte warnt vor digitalen Betrügereien vor Lebaran

Von KI berichtet Bild generiert von KI

Angesichts des anstehenden Idul Fitri fordert IT-Experte Supangat von der Untag Surabaya die Öffentlichkeit auf, die Wachsamkeit gegenüber Betrügereien über WhatsApp und SMS zu erhöhen. Steigende digitale Transaktionen werden von Cyberkriminellen ausgenutzt. Vida-Gründer Niki Santo Luhur benennt zwei Hauptmethoden: Phishing und Malware, die in Indonesien verbreitet sind.

Scammers are sending emails that appear genuine to OpenAI users, designed to manipulate them into revealing critical data swiftly. These emails are followed by vishing calls that intensify the pressure on victims to disclose account details. The campaign highlights ongoing risks in AI platform security.

Von KI berichtet

Security researchers, first reporting via TechRadar in December 2025, warn WhatsApp's 3 billion users of GhostPairing—a technique tricking victims into linking attackers' browsers to their accounts, enabling full access without breaching passwords or end-to-end encryption.

Security firm Varonis has identified a new method for prompt injection attacks targeting Microsoft Copilot, allowing compromise of users with just one click. This vulnerability highlights ongoing risks in AI systems. Details emerged in a recent TechRadar report.

Von KI berichtet

Major VPN providers such as NordVPN, ExpressVPN, and Proton VPN are facing attacks through typosquatting, where fake domains mimic their official sites. A report indicates that 14 percent of these imitation domains are malicious. Users are advised to take precautions to avoid falling victim to these scams.

Ten typosquatted npm packages, uploaded on July 4, 2025, have been found downloading an infostealer that targets sensitive data across Windows, Linux, and macOS systems. These packages, mimicking popular libraries, evaded detection through multiple obfuscation layers and amassed nearly 10,000 downloads. Cybersecurity firm Socket reported the threat, noting the packages remain available in the registry.

Von KI berichtet

In Kolumbien verbreiten sich während der Semana Santa 2026 betrügerische SMS-Nachrichten, die Benachrichtigungen von Versicherungen und Banküberweisungen vortäuschen. Behörden wie die Fiscalía und die Nationalpolizei warnen davor, auf verdächtige Links zu klicken, um Datendiebstahl und Kontoleerungen zu verhindern. Sie fordern dazu auf, Informationen über offizielle Kanäle zu verifizieren.

 

 

 

Diese Website verwendet Cookies

Wir verwenden Cookies für Analysen, um unsere Website zu verbessern. Lesen Sie unsere Datenschutzrichtlinie für weitere Informationen.
Ablehnen