Ad tech firm Optimizely confirms data breach after vishing attack
好的,我现在需要帮用户总结一篇文章,控制在100字以内。首先,我得仔细阅读文章内容,抓住关键信息。 文章主要讲的是Optimizely公司遭遇了数据泄露事件。他们通过语音钓鱼攻击被入侵,导致客户的基本联系信息被盗。受影响的客户包括很多大品牌,比如H&M、PayPal等。Optimizely通知了客户,并提到攻击者可能属于ShinyHunters组织,他们之前也攻击过其他公司。 接下来,我需要将这些信息浓缩到100字以内。要确保涵盖事件的基本情况:公司名称、攻击类型、泄露的信息类型、受影响的客户以及可能的攻击者背景。 可能会忽略一些细节,比如具体的攻击手法或影响范围的详细描述,但必须保留核心内容。同时,语言要简洁明了,避免使用复杂的术语。 最后检查一下字数是否符合要求,并确保信息准确无误。 </think> 纽约广告技术公司Optimizely遭遇语音钓鱼攻击,导致部分系统被入侵并泄露客户基本联系信息。此次事件影响了包括H&M、PayPal等在内的1万家客户。Optimizely表示攻击者未获取敏感数据,并警告客户警惕进一步的钓鱼攻击。此次事件可能与ShinyHunters团伙有关。 2026-2-23 18:15:19 Author: www.bleepingcomputer.com(查看原文) 阅读量:3 收藏

Optimizely

New York-based ad tech company Optimizely has notified an undisclosed number of customers of a data breach after threat actors compromised some of its systems in a voice phishing attack.

Optimizely has nearly 1,500 employees across 21 global offices, and its customer list includes over 10,000 businesses, including high-profile brands like H&M, PayPal, Zoom, Toyota, Vodafone, Shell, Salesforce, and Nike.

In breach notification letters sent to affected customers, the company, the threat actors reached out on February 11, claiming they had access to its systems.

Wiz

Optimizely also told BleepingComputer that the attackers breached some of its systems and stole what it described as "basic business contact information."

"The threat actor gained access to Optimizely's systems through a sophisticated voice-phishing attack, but was unable to escalate privileges, install software, or create any backdoors in the Optimizely environment, and we have no evidence that the threat actor was able to access sensitive customer data or personal information beyond basic business contact information," it said.

Optimizely also noted the "incident was confined to certain internal business systems, records in our CRM, and a limited set of internal documents used for back-office operations," and added that its "business operations continue without disruption."

The company also warned customers to be wary of attacks that could use some of the stolen data in further phishing attempts, which may use calls, texts, or emails to ask for passwords, MFA codes, or other credentials.

ShinyHunters links

While Optimizely didn't share how many customers had their information exposed in the data breach and has yet to name the threat actor behind the attack, it told affected customers that "the communication we received is consistent with the behavior of a loosely affiliated group who use sophisticated and aggressive social engineering tactics, most often involving voice phishing, to attempt to access their victims systems."

This hints that the attackers are likely part of the ShinyHunters extortion operation, which has claimed similar breaches at Canada Goose, Panera Bread, Betterment, SoundCloud, PornHub, fintech firm Figure, and online dating giant Match Group (which owns multiple popular dating services, including Tinder, Hinge, Meetic, Match.com, and OkCupid) in recent weeks.

While not all of these breaches are part of the same campaign, some victims had their systems compromised in a voice phishing (vishing) campaign targeting single sign-on (SSO) accounts at Microsoft, Okta, and Google across over 100 high-profile organizations.

In these attacks, threat actors impersonate targets' IT support, call employees, and trick them into entering credentials and multi-factor authentication (MFA) codes on phishing sites mimicking their companies' login portals.

As BleepingComputer first reported, the threat actors have also recently altered their social engineering attacks to use device code vishing, abusing the legitimate OAuth 2.0 device authorization grant flow to obtain Microsoft Entra authentication tokens.

Once in, they hijack the victim's SSO account and gain access to connected enterprise services, including Salesforce, Microsoft 365, Google Workspace, Zendesk, Dropbox, SAP, Slack, Adobe, Atlassian, and many others.

tines

The future of IT infrastructure is here

Modern IT infrastructure moves faster than manual workflows can handle.

In this new Tines guide, learn how your team can reduce hidden manual delays, improve reliability through automated response, and build and scale intelligent workflows on top of tools you already use.


文章来源: https://www.bleepingcomputer.com/news/security/ad-tech-firm-optimizely-confirms-data-breach-after-vishing-attack/
如有侵权请联系:admin#unsafe.sh