Cyberabbit Logo

Cyberabbit News

ShinyHunters and friends under the microscope.

Investigative Report

ShinyHunters is back — social engineering, fashion fines, and the same voice phishing recipes.

Threat actor silhouette over corporate dashboards

Prompt used: Threat actor silhouette bent over corporate dashboards with floating breach headlines.

Voice phishing and the new normal

ShinyHunters is back in circulation with a familiar pattern: they own a voice-phishing or social engineering vector, nail down employee access credentials, then probe SaaS databases for rich customer metadata. In February 2026 the gang leaked 2.56 GB of Figure data, citing CRM dumps, applicant data, KYC documents, and employee dossiers (AppliedTech, Feb 20, 2026). A long tail of customers — nearly 1 million accounts — were exposed.

Luxury brands pay the price

South Korea’s PIPC slapped Dior, Louis Vuitton, and Tiffany with a combined ₩36 billion (~$25 million) fine after malware/voice-phishing incidents compromised over 5 million individuals. Regulators highlighted weak staff training around external communications and an overreliance on email OTPs, classic enablers of the same ShinyHunters toolkit that worked against Figure and Crunchbase earlier in the year.

Crunchbase, third parties, and the new blueprint

Crunchbase confirmed the gang had extracted 2 million records through voice phishing as well. The data went beyond personal identifiers, including company contracts and internal notes that an attacker could reuse to social-engineer suppliers. These incidents share a blueprint: the attacker starts with a low-profile voice call, gathers credentials or API keys, then escalates to whichever SaaS environment contains the highest density of customers.

Lessons for SOCs and privacy teams

Sources