A threat actor group tracked as 0ktapus conducted a wide-scale phishing campaign targeting over 130 companies. The attackers spoofed multi-factor authentication systems to harvest credentials and bypass access controls.

The campaign exploited a common attack vector. Phishing emails directed targets to fraudulent login pages designed to mimic legitimate MFA prompts. Victims entered credentials believing they were authenticating normally. Attackers captured usernames, passwords, and session tokens in a single interaction.

This technique bypasses traditional MFA protections by capturing authentication factors before submission to real systems. Organizations relying solely on MFA without additional controls like conditional access or risk-based authentication face elevated risk from this vector.

Defenders should implement the following controls. Deploy email filtering rules that block known phishing indicators. Enforce FIDO2 hardware keys where possible, as they resist phishing attacks. Monitor for anomalous login patterns and geographic inconsistencies. Train users to verify URLs before entering credentials. Implement passwordless authentication to eliminate credential theft as a viable attack vector.

0ktapus targets remain unclear. The campaign's scale and technical sophistication suggest organized effort rather than opportunistic phishing. Organizations should review access logs for unauthorized activity dating back to initial compromise windows.