New Phishing Threats: MFA Bypass, Fake CAPTCHA & AI Scams
Explore the latest phishing threats, including MFA bypass kits, fake CAPTCHA malware, and AI-driven scams, and how organizations can reduce social engineering risk.
Google’s Threat Intelligence Group has warned about a wave of vishing campaigns tied to the ShinyHunters threat cluster, where attackers impersonate IT staff on calls to trick employees into disclosing SSO credentials and MFA codes. Once obtained, these are used to infiltrate cloud services (e.g., Salesforce, Slack) for extortion and data theft. These techniques rely heavily on social engineering, not software exploits.
A major espionage operation has compromised organizations across 37 countries by combining phishing with exploitation of known software vulnerabilities to gain initial footholds. Traditional phishing remains the primary social engineering vector for these highly orchestrated threats.
Betterment disclosed a breach affecting over 1.4 million accounts after an employee was tricked through social engineering. Attackers used this to send phishing emails impersonating the platform.
In Ghana, rising digitization (mobile money, fintech, digital services) has expanded the attack surface. Social engineering especially (impersonation and fraud) is highlighted as a key threat vector enabling mobile money fraud and account takeovers.
Why this matters:
How PhishingBox helps:
Recent threat forecasts and expert analyses spotlight AI‑assisted social engineering as one of the dominant risk vectors in 2026. This includes:
Human elements remain the weakest link in cybersecurity, with attackers scaling trust exploitation with AI and automation.