0ktapus phishing campaign
Tags
Summary
The 0ktapus phishing campaign was a 2022 SMS-phishing and voice-phishing operation against employees at organizations that used Okta or similar identity portals. Group-IB coined the 0ktapus name after tracking a large set of related phishing domains and a shared kit; Okta refers to related threat-actor activity as Scatter Swine; Twilio later said researchers dubbed the malicious actors 0ktapus or Scatter Swine. This page uses 0ktapus phishing campaign as the primary title because it is the clearest cross-source shorthand for the operation, but the alias boundary should be treated as reporting-dependent rather than as a settled group identity.
Operationally, the campaign combined employee-targeted smishing, lookalike Okta pages, real-time theft of passwords and OTP/TOTP codes, and follow-on abuse of admin consoles or customer-support tooling. First-party reporting from Cloudflare, Twilio, Okta, and Signal shows the same broad pattern: steal phishable factors from employees, immediately reuse them for access, and then use provider-side visibility into SMS or identity workflows to expand victim impact.
Naming and companion-page assessment
- Group-IB named the campaign
0ktapusbased on the Okta-themed phishing infrastructure it tracked. - Okta uses the actor label
Scatter Swinefor repeated phishing activity with similar tactics, infrastructure choices, and target sets. - Twilio says independent researchers dubbed the malicious actors
0ktapusorScatter Swine. - No companion
GroupsorPeoplepage is published alongside this entry. The sources here strongly support the operation, but they do not cleanly resolve a durable crew boundary or a publicly confirmed human identity.
Timeline
- Since March 2022: Group-IB says it recovered data from
0ktapuscampaigns launched since March 2022. - 2022-07-20: Cloudflare says attackers sent more than 100 SMS lures to employees and family members, using the newly registered domain
cloudflare-okta.com; three employees entered credentials, but hardware-backed FIDO authentication blocked follow-on access. - 2022-07-26: Group-IB says one client inquiry on July 26 kicked off the investigation that tied the infrastructure to a broader campaign.
- 2022-08-04: Twilio says it became aware of unauthorized access after employees were fooled by SMS messages and fake Okta login pages.
- 2022-08-15 to 2022-08-16: Signal says it notified about 1,900 potentially affected users and forced them to re-register their accounts.
- 2022-08-25: Okta published detection guidance and said the actor had used previously stolen credentials plus Twilio-console access to search for OTP-related data tied to selected targets.
- 2022-10-27: Twilio published its investigation conclusion and linked the incident to the wider
0ktapus/Scatter Swinewave.
Org context
Because there is no standalone Orgs section in the current taxonomy, the key organizations are summarized here.
Group-IB
- Group-IB says it identified 169 unique phishing domains involved in the campaign.
- The same writeup says recovered campaign data included 9,931 compromised user credentials, 5,441 compromised MFA codes, and 136 unique email domains belonging to compromised users.
- Group-IB says most targeted companies were in the United States and that IT, software, cloud, telecom, and financially relevant organizations were prominent in the victim data.
Cloudflare
- Cloudflare says the phish targeted employees with a fake Okta page hosted on DigitalOcean and registered through Porkbun less than an hour before the SMS wave began.
- Cloudflare says the phishing flow relayed credentials and TOTP material to the attacker in real time through Telegram-backed infrastructure, then attempted to log in from Windows systems over VPN.
- The same post says the kit also attempted to deliver AnyDesk remote-access software after credential collection, but Cloudflare's FIDO2 requirement prevented account takeover.
Twilio and Authy
- Twilio says attackers used stolen employee credentials to access internal Twilio administrative tools and customer information.
- Twilio's October 27, 2022 conclusion says 209 customers and 93 Authy end users were impacted, and that the last observed unauthorized activity was on August 9, 2022.
- Twilio also says there was no evidence that customer console passwords, authentication tokens, or API keys were accessed.
Okta
- Okta says the actor searched for 38 unique phone numbers in the Twilio console, nearly all linked to one targeted organization.
- Okta assesses that the actor used previously stolen usernames and passwords to trigger SMS MFA challenges, then used Twilio-console access to look up the resulting one-time passwords.
- Okta's writeup also documents recurring TTPs: bulk text lures, lookalike
-okta,-sso, and-vpndomains, Windows-based sign-ins from new devices and IPs, and anonymization services such as Mullvad.
Signal
- Signal says Twilio-console exposure meant about 1,900 Signal users could have had their phone number registration status revealed or their SMS verification code exposed.
- Signal says the attacker explicitly searched for three phone numbers and that one of those users reported an account re-registration.
- Signal forced re-registration for potentially affected users and emphasized that message history, contact lists, and other private data were not exposed through Twilio.
Operational chain
- Attackers assembled employee phone targets and sent SMS or voice lures that impersonated IT, password-reset, or schedule-change notices, according to Twilio, Cloudflare, and Okta.
- Those lures pushed targets to freshly registered lookalike domains such as
cloudflare-okta.com, where fake login pages copied Okta-branded authentication flows. - The phishing kit captured usernames, passwords, and OTP/TOTP values and relayed them to the operators through Telegram-backed infrastructure in real time, allowing immediate reuse before codes expired, as described by Cloudflare and Group-IB.
- Where organizations still relied on phishable factors, the stolen credentials were used for account takeover and access to internal admin tooling; Cloudflare resisted that step with FIDO2, while Twilio says the actor succeeded in reaching internal systems.
- Okta says Twilio-console access was then used to search for OTP-related data tied to additional targets, extending the campaign from employee credential theft into downstream account-recovery and session-expansion attempts.
- Signal shows the downstream effect: telecom-provider console access could be turned into attempted account re-registration against services that depended on SMS verification.
Evidence and impact
- Group-IB ties the campaign to a shared phishing kit, a common Okta-themed infrastructure pattern, and recovered compromise data spanning thousands of credentials and MFA codes.
- Cloudflare shows why phishing-resistant MFA mattered: correct credentials were stolen, but hard-key origin binding blocked the attacker from using them.
- Twilio shows the opposite branch of the same chain: once a provider's internal admin tooling was reached, customer-impacting access followed even without theft of API keys or passwords.
- Okta shows that SMS-based MFA created a secondary exposure path when the actor could inspect provider-side OTP traffic.
- Signal shows how that provider-side access affected downstream services that relied on SMS for account registration or recovery.
Defender takeaways
- Prefer phishing-resistant MFA such as FIDO2/WebAuthn for workforce access; Cloudflare shows this was the main control that broke the operation.
- Hunt for newly registered lookalike domains that combine company branding with terms such as
okta,sso,vpn, orhelpdesk, and block or isolate them quickly. - Treat SMS- and voice-based IT lures as identity-compromise events, not just user-awareness issues; correlate mobile-targeting reports with identity logs and helpdesk activity.
- If an SMS or identity-support provider is compromised, audit for phone-number searches, OTP visibility, unexpected device registrations, and forced reauthentication needs across downstream services.
- Okta customers can adapt the Okta log-hunting guidance for new-device, new-IP, Windows-based sign-ins after SMS events or proxy-backed authentication attempts.