The 0ktapus Phishing Campaign: How a Massive MFA Bypass Compromised Over 130 Organizations and 10,000 Accounts

The global cybersecurity landscape has been shaken by the emergence of a sprawling and highly effective phishing operation known as "0ktapus," which has successfully compromised nearly 10,000 employee accounts across more than 130 organizations. This campaign, characterized by its sophisticated use of social engineering and the spoofing of identity and access management (IAM) platforms, has targeted some of the world’s most prominent technology and telecommunications firms, including Twilio, Cloudflare, and DoorDash. According to researchers at Group-IB, the threat actors behind this initiative focused their efforts on bypassing multi-factor authentication (MFA) protocols, demonstrating that even advanced security layers are susceptible to well-coordinated human-centric attacks.
The moniker "0ktapus" was coined by security analysts due to the threat actors’ specific focus on users of Okta, a leading provider of identity and access management services. By mimicking the Okta authentication pages of their targets, the attackers were able to harvest both primary credentials and the time-sensitive MFA codes required to gain full access to corporate environments. The scale of the campaign is unprecedented, with 114 of the impacted firms based in the United States and the remaining victims distributed across 68 other countries.
The Anatomy of the 0ktapus Attack
The 0ktapus campaign is a masterclass in modern "smishing" (SMS-based phishing) and social engineering. The attack chain typically began with a carefully crafted text message sent to the mobile devices of employees at targeted organizations. These messages often utilized urgent language, claiming that the user’s password had expired or that their account required immediate attention. Contained within the message was a link to a fraudulent website that mirrored the legitimate Okta login portal used by the employee’s firm.
Once a victim clicked the link, they were directed to a site that appeared identical to their company’s internal single sign-on (SSO) page. When the employee entered their username and password, the threat actors captured the data in real-time. Crucially, the phishing kit used by the 0ktapus group was designed to handle multi-factor authentication. As the victim was prompted for their MFA code on the fake site, the attackers would simultaneously input the stolen credentials into the actual Okta portal. The victim, receiving a legitimate MFA prompt or entering a code from an authenticator app into the fake site, would unwittingly hand over the final key to their account.
This "adversary-in-the-middle" (AiTM) approach allowed the hackers to bypass the security measures that many organizations believed were impenetrable. By operating in real-time, the attackers could utilize the stolen codes before they expired, granting them immediate access to internal corporate systems, email servers, and sensitive databases.
Chronology of the Campaign and Discovery
The 0ktapus campaign did not appear overnight; it was a methodical operation that evolved over several months. Researchers believe the attackers began their mission by targeting telecommunications companies and mobile carriers. The primary objective of this initial phase was likely to obtain lists of phone numbers belonging to employees of high-value targets in the technology sector. By compromising the databases of mobile providers, the 0ktapus actors gained a directory of potential victims, facilitating the subsequent smishing phase of the attack.
The campaign reached a fever pitch in mid-2022 when high-profile breaches began to surface. In August 2022, the communication software giant Twilio announced that it had been compromised. The company revealed that attackers had tricked employees into providing their credentials through SMS phishing, leading to unauthorized access to internal systems. Shortly thereafter, Cloudflare reported a similar attempt. However, unlike many other victims, Cloudflare successfully thwarted the attack because it required the use of hardware-based security keys (FIDO2-compliant keys) rather than SMS-based or app-based MFA.
Within hours of Group-IB publishing its comprehensive report on the 0ktapus campaign, the food delivery giant DoorDash also confirmed it had fallen victim to a related incident. The company disclosed that an unauthorized party had used stolen credentials from a third-party vendor to gain access to DoorDash’s internal tools. This revelation underscored the "supply chain" nature of the 0ktapus strategy: attacking the weakest link in a network of interconnected companies to eventually reach the ultimate target.
Data and Statistical Impact
The sheer volume of data harvested during the 0ktapus campaign highlights the efficiency of the attackers’ infrastructure. Group-IB’s analysis of the compromised data revealed the following statistics:
- Total Compromised Accounts: 9,931
- Total Impacted Organizations: At least 136
- MFA Codes Stolen: 5,441
- Geographic Reach: 114 US-based firms and companies in 68 additional countries.
- Target Industries: Primarily Software-as-a-Service (SaaS), Telecommunications, Finance, and Education.
The researchers noted that the 9,931 compromised accounts represent only the instances they could definitively verify. Roberto Martinez, a senior threat intelligence analyst at Group-IB, emphasized that the full scale of the operation remains a mystery. "The 0ktapus campaign has been incredibly successful, and the full scale of it may not be known for some time," Martinez stated. The attackers’ ability to remain undetected while moving from one organization to another suggests a high level of operational security and planning.
The Role of Supply Chain Vulnerabilities
One of the most alarming aspects of the 0ktapus campaign was the attackers’ focus on supply chain exploitation. By targeting employees at software companies and service providers, the hackers sought to gain access to customer-facing systems and internal mailing lists. The ultimate goal was to use these high-level permissions to launch secondary attacks against the customers of the breached firms.
In the case of DoorDash, the breach was facilitated by the compromise of a third-party vendor. This allowed the attackers to access internal tools and exfiltrate personal information belonging to both customers and delivery personnel ("Dashers"). The stolen data included names, phone numbers, email addresses, and delivery addresses. This ripple effect demonstrates that a single successful phishing attack on a junior employee at a vendor can lead to a massive data breach at a multi-billion-dollar corporation.
Expert Reactions and the "MFA Fallacy"
The success of the 0ktapus campaign has sparked a heated debate within the cybersecurity community regarding the efficacy of traditional multi-factor authentication. For years, MFA has been touted as the "silver bullet" for stopping credential-based attacks. However, the 0ktapus actors proved that not all MFA is created equal.
Roger Grimes, a data-driven defense evangelist at KnowBe4, noted that the industry’s reliance on "phishable" MFA is a significant vulnerability. "This is yet another phishing attack showing how easy it is for adversaries to bypass supposedly secure multifactor authentication," Grimes said. He argued that moving users from easily phishable passwords to easily phishable MFA—such as SMS codes or simple push notifications—offers little real-world benefit if the user can be tricked into entering those codes into a fake site. "It’s a lot of hard work, resources, time, and money, not to get any benefit," he added.
The consensus among experts is that the 0ktapus campaign marks a turning point where organizations must move toward "phishing-resistant" authentication. This includes the use of FIDO2-compliant hardware keys, such as YubiKeys, which require a physical device to be present and use cryptographic handshakes that cannot be intercepted or spoofed by a fake website.
Mitigation and Future Outlook
To defend against 0ktapus-style campaigns, security researchers recommend a multi-layered approach that goes beyond simple credential management. The following strategies have been identified as critical for modern corporate defense:
- Adoption of FIDO2 Standards: Organizations should transition away from SMS and voice-based MFA in favor of hardware security keys or platform authenticators that utilize FIDO2 protocols. These methods are virtually immune to current phishing techniques.
- URL Filtering and Monitoring: Implementing advanced email and SMS filtering can help identify and block known phishing domains. Furthermore, companies should monitor for the registration of "typosquatted" domains that mimic their own internal portals.
- Enhanced Security Awareness Training: While technical controls are vital, the human element remains the primary target. Employees must be trained to recognize the signs of smishing and understand that legitimate IT departments will never ask for MFA codes via a link sent in a text message.
- Zero Trust Architecture: Implementing Zero Trust principles—where every access request is strictly verified regardless of where it originates—can limit the lateral movement of an attacker even if they manage to compromise a single account.
The 0ktapus campaign serves as a stark reminder that as security technologies evolve, so do the tactics of cybercriminals. The focus has shifted from technical exploits to psychological manipulation. As long as employees can be convinced to click a link and provide a code, the most expensive security software in the world can be bypassed in a matter of seconds. The fallout from 0ktapus will likely be felt for years as organizations reassess their identity management strategies and prepare for the next evolution of social engineering attacks.







