Cybersecurity News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityNewsAd Tech Firm Optimizely Confirms Data Breach After Vishing Attack
Ad Tech Firm Optimizely Confirms Data Breach After Vishing Attack
CybersecurityEnterpriseDefense

Ad Tech Firm Optimizely Confirms Data Breach After Vishing Attack

•February 23, 2026
0
BleepingComputer
BleepingComputer•Feb 23, 2026

Why It Matters

The incident highlights how vishing can bypass traditional security controls, exposing even large ad‑tech firms to credential‑theft cascades that threaten downstream partners. It underscores the urgency for stronger social‑engineering defenses across the digital advertising ecosystem.

Key Takeaways

  • •Optimizely breached via sophisticated voice‑phishing attack.
  • •Attackers accessed CRM, stole basic business contact data.
  • •No evidence of sensitive customer data compromise.
  • •Threat likely linked to ShinyHunters extortion group.
  • •Incident underscores rising vishing targeting SSO credentials.

Pulse Analysis

Voice‑phishing, or vishing, has surged as cybercriminals exploit human trust rather than technical vulnerabilities. By impersonating IT support and coaxing employees into revealing MFA codes, attackers can hijack single sign‑on (SSO) accounts that grant access to a suite of enterprise tools. The Optimizely breach illustrates how this tactic can infiltrate even well‑funded ad‑tech companies, where rapid onboarding and global operations often create communication gaps that social engineers can leverage. As threat actors refine device‑code vishing techniques that abuse OAuth 2.0 flows, organizations must reassess their verification processes for any unsolicited credential requests.

Optimizely’s response—limiting the breach to basic business contact information and confirming no backdoors or privileged escalation—demonstrates the value of network segmentation and least‑privilege principles. By isolating CRM data from core advertising platforms, the company prevented attackers from reaching sensitive customer records or campaign data. However, the exposure of contact details still poses a risk, as adversaries can craft targeted spear‑phishing attacks against the affected businesses. Prompt notification, clear guidance to customers, and continuous monitoring are essential steps to mitigate downstream exploitation.

The broader industry implication is clear: reliance on SSO and cloud services demands robust, multi‑layered defenses beyond password policies. Organizations should enforce adaptive MFA, implement real‑time anomaly detection for login attempts, and conduct regular social‑engineering training that includes vishing scenarios. Threat intelligence sharing about groups like ShinyHunters can help firms anticipate attack vectors and harden their security posture. As ad‑tech platforms become increasingly integral to digital commerce, safeguarding the supply chain against sophisticated vishing attacks is now a strategic imperative.

Ad tech firm Optimizely confirms data breach after vishing attack

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...