PDF Dropbox Phishing, ShinyHunters MFA Bypass, Signal Journalist Targeting
Quick Answer
_According to the FBI's 2022 Internet Crime Report (IC3), 300,497 US-based victims reported phishing incidents in a single year, and Business Email Compromise (BEC) caused more than $2.7 billion in direct losses. DMARC Report PDF Dropbox Phishing, ShinyHunters MFA Bypass, Signal Journalist Targeting
Related: Free DMARC Checker ·How to Create an SPF Record ·SPF Record Format
The support tickets we get after a spoofing incident all start the same way: ‘we didn’t know someone was sending email from our domain,’ says Vasile Diaconu, Operations Lead at DuoCircle. DMARC reporting would have caught it weeks earlier. The cost of monitoring is nothing compared to the cost of a successful impersonation attack.
_According to the FBI’s 2022 Internet Crime Report (IC3), 300,497 US-based victims reported phishing incidents in a single year, and Business Email Compromise (BEC) caused more than $2.7 billion in direct losses. DMARC Report
PDF Dropbox Phishing, ShinyHunters MFA Bypass, Signal Journalist Targeting
<button title="Play" aria-label="Play Episode" aria-pressed="false" class="play-btn">
Play Episode
</button>
<button title="Pause" aria-label="Pause Episode" aria-pressed="false" class="pause-btn hide">
Pause Episode
</button>
<audio preload="none" class="clip clip-38439">
<source src="https://media.mailhop.org/dmarcreport/images/2026/02/PDF-Dropbox-Phishing-ShinyHunters-MFA-Bypass-Signal-Journalist-Targeting.mp3">
</audio>
<button class="player-btn player-btn__volume" title="Mute/Unmute">
Mute/Unmute Episode
</button>
<button data-skip="-10" class="player-btn player-btn__rwd" title="Rewind 10 seconds">
Rewind 10 Seconds
</button>
<button data-speed="1" class="player-btn player-btn__speed" title="Playback Speed" aria-label="Playback Speed">1x</button>
<button data-skip="30" class="player-btn player-btn__fwd" title="Fast Forward 30 seconds">
Fast Forward 30 seconds
</button>
<time class="ssp-timer">00:00</time>
/
<!-- We need actual duration here from the server -->
<time class="ssp-duration" datetime="PT0H2M8S">2:08</time>
<nav class="player-panels-nav">
<button class="subscribe-btn" id="subscribe-btn-38439" title="Subscribe">Subscribe</button>
<button class="share-btn" id="share-btn-38439" title="Share">Share</button>
</nav>
RSS Feed
<input value="https://dmarcreport.com/feed/podcast/dmarc-report" class="input-rss input-rss-38439" title="RSS Feed URL" readonly />
<button class="copy-rss copy-rss-38439" title="Copy RSS Feed URL" aria-label="Copy RSS Feed URL"></button>
Share
<a href="https://www.facebook.com/sharer/sharer.php?u=https://dmarcreport.com/blog/podcast/pdf-dropbox-phishing-shinyhunters-mfa-bypass-signal-journalist-targeting/&t=PDF Dropbox Phishing, ShinyHunters MFA Bypass, Signal Journalist Targeting" target="blank" rel="noopener noreferrer" class="share-icon facebook" title="Share on Facebook">
</a>
<a href="https://twitter.com/intent/tweet?text=https://dmarcreport.com/blog/podcast/pdf-dropbox-phishing-shinyhunters-mfa-bypass-signal-journalist-targeting/&url=PDF Dropbox Phishing, ShinyHunters MFA Bypass, Signal Journalist Targeting" target="blank" rel="noopener noreferrer" class="share-icon twitter" title="Share on Twitter">
</a>
<a href="https://media.mailhop.org/dmarcreport/images/2026/02/PDF-Dropbox-Phishing-ShinyHunters-MFA-Bypass-Signal-Journalist-Targeting.mp3" target="blank" rel="noopener noreferrer" class="share-icon download" title="Download" download>
</a>
Link
<input value="https://dmarcreport.com/blog/podcast/pdf-dropbox-phishing-shinyhunters-mfa-bypass-signal-journalist-targeting/" class="input-link input-link-38439" title="Episode URL" readonly />
<button class="copy-link copy-link-38439" title="Copy Episode URL" aria-label="Copy Episode URL" readonly=""></button>
Embed
/*! This file is auto-generated */ ’ title=“Embed Code” class=“input-embed input-embed-38439” readonly/>
<button class="copy-embed copy-embed-38439" title="Copy Embed Code" aria-label="Copy Embed Code"></button>
The first edition of February revolves mainly around phishing attacks. While a new type of phishing campaign is doing the rounds that involves targeting PDFs and Dropbox, notorious cyber gang ShinyHunters seemed to have bypassed MFA in their latest cyberattack. Meanwhile, multiple journalists are being targeted by misusing the Signal messenger. An Indian firm fell prey to a threat attack and lost around $610 K USD.
New phishing campaign targeting PDFs and Dropbox services to steal credentials
AI tools are making it easy for threat actors to level up their threat campaigns. While cybercrooks are getting sophisticated with their threat attacks, they still prefer to carry out simple phishing campaigns because of the rate of success.
A group of researchers at **ForcePoint has discovered a new phishing campaign that involves PDF files and Dropbox storage. It is a multi-stage threat campaign that redirects victims to malicious pages to gain access to their credentials.

When a victim clicks on a malicious PDF, they get redirected to a Dropbox login page. It is basically a malicious page designed to carry out fraud activities like account takeover, internal access, etc. Cybercrooks prefer this campaign as it looks similar to normal business behavior, which further increases its credibility.
First, the victim receives a legitimate-looking email. The email will mostly revolve around tender procurement or any business operations. Along with it comes a request to evaluate the attacked document.
The **PDF works like a primary malware delivery system. The sender address tends to be spoofed. _After being redirected to the malicious Dropbox login page, the victim is highly likely to log in using their email address and password. _These malicious emails easily bypass traditional authentication tools such as SPF (Sender Policy Framework), DKIM (DomainKeys Identified Mail), and DMARC (Domain-based Message Authentication, Reporting, and Conformance).
ShinyHunters managed to bypass MFA in a recent data theft attack!
MFA or multi-factor authentication is considered to be a great tactic to prevent cyberattacks. But in a recent cyber incident, ShinyHunters managed to bypass MFA during a social engineering attack.
In this cyber incident, ShinyHunters targeted SoundCloud, Crunchbase, Panera Bread, and several dating apps, including Match, Hinge, OkCupid, and Tinder. A **group of researchers at Silent Push believes that there can be more victims of ShinyHunters, especially those who belong to financial services, real estate, logistics, fintech, healthcare, energy, and so on.
Mandiant believes that, in addition to ShinyHunters, there are two other independent threat groups that are also deploying the same tactic to bypass MFA.
These threat actors tend to pose as **IT customer support executives and use vishing calls as well as real-time adversary-in-the-middle infrastructure to gain access to OKTA SSP credentials and OTPs.
Okta is an access management service provider and believes that threat actors are using tailor-made phishing kits that have been specially designed to help live-call-based cyberattacks. **Experts believe that any type of MFA that is not resistant to phishing can be easily bypassed because of this new cyber campaign.
Signal Messenger used to target journalists
Unknown threat actors have been trying to gain access to multiple journalists’ accounts by using Signal Messenger. Most of them are investigative journalists. While some are well-known faces on television, others are from large and medium-sized media outlets. Besides journalists, reputed individuals and prominent figures of society, such as lawyers, are also being targeted. Threat actors send a message through Signal Messenger and pose as a customer support executive. They allege that someone is engaging in suspicious activity on the victim’s phone and attempting to access sensitive data. They then ask the victim to complete a Signal verification process and share a **verification code with the executive.
When the chat request on Signal Messenger is accepted by the victim, they receive a verification code on their smartphone. Sharing this code with the **Signa Security Support Chatbot enables attackers to gain access to the victim’s account.
An Indian firm was duped because of a fake email!
Indian infrastructure firm Megha Engineering and Infrastructures Ltd. fell prey to a massive phishing scam and lost almost $610 K.
MEIL needed to buy burner packages and a reaction furnace package from a Netherlands-based vendor. Payments were to be made in accordance with to signed contract. But a group of threat actors managed to impersonate the vendors and tampered with the payment instructions by using a malicious email ID. As a result of this tactic, MEIL transferred the payments to a fraudulent JPMorgan Chase account rather than the genuine ABN Amro Bank account.
On November 29, threat actors sent a fake email to MEIL claiming that the vendor’s original bank account is no longer functional because of a court order. The cybercrooks used a fake email address- nujis@duiker.cam, in place of nujis@duiker.com. MEIL considered the email to be genuine and transferred payments to the fraudulent account in January 2025.
General Manager
Founder and General Manager of DuoCircle. Product strategy and commercial lead for DMARC Report's 2,000+ customer base.
LinkedIn Profile →Take control of your DMARC reports
Turn raw XML into actionable dashboards. Start free - no credit card required.