Why SlashID
Identity ProtectionBlogDocumentation
Why SlashID
Use Cases
Discover Identity RiskEliminate IAM DebtIdentity Threat Detection & ResponseIdentity Security Posture ManagementAutomate Compliance Gap AnalysisSecure Non-Human Identities & AI AgentsStop Phishing AttemptsStop Impersonation & Deepfake AttacksDiscover & Block Shadow AppsIdentity ProtectionBlogDocumentation
SlashID Team, Vincenzo Iozzo
SlashID Team, Vincenzo Iozzo
SlashID Team, Vincenzo Iozzo
6 Mar, 2026
1. Attack anatomy: why this vishing flow works? 2. How SlashID helps to detect and prevent 3. A concrete NYDFS-aligned control map using SlashID Conclusion
Security
NYDFS 2026 Vishing Advisory: Detection and Defense with SlashID

On February 6, 2026, NYDFS issued an industry letter warning DFS-regulated entities about a spike in targeted vishing attacks where threat actors impersonate IT help desk staff to steal credentials and MFA codes.

This post breaks down the technical mechanics of the campaign, why it reliably bypasses MFA, and how to detect and contain it using identity telemetry with SlashID Identity Protection, Mutual TOTP verification, and MITM detection.

On February 6, 2026, NYDFS issued an industry letter warning DFS-regulated entities about a spike in targeted vishing attacks where threat actors impersonate IT help desk staff to steal credentials and MFA codes and gain remote access.

This post breaks down the technical mechanics of the campaign, why it reliably bypasses “MFA on paper,” and how to detect and contain it using identity telemetry — specifically mapping the NYDFS recommendations to SlashID Identity Protection, and MITM detection.

1. Attack anatomy: why this vishing flow works?

NYDFS describes a consistent pattern: attackers call employees on work/personal numbers (Impersonation), direct them to a malicious link (Social Engineering), capture credentials in real time, and then prompt for the MFA code to immediately authenticate and obtain remote access.

A more technical view of the kill chain

Phase A — After the reconnaissance phase, where enterprise information is gathered and enumerated, attackers attempt to gain an initial foothold by authenticating via out-of-band channels using various techniques like Help Desk Impersonation, SMS and vishing, and SIM swapping.

Phase B — Foothold Establishment — by using compromised credentials, and SSO access using a legitimate account (potentially enabling lateral movement across the environment).

Phase C — MFA bypass. The expression “Attackers don’t hack, they log in” is becoming more and more relevant. Even strong MFA can be defeated indirectly if the attacker can force account recovery, enroll a new device, or abuse help desk reset processes. The root cause of MFA bypass is the ability to replay tokens (SAML, OAuth) before they are expired.

NYDFS Vishing Attack Flow

It seems that the same attack vector SlashID previously analyzed in the Scattered Spider breaches at MGM and Caesars is not only still relevant today, but has become even more sophisticated.

2. How SlashID helps to detect and prevent

A vishing compromise leaves a very “identity-shaped” trail. The most actionable signals are not the phone call - they’re the sequence of identity events. High-signal detection patterns:

  • Password reset → new login from new geo/device within minutes
  • New MFA device enrolled shortly after reset
  • SSO session minted from a new IP / ASN, then immediate access to high-value apps
  • Privilege escalation attempts after initial foothold

SlashID is structured around two main ideas:

  1. Ingest identity posture + event logs from the sources (IdP, cloud, AD/Entra, SaaS), and
  2. Run a detection engine that emits threat detections and posture detections.
Attack PhaseHow the Attacker ExploitsHow SlashID DetectsHow SlashID Prevents
Recon & Initial FootholdImpersonates IT Help Desk via phone call (vishing) or SMSN/A (The phone call itself occurs outside the identity plane).Browser Extension + TOTP Verification
Credential Harvesting & MFA InterceptionUser visits a fake login page (often a reverse proxy like Evilginx). Attacker captures credentials and the MFA code as the user types them.MITM Token DetectionTOTP Verification
Lateral Movement & ImpactWith a valid SSO session, the attacker accesses file shares, or internal tools to exfiltrate data.Identity Graph AnalysisAI Assistant & Queries

These detection and response methods are discussed in more details in the following chapters.

2.1. Visibility Foundations and Detection Types that match vishing outcomes

SlashID typically ingests two types of data from each integrated data source such as Identity Data (users, NHIs, roles, permissions) and Events (activity logs showing how identities are used).

On the other hand, SlashID detection events include:

  1. Threat detection — Indicators of attack (IOAs)
  2. Posture detection — Misconfigurations (e.g., MFA disabled)
  3. Detection functions — CredentialStuffingAttempt, FederationBypass, MissingMFA
  4. Confidence score — Machine Learning model with a value between 0 and 1 indicating the likelihood that the detection is a true positive
  5. MITRE mapping fields — Automatic mapping to MITRE ATT&CK framework

Thus, providing continuous monitoring and detection.

2.2. Mutual TOTP for Help Desk vishing

The defining weakness of help desk vishing is that the call itself becomes the “authentication channel” as shown in the table above. Attackers win by convincing an agent to reset credentials / enroll MFA / approve recovery without a cryptographic way to verify who is on the other end of the line.

Mutual TOTP changes that: instead of trusting a voice, both parties perform a two-way verification handshake where each side must prove possession of a registered device (the verification is biometric-protected). It uses 6-digit RFC 6238 codes, rotating every 30 seconds, with bidirectional verification, real-time synchronization, and a 2-minute timeout.

Mutual TOTP Verification Flow

Operational model:

  1. Employee and help desk agent are both enrolled (activated with an IT token; access protected by FaceID/TouchID).
  2. One party initiates a handshake
  3. Both sides receive unique 6-digit TOTPs and read them to each other over the call.
  4. The handshake is marked Verified only when both codes are confirmed

Mutual TOTP blocks the “operator-assisted MFA bypass” moves because the attacker cannot complete the handshake without the registered device — thus, voice cloning/deepfakes won’t help.

2.3. Browser extension for phishing detection

SlashID also provides a browser extension that performs real-time phishing detection and identity protection at the client layer. While mutual TOTP secures the phone call, the browser extension secures the link click — the other critical hinge point in vishing campaigns.

SlashID’s browser extension is positioned to stop phishing where it happens: in the browser, before credentials are submitted. It inspects pages as they load by evaluating DOM, URL reputation, and form behavior, then a policy layer makes a decision (brand impersonation, typosquats, risky flows), and the extension can warn/block submission, or trigger extra authentication.

2.4. Detecting fake login attempts and MITM phishing

The vishing flow depends on redirecting victims to a malicious login page. SlashID provides an explicit MITM (reverse proxies) detection mechanism: you generate a MITM token tied to allowed domains, embed it in pages, and SlashID can detect when login pages are being accessed via unauthorized domains/proxy contexts. This is a strong fit for SSO login pages such as Okta or Entra.

2.5. Query the identity graph to confirm blast radius quickly

SlashID Identity Protection exposes your identity environment as a graph (identities, credentials, groups, policies, resources, and the relationships between them). By leveraging Cypher queries, security teams can quickly answer who has access to what, how did they get it, and what changed recently — which is exactly what you need during incidents like help desk vishing.

SlashID implements some high-value quality query patterns used to identify overprivileged identities, detect privilege escalation attempts, discover NHIs with unrestricted access to resources, and analyzing blast radius by identifying federated access risks.

SlashID Identity Graph Analysis

For deeper investigations, analysts can leverage SlashID’s AI assistant to generate natural-language queries that surface risky access patterns, privilege escalation, or lateral movement paths.

3. A concrete NYDFS-aligned control map using SlashID

NYDFS latest industry letter guidance focuses on preventing credential theft, strengthening MFA controls, and monitoring identity activity for signs of compromise. SlashID maps directly to these requirements by combining identity telemetry, phishing detection, and automated remediation to detect and contain vishing-driven account takeovers.

NYDFS Control RequirementHow SlashID Helps
Identity Verification Procedures (not caller ID)Monitor password reset and MFA enrollment events; trigger detection webhooks for suspicious identity changes and automate containment
Strengthen MFA controls and enrollment permissionsDetect MFA posture gaps (e.g., MissingMFA), enforce stronger authentication workflows, and enable SlashID’s TOTP
Continuous monitoring of authentication activityCorrelate identity telemetry across sources and query the identity graph to identify privilege escalation or unusual access patterns (e.g., FederationBypass)
MFA must be continuously evaluatedUse posture detections and continuous assessments to validate MFA coverage and flag configuration drift
Reduce exposure to fake login portalsDeploy MITM token detection on authentication surfaces to detect malicious login proxies and phishing infrastructure

Conclusion

Help desk vishing attacks show how modern intrusions increasingly target identity workflows rather than technical vulnerabilities. By exploiting social engineering and weak identity verification processes, attackers can obtain legitimate access and bypass traditional defenses.

SlashID helps break this attack chain by combining identity telemetry, behavioral detections, phishing protection, and identity graph analysis to detect suspicious authentication patterns and quickly contain compromised accounts. By implementing identity-centric security controls with SlashID, organizations can significantly reduce the risk of vishing-driven account takeovers and stop attackers before they can expand their foothold.

If you’re looking to strengthen your defenses against vishing attacks, contact SlashID to learn how our platform can help protect your organization.

Related articles

Security

/ 16 Jan, 2026

Scattered Spider Tradecraft: Identity Abuse, Attack Flow, and Defense

Scattered Spider is a highly adaptive cybercrime group that breaches enterprises by abusing identity, trust, and legitimate access paths rather than malware exploits.

Learn about their identity-centric attack flow, real-world campaigns like the MGM and Caesars breaches, and how to defend against these sophisticated threats.

SlashID Team, Vincenzo Iozzo
SlashID Team, Vincenzo Iozzo
SlashID Team, Vincenzo Iozzo

Security

/ 9 Nov, 2025

Microsoft Actor Token Forgery

Actor Token Forgery is one of the many techniques adopted by attackers to escalate privileges and move laterally via identity vector.

This post reconstructs the attack flow, maps it to MITRE ATT&CK, and outlines immediate detection and defense actions.

SlashID Team, Vincenzo Iozzo
SlashID Team, Vincenzo Iozzo
SlashID Team, Vincenzo Iozzo

Security

/ 21 Sep, 2025

Access tokens strike again, the Salesloft Drift breach

In mid‑August 2025, GTIG confirmed a large‑scale credential‑harvesting and data‑theft campaign abusing trusted OAuth integrations (Drift) to access Salesforce orgs.

Attackers (UNC6395) used stolen Drift OAuth tokens to mass‑query Salesforce, mine embedded secrets (AWS, Snowflake), and pivot into connected platforms.

This post reconstructs the attack flow, maps it to MITRE ATT&CK, and outlines immediate detection and defense actions.

SlashID Team, Vincenzo Iozzo
SlashID Team, Vincenzo Iozzo
SlashID Team, Vincenzo Iozzo

Ready to start a top-tier security upgrade?

Get in touch
Terms · Privacy · System Status
© 2025 SlashID® Inc. All Rights Reserved.

Products

Why SlashID
Identity Protection Use Cases
Identity Management

Resources

Blog Documentation

We use cookies to improve your experience. Read our cookie policy.