Criminals are now able to execute social engineering scams and identity fraud more effectively due to the availability of custom voice-phishing kits on dark web forums and messaging platforms. These kits are marketed as a service to a growing number of digital intruders aiming to compromise victims’ accounts with major providers like Google, Microsoft, and Okta.
Functionality of the Phishing Kits
According to a blog post from Okta Threat Intelligence, these phishing kits include real-time assistance for criminals attempting to intercept user credentials and multi-factor authentication (MFA) codes. Brett Winterford, VP of Okta Threat Intelligence, noted that there are at least two kits exhibiting this novel functionality. The kits are designed to closely mimic the authentication flows of identity providers, allowing attackers to monitor user interactions with the phishing page and trigger customized views to enhance their deception.
Evolution of Scams
Winterford indicated that this type of malicious activity has evolved significantly since late 2025. Some advertisements for these phishing kits are reportedly seeking native English-speaking callers to impersonate helpdesk staff. These callers approach targets under the guise of resolving support tickets or conducting mandatory technical updates, which has proven effective in previous scams.
Execution of Attacks
The attack process typically begins with reconnaissance, where attackers gather information about their targets, including names, applications used, and contact numbers for IT support. This information is often publicly accessible through company websites and social media platforms. Once the attacker has sufficient details, they create a realistic login page using the phishing kit and contact the victim, posing as IT support.
If successful, the victim enters their credentials on the phishing site, which are then forwarded to the attacker. The real-time assistance feature allows the attacker to use these credentials immediately, attempting to log into the victim’s account while guiding them through MFA challenges.
Implications for User Security
These phishing kits can even bypass certain MFA challenges, such as those using number-matching, by instructing users to enter specific numbers. This significantly increases the risk of account compromise, as attackers gain full control over the victim’s account.
Okta’s findings align with previous reports on the rise of impersonation-as-a-service, where criminals offer tools and training for social engineering and identity fraud. This trend underscores the growing sophistication of cybercrime, making it essential for users to remain vigilant against such tactics.
This article was produced by NeonPulse.today using human and AI-assisted editorial processes, based on publicly available information. Content may be edited for clarity and style.








