ShinyHunters breached
Harvard and UPenn.
Voice phishing compromised Alumni Affairs staff, leaking data on 739K people including donor wealth bands. suss. catches the credential harvesting that enables attacks like this.
The initial compromise was a phone call we can't intercept. But the follow-up phishing, credential pages, and lateral movement? That's where suss. stops the chain.
What happened
Source: TechCrunch
Honest about our gap
The initial compromise was a voice phone call — a channel suss. cannot currently intercept. However, attacks like this don't end with one phone call. They involve follow-up phishing emails, fake login pages for credential harvesting, and lateral movement through compromised accounts. Those are the phases suss. catches.
How suss. would have caught the follow-up
We simulated the credential harvesting emails and fake login pages that typically follow voice phishing. Here's what fired.
4 threat indicators fired
Recommended actions
- 1NEVER share credentials over the phone — IT will never ask for your password
- 2Navigate to university systems directly via bookmarks, not links
- 3Report this to IT security immediately
- 4If you shared credentials, reset your password and enable MFA now
- 5Enable multi-factor authentication on all university systems
The cost of no protection
Why universities are prime targets
Breaking the attack chain
Credential Harvesting
Detects fake login pages, suspicious verification requests, and SSN/credential requests via email or chat.
Social Engineering
Identifies impersonation of IT support, urgency-based credential requests, and callback number scams.
Account Takeover
Flags phishing from compromised internal accounts, suspicious forwarding rules, and lateral movement indicators.
Data Exfiltration Indicators
Detects unusual data access patterns, bulk export requests, and suspicious system access from new locations.
With suss. vs. without
Without suss.
- Voice phishing call tricks staff into sharing credentials
- Attacker accesses alumni database undetected
- Follow-up phishing emails sent from compromised account
- 739K records exfiltrated over days
- $1M ransom demand — both universities refuse
- Data leaked publicly, donor trust shattered
With suss.
- Voice call still happens (gap: no phone interception yet)
- Follow-up credential harvesting emails flagged instantly
- Fake login pages blocked by page analyzer + form guard
- Compromised account phishing detected and reported
- IT security alerted before lateral movement succeeds
- Attack chain broken — database access prevented
How the pilot works
Start a free 30-day pilot
Protect your advancement and alumni offices from credential harvesting. Deploy in minutes, no IT integration required.
If ShinyHunters targeted Harvard and UPenn, no institution is immune.
Free for qualified universities and government institutions