Identity Breaches Hit 70% of Orgs: 2026 SMB Defense Plan

Sophos's 2026 Identity Breach Costs Report shows more than 70% of organizations were hit by an identity-related breach in the past year — and the ShinyHunters Salesforce campaign, the SharePoint zero-day CVE-2026-32201, and agentic AI tooling are making identity the highest-leverage attack surface in cybersecurity today. This playbook walks SMB and mid-market leaders through what changed, the five vectors driving 2026 breaches, and a phased 90-day defense plan.

Back to Blog
18 min read
Isometric blueprint of an identity-centric security perimeter with cloud, SaaS, OAuth, and endpoint nodes connected to a central identity hub

On the morning of May 1, 2026, a Cushman & Wakefield employee answered a phone call. By the end of that conversation, the ShinyHunters extortion crew had walked out of the world's largest commercial real estate services firm with more than 500,000 Salesforce records — names, contact information, contract details, internal corporate data [Cybernews]. No malware. No exploit. No firewall to bypass. Just a credential, a session, and the trust placed in both [The Register].

That single intrusion is the shape of cybersecurity in 2026. The perimeter is no longer a network boundary. It is an identity — and the data shows that almost every organization has already lost the boundary fight at least once. Sophos's newly published 2026 Identity Breach Costs Report, based on a survey of 5,000 IT and security leaders across 17 countries, found that more than 70% of organizations were hit by at least one identity-related breach in the prior twelve months [Help Net Security]. The attackers did not need novel tools to do it. They needed a phone, an OAuth token, and an MFA prompt that someone clicked through too quickly.

✓ Key Takeaways

  • More than 70% of organizations experienced at least one identity-related breach in the past 12 months, according to Sophos's 2026 Identity Breach Costs Report.
  • The ShinyHunters/UNC6040 campaign — including the May 2026 Cushman & Wakefield intrusion — shows how vishing plus OAuth token abuse defeats traditional MFA without touching the network.
  • Active exploits like the SharePoint zero-day CVE-2026-32201 (added to the CISA Known Exploited Vulnerabilities catalog on April 14, 2026) chain into identity attacks because session and identity data live inside the same web applications.
  • Agentic AI has collapsed the time between reconnaissance and lateral movement to minutes — in some published research, breakout times measured in tens of seconds — which makes detection windows that used to feel adequate suddenly inadequate.
  • Phishing-resistant MFA built on FIDO2 and passkeys is the single highest-leverage control SMBs can deploy in 2026, with the FIDO Alliance reporting more than five billion passkeys now in active use globally.

Why Identity Became the Number-One Attack Surface

For most of the last decade, defenders thought about identity as one column in a defense-in-depth diagram. Network controls held the perimeter. Endpoint detection caught what got through. Identity sat in the middle, important but rarely the headline. That ordering has inverted. Three structural shifts in how mid-market and enterprise organizations operate have made identity the single most consequential surface in the attack chain.

The first shift is workload location. Mid-market and SMB workloads have moved decisively into SaaS — Microsoft 365, Salesforce, Google Workspace, ServiceNow, GitHub, Slack, Drift, Salesloft, hundreds of others. Each platform issues credentials, sessions, and OAuth tokens. Each platform is reachable from anywhere with the right credential. There is no perimeter to defend when the data lives in someone else's cloud and the door is a login screen.

The second shift is integration density. Modern SaaS stacks are wired together by OAuth grants that let one application read or write data inside another. A single compromised integration token — say, the Drift OAuth token that gave UNC6395 access to hundreds of Salesforce tenants in late 2025 — propagates a breach across an entire ecosystem of customers without the attacker ever touching a workstation [Mitiga]. The blast radius of one stolen token is no longer one mailbox; it is the customer base of a vendor.

The third shift is the speed at which attackers now operate. Adversaries running agentic AI tooling have demonstrated end-to-end intrusion sequences in published research where 80–90% of the operational work — reconnaissance, target selection, exploit chaining, lateral movement — is performed by autonomous agents. Industry analysts have measured breakout windows that used to be hours collapsing to single minutes in 2026, with some research environments demonstrating intrusions in less than a minute from initial access to first lateral hop. Defensive postures designed around 24-hour detection envelopes do not survive contact with that threat model.

Isometric blueprint diagram showing identity at the center of cloud, SaaS, endpoint, and email layers with credential and token flows as connecting lines

The identity-centric attack surface: every SaaS platform, integration token, and session is a perimeter that defenders must now treat as production-critical.

Anatomy of a 2026 Identity Breach

The Cushman & Wakefield incident is worth examining in detail because it follows a playbook that has been used against dozens of large enterprises in the same campaign, and because the same playbook scales down trivially to mid-market and SMB targets. ShinyHunters — tracked by Google Threat Intelligence under the designation UNC6040 — has refined a method that does not depend on malware, zero-days, or sophisticated infrastructure. It depends on telephone calls and trust.

The attack chain begins with reconnaissance — identifying customer-facing employees with administrative access to a Salesforce environment, often through LinkedIn or vendor support directories. The attacker then calls the employee, impersonating internal IT or a trusted vendor representative, and uses a pretext (a security incident, a system migration, a routine audit) to walk the target through approving a malicious OAuth application or handing over a session token. Once the OAuth grant is in place, the attacker queries the Salesforce REST API at machine speed, exfiltrates the data, and leaves no host-level forensic trace.

The Cushman & Wakefield variant of this attack ran in a single morning. ShinyHunters set an extortion deadline of May 6, 2026, and when the company did not pay, the group published a 50 GB dataset as proof — followed within the same week by a second ransomware group, Qilin, separately listing the company on its leak site [Cybernews]. The financial and reputational damage are still being totaled. The lesson, however, is already clear: the attackers did not need to compromise the network. They needed to compromise one person and one token.

This is not an isolated tactic. The same ShinyHunters/UNC6040 cluster has been linked to intrusions at Carnival Cruise Line, ADT, Salesforce-using insurers, and dozens of customers downstream of the original Salesloft Drift OAuth token compromise [Mitiga]. Each campaign uses small variations on the same theme. The common ingredient is identity — a credential, a session, or a token — being abused at scale because the underlying access pattern is indistinguishable from legitimate usage.

Why SMBs Are the Highest-Value Soft Targets

It is tempting for small and mid-sized businesses to read coverage of attacks on Cushman & Wakefield, Carnival Cruise Line, or Trellix and conclude that the threat is reserved for the Fortune 1000. The opposite is true. Threat actors that develop a repeatable identity-attack method run it against every target in their reach, prioritizing organizations with the weakest control surface and the highest cash-to-defense ratio. SMBs sit precisely in that band.

Three operational realities work against SMBs in 2026. First, SaaS adoption in the 25–500 employee segment has reached enterprise-class density without enterprise-class identity governance — most organizations of that size run Microsoft 365, a CRM, a help desk, a finance platform, and a dozen other applications, but few have consolidated identity, OAuth grant inventory, or privileged-access management across them. Second, the security team is typically one or two people deep, which leaves no margin for 24/7 monitoring of identity signals across that fragmented surface. Third, executive and finance staff are reachable through cell phone numbers that are trivial to obtain — making vishing campaigns disproportionately effective.

70%+

of organizations hit by an identity-related breach in the past 12 months

500K+

Salesforce records exfiltrated from Cushman & Wakefield via a single vishing call

5B

FIDO2 passkeys now in active use globally as of World Passkey Day 2026

Sources: Sophos 2026 Identity Breach Costs Report (Help Net Security); Cybernews; FIDO Alliance.

The economics are also against SMBs. The Sophos report places the total cost of a single identity-related breach — direct response, downstream remediation, customer notification, regulatory exposure, and lost productivity — at levels that frequently exceed annual cybersecurity budgets for organizations in this segment. For a 150-person professional services firm, a single successful vishing-and-OAuth compromise is an extinction-level event that the cybersecurity program, as currently funded, was not designed to absorb. The question is not whether to invest more. The question is where the next dollar produces the most defensive leverage.

The Five Identity Attack Vectors Defining 2026

The threat surface looks larger than it actually is. Underneath the variety of incidents, a small number of access patterns produce the majority of identity breaches. Closing these five vectors closes most of the practical risk for SMB and mid-market organizations.

1. Voice Phishing (Vishing) and Help-Desk Impersonation

The Cushman & Wakefield and Carnival Cruise Line attacks were both initiated by phone calls to customer-facing employees. The attacker poses as internal IT or a trusted vendor and manipulates the target into authorizing access, resetting a password, or approving an MFA push. Email-based phishing receives most of the security awareness budget, but in 2026 voice is where the highest-value compromises actually happen. Help-desk impersonation — where the attacker calls the help desk and convinces staff to reset MFA on a target account — is the mirror version of the same attack.

2. OAuth Token Theft and Third-Party Integration Abuse

The 2025 Salesloft Drift compromise demonstrated how a single OAuth token, leaked from a trusted SaaS integration, can be abused against hundreds of customer tenants without any of the customers being individually targeted. OAuth scopes are often over-broad, tokens rarely rotate, and most organizations have no inventory of which applications hold which grants in their primary identity provider. This is the supply-chain dimension of identity that 2026 made unignorable.

3. MFA Fatigue and Push Bombing

Most organizations now require multi-factor authentication. The most commonly deployed factor is a mobile push notification. Push-bombing — sending dozens of MFA prompts in rapid succession until the target reflexively approves one — has become the standard technique for converting a stolen password into a working session. Sophos's identity breach data attributes a substantial fraction of successful compromises to this mechanism, particularly against users on mobile devices in the middle of other tasks.

4. Web Application Vulnerabilities That Yield Identity Material

The SharePoint spoofing vulnerability CVE-2026-32201, patched on April 14, 2026 and immediately added to the CISA Known Exploited Vulnerabilities catalog [Microsoft MSRC], is the canonical example of a 2026 identity-adjacent web flaw. It is technically a spoofing bug — but its real value to attackers is harvesting session material, manipulating internal communications, and pivoting through identity provider integrations that trust the SharePoint origin. Web app exploitation is now an identity vector by extension.

5. Agentic AI Reconnaissance and Credential Exploitation

Published incident reports from major intelligence groups documented attacks in late 2025 and early 2026 in which agentic AI handled the majority of the operational sequence — discovery, exploitation, credential gathering, lateral movement — at speeds and at scale that no human team could match. The defensive implication is not that AI itself is the threat. It is that the speed of the threat has changed: detection windows that defenders measured in hours need to be measured in minutes.

Legacy MFA Is Not Enough — Here Is What Replaces It

Every credible 2026 incident write-up reaches the same conclusion in slightly different language: legacy MFA — SMS codes, voice calls, push notifications — does not stop the attacks that are actually happening. Phishing-resistant MFA built on FIDO2 and passkeys does, because the cryptographic binding between the authenticator and the relying-party domain makes credential interception, push-bombing, and adversary-in-the-middle proxy attacks structurally impossible.

Authentication Method Phishing-Resistant? Resists Push-Bombing? 2026 Recommendation
Password only No N/A Retire
SMS / voice OTP No No Retire — SIM swap and intercept proven repeatedly
Mobile push (basic) No No Migrate away — primary vector for fatigue attacks
Number-matching push Partially Yes Acceptable interim — still defeatable by AitM proxies
FIDO2 hardware key Yes Yes Required for privileged and admin accounts
Passkeys (device-bound) Yes Yes Target end state for general workforce

The FIDO Alliance reported on World Passkey Day 2026 that more than five billion passkeys are now in active use, with 87% of surveyed enterprises actively deploying or piloting them — up from 53% two years prior [FIDO Alliance]. Microsoft, Google, and Apple all support passkey enrollment in their native identity stacks, and PCI DSS 4.0 explicitly cites FIDO2 passkeys as a qualifying mechanism for the phishing-resistant MFA requirement that took effect during 2025–2026 enforcement windows. The technology is no longer experimental and no longer optional for organizations that handle regulated data.

"Every identity breach we've responded to in 2026 had one thing in common: the attacker did not need to break a single cryptographic boundary. They needed a credential and a human."

— Cybersecurity Operations Lead, ITECS

The 2026 SMB Identity Defense Playbook

An identity-first defense program rests on a small number of controls that compound when deployed together. None of them are exotic. Most of them have been recommended for years. What has changed in 2026 is that the cost of not deploying them has gone vertical, and that the attacker tooling has gotten fast enough that partial coverage no longer buys partial protection. The five-layer playbook below reflects what ITECS deploys in production for mid-market clients.

Layer 1 — Phishing-Resistant Authentication

Begin with privileged and administrative accounts: global administrators, Salesforce system admins, finance approvers, IT operations. Issue FIDO2 hardware keys or platform passkeys, eliminate password fallback, and enforce conditional access policies that block legacy authentication protocols entirely. Expand to the general workforce on a 60–90 day rollout, starting with employees who have access to customer data or financial systems. The implementation is straightforward; the change management — getting users comfortable with a new factor and removing the SMS fallback they have used for years — is the actual project.

Layer 2 — Conditional Access and Session Hardening

Phishing-resistant MFA at the front door is only as strong as the session that follows it. Configure conditional access in Microsoft Entra ID (or your identity provider's equivalent) to evaluate device compliance, geographic anomalies, sign-in risk score, and application sensitivity on every authentication. Shorten session lifetimes for sensitive applications and require re-authentication for risky actions like creating new OAuth grants, exporting large datasets, or changing administrative roles. Continuous Access Evaluation, where the identity provider re-checks signals mid-session, closes the gap between a clean login and a hijacked session.

Layer 3 — OAuth and Third-Party Integration Governance

Inventory every OAuth application connected to your primary identity provider and your major SaaS platforms — particularly Microsoft 365 and Salesforce. Remove unused grants. Restrict end-user consent to low-risk scopes and require administrative review for anything that reads mail, calendar, contacts, or CRM records. Rotate long-lived tokens on a documented schedule. Subscribe to vendor security advisories from any third-party integration vendor (Drift, Salesloft, Marketo, ZoomInfo, and similar tools were all touched by the 2025 supply-chain campaign) and have a documented response procedure for revoking grants in under an hour if a partner discloses a token compromise.

Layer 4 — Identity Threat Detection and Response (ITDR)

Traditional EDR watches endpoints. Managed endpoint detection and response remains essential, but identity-layer signals — anomalous sign-ins, impossible-travel events, unfamiliar OAuth consents, push-notification storms, privileged role elevations — need their own detection and response pipeline. Microsoft Defender for Identity, Defender XDR, and equivalent platforms generate this telemetry; the gap most SMBs have is the staffing to triage it. A managed detection and response provider with an identity-threat practice closes that gap without expanding internal headcount.

Layer 5 — Human-Layer Defense and Vishing Resistance

Because the most successful 2026 intrusions begin with a phone call rather than a phishing email, security awareness programs have to evolve. Standard training on email-borne phishing is necessary but no longer sufficient. Modern cybersecurity awareness training needs to drill voice-call pretexts, help-desk impersonation, executive deepfake calls, and the specific scripts being used by groups like ShinyHunters. Establish out-of-band verification procedures for any unusual administrative request — a callback to a known number is one of the most under-deployed and most effective controls in the modern stack. Pair that with a password manager rollout (ITECS deploys 1Password as an authorized reseller and managed services partner) to remove credential reuse from the attack surface entirely.

Security operations workstation with multiple monitors displaying identity sign-in risk dashboards, conditional access policy graphs, and OAuth consent telemetry under blue-toned screen lighting

An identity-threat detection workstation: sign-in risk, conditional access enforcement, and OAuth consent telemetry surface together so analysts can correlate signals in seconds.

⚠ Active Exploitation Advisory

Organizations running on-premises SharePoint Server 2016, 2019, or Subscription Edition that have not applied the April 14, 2026 Patch Tuesday update for CVE-2026-32201 should treat patching as urgent. Active exploitation has been confirmed in the wild; CISA's federal civilian remediation deadline was April 28, 2026 [Microsoft MSRC]. Identity-adjacent web flaws like this one chain directly into the breach patterns described in this article.

A 90-Day Action Plan for Mid-Market Organizations

The playbook is not abstract. Below is the sequence ITECS deploys for new mid-market clients who arrive with mixed identity posture — some MFA, some legacy authentication, no consolidated visibility. It is a realistic 90-day shape for an organization with one or two internal IT staff and an external managed cybersecurity partner.

1

Days 1–14: Discovery and Containment

Inventory identities, privileged accounts, and OAuth grants across the primary identity provider and the top five SaaS platforms. Disable legacy authentication protocols. Force a password rotation for any account using SMS-only MFA. Identify the population that needs hardware keys.

2

Days 15–30: Privileged Account Hardening

Issue FIDO2 keys to administrators, finance approvers, and any account with global or tenant-wide access. Enforce conditional access policies requiring phishing-resistant MFA for those accounts. Implement just-in-time elevation for standing administrative roles.

3

Days 31–60: Workforce Rollout

Deploy passkeys or platform authenticators to the general workforce in cohorts. Migrate from basic push notifications to number-matching push as an interim control, then to passkeys. Roll out password manager (1Password) to eliminate credential reuse. Run vishing simulation exercises against finance and customer-facing teams.

4

Days 61–90: Detection, Response, and Tabletop

Stand up identity-layer detection — Defender for Identity, conditional access logs, OAuth consent monitoring — connected to a 24/7 managed SOC. Run a tabletop exercise modeling a vishing-and-OAuth scenario against a senior leader's account. Document the response playbook and verify revocation and containment timing meets target objectives.

The structure is intentionally phased. Trying to do all of it in week one creates change-management failures that erode user trust in the controls. Trying to skip phase one and jump straight to detection produces alerts on a fundamentally unhealthy identity surface that the team cannot meaningfully act on. The order matters.

What Comes Next

Two trends are likely to shape identity security through the rest of 2026 and into 2027. The first is the continued migration of attacks toward voice and live human interaction. Email-based phishing will remain a volume play, but the high-value compromises — the ones that make headlines and incident-response invoices — will increasingly start with a phone call or a deepfake voice message to a finance approver or an executive assistant. The second is the rapid normalization of agentic AI on both sides of the fight. Defenders will rely more heavily on AI-driven identity threat detection that correlates signals across SaaS platforms in real time. Attackers will use the same class of tooling to compress reconnaissance and exploitation into windows that traditional staffing models cannot cover.

The organizations that come out of this cycle in a strong position will not be the ones with the largest security budgets. They will be the ones that internalized — early — that identity is now the production surface, and that the controls protecting it deserve the same operational discipline as a production database. The investments are not large in absolute terms. The window in which they are still discretionary is narrowing.

Map Your Identity Attack Surface Before an Attacker Does

ITECS runs identity-focused cybersecurity assessments for mid-market and SMB organizations across regulated industries. We inventory your OAuth grants, evaluate your MFA posture, model your vishing risk, and build a prioritized 90-day plan that closes the highest-leverage gaps first. The assessment takes weeks, not months — the threat model does not wait.

Start Your Cybersecurity Assessment →

Sources

  • Help Net Security — Over 70% of organizations hit by identity breaches (Sophos 2026 Identity Breach Costs Report): helpnetsecurity.com
  • Cybernews — Two ransomware gangs now claim Cushman & Wakefield after Salesforce breach claim: cybernews.com
  • The Register — Cushman & Wakefield confirms vishing cyberattack: theregister.com
  • Mitiga — ShinyHunters and UNC6395: Inside the Salesforce and Salesloft Breaches: mitiga.io
  • Microsoft MSRC — Security Update Guide for CVE-2026-32201 (SharePoint Server Spoofing): msrc.microsoft.com
  • The Hacker News — Microsoft Issues Patches for SharePoint Zero-Day and 168 Other New Vulnerabilities: thehackernews.com
  • FIDO Alliance — Five Billion Passkeys: FIDO Alliance Reports Mainstream Global Usage on World Passkey Day 2026: fidoalliance.org
  • CISA — Implementing Phishing-Resistant MFA: cisa.gov

continue reading

More ITECS blog articles

Browse all articles

About ITECS Team

The ITECS team consists of experienced IT professionals dedicated to delivering enterprise-grade technology solutions and insights to businesses in Dallas and beyond.

Share This Article

Continue Reading

Explore more insights and technology trends from ITECS

View All Articles