Every major breach of the last three years has one thing in common. The attacker was authenticated. They had a valid session, a legitimate OAuth token, stolen-but-real credentials, or a non-human identity credential that every downstream system accepted without question.

Okta's support service account was compromised — and the attacker used it to steal session tokens from every HAR file customers had ever uploaded. Snowflake lost 160+ enterprise customers to attackers who simply logged in. ADT was vished twice in 18 months through its Okta help desk — same vector, same outcome, different year. And in August 2025, a single compromised OAuth integration token gave one threat actor authenticated API access to 700 enterprise Salesforce tenants simultaneously — without ever touching a human credential.

In none of these cases did the attacker break cryptography or brute-force anything in real time. In every case, by the time data began moving, the attacker had a credential — human or non-human — that every layer of identity infrastructure said was legitimate.

This is the identity paradox. And it applies equally to human identities and the non-human identities — API tokens, OAuth integrations, CI/CD credentials, service accounts — that now outnumber human accounts in most enterprises by orders of magnitude.

10/10
Breaches where attacker had valid auth credentials or token
0/10
Breaches stopped by identity layer alone
3.5TB
Data Canvas/Salesforce couldn't detect moving with a valid session
$117.5M
Comcast settlement — 35.9M customers, one unpatched Citrix box

The Breach Record: Valid Identity, Every Time

We analyzed ten of the most significant breaches of the last three years — spanning the world's largest identity providers, SaaS platforms, enterprise security companies, and AI infrastructure. Seven involve human identities. Three involve non-human identities (NHI) — API tokens, OAuth integrations, and service accounts. The pattern across both is consistent and sobering.

Canvas / Instructure — 275M Student Records, 3.65TB, Zero Alerts Critical · 8,809 Institutions
Identity provider: Institutional SSO (Shibboleth, Azure AD, Google) + Free-For-Teacher self-enrollment · MFA: Not enforced on FFT tier · May 2026

Instructure operates two account tiers on the same production infrastructure: institutionally-managed accounts (SSO via university IdPs) and a Free-For-Teacher self-enrollment program (no institutional IdP, no verification). ShinyHunters exploited the weaker tier — self-enrolled FFT accounts that shared production tenant access — to exfiltrate 3.65TB across 8,809 institutions over a 7-day window. The second breach occurred one week after the first, using the same vector.

This is Salesforce's problem. The platform — one of the world's largest SaaS systems by data volume — was completely blind to 3.65TB leaving its infrastructure. No exfiltration monitoring. No volume threshold. No anomaly detection. A valid session moved the equivalent of hundreds of millions of records and nothing fired.

Missing After Authentication

Egress volume monitoring — 3.65TB is not a subtle signal. API rate limiting by data volume, not just request count. Tenant isolation enforcement between account tiers. Behavioral baseline per account — FFT accounts running bulk exports of production data is anomalous by definition.

Vercel — OAuth Token Theft via Shadow AI App High · AI Supply Chain Attack
Identity provider: Google Workspace OAuth 2.0 · MFA: Bypassed by direct token theft · April 2026

A Vercel employee signed up for Context AI (an "AI Office Suite") using their corporate Google Workspace account with "Allow All" OAuth permissions. Context AI was later compromised via Lumma Stealer malware delivered through malicious Roblox scripts — a consumer-facing attack surface that harvested corporate OAuth tokens as a secondary effect. With the Vercel employee's Google OAuth token, the attacker accessed Vercel's internal environments and unclassified environment variables.

This is the AI-era attack surface. Consumer AI tools, personal devices, over-scoped OAuth grants, and zero enforcement of corporate app policies on third-party AI apps create a new credential exfiltration vector that traditional identity governance doesn't see.

Missing After Authentication

Shadow IT visibility — the AI tool was unsanctioned but used with corporate credentials. OAuth scope enforcement — "Allow All" should not be permissible for corporate accounts. Token anomaly detection — new IP/location using an existing valid OAuth token.

LiteLLM — Poisoned Security Scanner Exfiltrates CI/CD Secrets Critical · AI Infrastructure Supply Chain NHI Breach
Identity type: PyPI API token (non-human CI/CD identity — not a human login) · MFA: N/A for machine tokens · March 2026

This is not a human identity breach. The target was a non-human identity — LiteLLM's PyPI publishing API token stored in its CI/CD pipeline. A poisoned version of Trivy (a security scanning tool used in the build pipeline) exfiltrated the token to attacker group TeamPCP. With valid PyPI credentials, TeamPCP published two malicious versions of litellm (1.82.7 and 1.82.8) in a 13-minute window. The malicious payload harvested SSH keys, cloud credentials (GCP, AWS, Azure), kubeconfigs, API keys, and database passwords from every machine that installed either version.

This breach illustrates why non-human identity — API tokens, service accounts, CI/CD credentials — is the largest unmonitored attack surface in modern infrastructure. No MFA applies. No rotation policy existed. The scanning tool exfiltrated the very secret it was supposed to protect.

Missing After Authentication

Short-lived, scoped tokens for pipeline publishing — not long-lived API keys. Detection of CI/CD tooling making outbound connections to attacker infrastructure. Anomaly detection on package publishing activity. NHI inventory — the token was unmonitored because it wasn't tracked as an identity at all.

ADT — AI-Assisted Vishing, Round Two. 5.5M Customers. High · 5.5M Customer Records
Identity provider: Okta SSO → Salesforce · MFA: Bypassed via AI-assisted vishing reset · 2025–2026

ShinyHunters (UNC6040) returned to ADT with the same playbook as 2024 — vishing targeting the Okta help desk — but with AI-generated call scripts that made impersonation more convincing and harder to detect in real time. The attacker again obtained a valid Okta session and pivoted to Salesforce. 5.5M customer records including names, addresses, dates of birth, and partial SSNs were confirmed in Have I Been Pwned. ShinyHunters claimed 10M+ Salesforce records.

This is the third ADT breach in 18 months. The attack vector — vishing → help desk reset → valid Okta session → Salesforce data — was identical to the 2024 incident. The 2024 breach produced no process changes sufficient to stop the 2025 attack. Same company. Same attacker group. Same entry point.

Missing After Authentication

Out-of-band callback verification for all help desk credential resets — call the employee back on their registered device, not the caller's number. Behavioral monitoring on Salesforce sessions from newly-reset accounts. The identity layer was not the problem in 2024 or 2025. The process that overrides it was.

Salesforce / Salesloft-Drift — One OAuth Token, 700 Enterprise Victims Critical · 700+ Organizations NHI Breach
Identity type: Salesloft Drift OAuth integration token (non-human machine identity) · MFA: Irrelevant — OAuth tokens are post-MFA artifacts · August 2025

This is not a human identity breach. Threat actor UNC6395 compromised Salesloft Drift's OAuth integration credentials and used valid non-human identity tokens to authenticate directly into 700+ Salesforce customer organizations — without ever touching a human credential or MFA prompt. OAuth tokens are post-authentication artifacts: they are issued after MFA completes and grant API access without re-challenging MFA for each call.

UNC6395 ran SOQL queries across all 700 tenants, harvesting user credentials, opportunity data, and customer records — and then searched within those records for embedded AWS access keys, Snowflake tokens, and other cloud credentials. Drift was removed from the Salesforce AppExchange. All active Drift OAuth tokens were revoked August 20. The Salesforce identity layer — OAuth — did exactly what it was designed to do: it trusted the token.

Missing After Authentication

Third-party OAuth app behavioral monitoring — the integration was making anomalous API calls across hundreds of tenants simultaneously, which is not normal behavior for a sales engagement tool. OAuth scope minimization — "full access" grants to third-party integrations. Detection of NHI token usage from unexpected infrastructure.

ADT — Okta Bypassed via Help Desk, Salesforce as Data Tier High · First of Three Breaches in 18 Months
Identity provider: Okta SSO → Salesforce · MFA: Bypassed via account reset · August 2024

ShinyHunters (UNC6040) breached ADT's Okta environment using vishing — impersonating an employee to manipulate an Okta help desk reset. The valid Okta session was then used to pivot to ADT's Salesforce instance to exfiltrate customer records. This is the same playbook ShinyHunters used across Instructure, Workday, McGraw-Hill, Amtrak, and Infinite Campus — with minor variations. The pattern is consistent enough that Mandiant has documented it as UNC6040's standard operating procedure.

Missing After Authentication

Out-of-band callback verification for help desk account resets. Behavioral monitoring on Salesforce API sessions — bulk queries from newly-reset accounts with no prior data access history. Least-privilege scoping on third-party vendor access.

Snowflake — 160+ Enterprise Customers, 560M+ Records Critical
Identity provider: Snowflake native auth · MFA: Not enforced · April–June 2024

UNC5537 didn't exploit a vulnerability. They logged in. Infostealers (VIDAR, RISEPRO, LummaC2) had harvested Snowflake credentials from employee devices over years — some dating to 2020. UNC5537 bought the credentials on criminal marketplaces, authenticated normally through Snowflake's login page, and ran bulk SELECT queries exporting tens of millions of records. Victims included AT&T (110M records), Ticketmaster (560M records), Santander Bank, LendingTree, and 155 others.

What stopped it: Nothing. Snowflake did not enforce MFA globally at the time — it was opt-in. No alerting existed on bulk data exports from accounts that had never previously exported anything. Snowflake's event logging was a paid add-on that most affected customers hadn't enabled.

Missing After Authentication

Behavioral anomaly detection — an account that has never run a bulk export query suddenly exporting 100M rows is an obvious signal. No egress volume thresholds. No alerting on logins from IPs with no history on the account.

Microsoft / Midnight Blizzard — No MFA on a Legacy Test Tenant. Russian SVR Gets In. Critical · State Actor (APT29)
Identity provider: Legacy Microsoft OAuth test tenant (no production SSO) · MFA: Not enabled · January 2024

APT29 (Cozy Bear — Russian SVR, the SolarWinds group) used password spray against a legacy, non-production OAuth test tenant that had no MFA enabled. The test account had been granted dangerously elevated OAuth permissions: Directory.ReadWrite.All, RoleManagement.ReadWrite.Directory, Application.ReadWrite.All. APT29 used those permissions to create new OAuth applications, grant Exchange Online full_access_as_app, and pivot into Microsoft's corporate email — accessing accounts of senior leadership, the cybersecurity team, and legal employees. They were specifically looking for what Microsoft knew about APT29.

Microsoft filed with the SEC under new cyber disclosure rules. CISA issued a federal alert. Attack volume escalated 10× in February 2024. The entry point: a forgotten test account with no MFA that no one had decommissioned.

Missing After Authentication

Lifecycle management for non-production accounts — the test tenant should not have existed with those permissions. MFA enforcement on all accounts regardless of environment. Least-privilege review on OAuth app permissions. Detection of password spray against legacy tenants with no recent activity.

Okta — The Identity Provider Gets Its Own Session Hijacked High · 5 Enterprise Customers Affected NHI Breach
Identity type: Okta internal service account (non-human identity — Salesforce support portal) · MFA: Bypassed by token replay · October 2023

This breach began with a non-human identity — a Salesforce support service account whose credentials an Okta employee had saved to their personal Chrome profile, which synced to a personal device. That device was compromised. The attacker accessed Okta's customer support portal and downloaded HAR files customers had uploaded for troubleshooting. HAR files contain raw browser session data — including active session cookies and authentication tokens in plaintext. The attacker replayed those tokens against 5 Okta customers, including BeyondTrust, Cloudflare, and 1Password.

The deepest irony in modern security: the world's largest enterprise identity provider was breached via its own support service account, and the credentials to sensitive customer data were exfiltrated in a file format that customers themselves had uploaded for support purposes.

Missing After Authentication

Controls prohibiting credential sync to personal browser profiles. Detection of the service account accessing an anomalous number of customer files. HAR sanitization — tooling to strip session tokens before upload. Session token lifetime limits that would have expired replayed tokens before use.

Comcast / Xfinity — CitrixBleed: MFA Bypassed Before It Could Apply Critical · 35.9M Records · $117.5M Settlement (2026)
Identity provider: Citrix NetScaler (session gateway) · MFA: Fully bypassed by session token extraction · October 2023 · Settlement finalized April 2026

CVE-2023-4966, "CitrixBleed," allowed attackers to extract valid authenticated session tokens directly from Citrix NetScaler ADC memory — no credentials required. The attack delivered a live, authenticated session that had already passed MFA. The attacker never touched the authentication step. Comcast was attacked between October 16–19, 2023, days after Citrix published the patch but before Comcast applied it. 35.9M customer records exposed — including hashed passwords, partial SSNs, and secret Q&A responses.

In April 2026, Comcast agreed to a $117.5M class action settlement — one of the largest data breach settlements on record. The final approval hearing is scheduled for July 7, 2026. The breach itself took four days. The recovery took three years.

Missing After Authentication

Detection of session replay from IPs with no prior history. Behavioral monitoring post-authentication — the stolen session initiated access patterns inconsistent with the original user's behavior. Patch cadence controls — the vulnerability was public when the breach occurred.

The Pattern in Every Breach

Across all ten breaches, three consistent themes emerge.

1. Authentication Succeeded — Human and Non-Human

In zero cases did the attacker break cryptography or brute-force credentials in real time. For human identities: they obtained valid credentials (stolen, reset, or social-engineered), stole valid session tokens (post-authentication), or exploited the human override mechanism (help desk reset). For non-human identities: they stole API tokens, OAuth integration credentials, or service account credentials — none of which have MFA equivalents. In every case, the authentication system did exactly what it was designed to do.

2. MFA Was Present but Insufficient

Of the ten breaches: MFA was present in six. In all six, it was bypassed — not broken. Social engineering bypassed help desk reset procedures. Session token theft delivered pre-authenticated sessions. OAuth token exfiltration made MFA irrelevant — OAuth tokens are post-MFA artifacts. Three breaches had no MFA at all (Canvas FFT, Snowflake, Microsoft's test tenant). Three were NHI breaches where MFA doesn't apply. MFA is a gate at the front door. It provides zero protection once the attacker is inside — and zero protection for non-human identities that have no door at all.

3. The Data Layer Was Unprotected

After authentication succeeded, in every case the data layer had no independent controls. No behavioral anomaly detection on query volume. No egress monitoring on data transfer rates. No tenant-level key isolation. No immutable audit trail that would have detected the exfiltration before it completed. The posture was: if you authenticated, you're trusted. Trust means access. Access means data.

The verdict across 10 breaches — most recent first

Breach & Date Identity Type MFA Present How Auth Was Defeated What Attacker Had
Canvas / Instructure
May 2026
Human · Instructure native auth (FFT tier)No (FFT tier)Unverified self-enrollment tier exploitedValid FFT account credentials
Vercel
Apr 2026
Human · Google Workspace OAuth 2.0YesOAuth token stolen via Lumma Stealer / shadow AI appValid Google OAuth token
LiteLLM NHI
Mar 2026
NHI · PyPI API token (CI/CD pipeline)N/APoisoned CI/CD scanner exfiltrated publishing tokenValid PyPI API publishing token
ADT (2nd breach)
2025–2026
Human · Okta SSO → SalesforceYesAI-assisted vishing → Okta help desk resetValid Okta session → Salesforce OAuth token
Salesforce / Drift NHI
Aug 2025
NHI · Salesloft Drift OAuth integration tokenYesOAuth token theft — MFA irrelevant to token-based API authValid OAuth token → API access to 700+ Salesforce tenants
ADT (1st breach)
Aug 2024
Human · Okta SSO → SalesforceYesVishing → Okta help desk account resetValid Okta session → Salesforce OAuth token
Snowflake
Apr–Jun 2024
Human · Snowflake native auth (no IdP)Not enabledInfostealer-harvested credentials — simply logged inValid username + password (historical theft)
Microsoft / Midnight Blizzard
Jan 2024
Human · Legacy OAuth test tenant (no MFA)Not enabledPassword spray on legacy test account → OAuth pivot to corporate emailValid OAuth tokens → Microsoft corporate email access
Okta support system NHI
Oct 2023
NHI · Okta internal service account (Salesforce portal)YesCredential sync to personal device → session token replay from HAR filesValid session tokens from customer HAR uploads
Comcast / Xfinity
Oct 2023 · $117.5M settlement 2026
Human · Citrix NetScaler (session gateway)YesCVE-2023-4966: session token extracted from memory — MFA never reachedValid extracted post-auth session cookie
Snowflake — 160+ Enterprise Customers, 560M+ Records Critical
Identity provider: Snowflake native auth · MFA: Not enforced · 2024

UNC5537 didn't exploit a vulnerability. They logged in. Infostealers (VIDAR, RISEPRO, LummaC2) had harvested Snowflake credentials from employee devices over years — some dating to 2020. UNC5537 bought the credentials on criminal marketplaces, authenticated normally through Snowflake's login page, and ran bulk SELECT queries exporting tens of millions of records. Victims included AT&T (110M records), Ticketmaster (560M records), Santander Bank, LendingTree, and 155 others.

What stopped it: Nothing. Snowflake did not enforce MFA globally at the time — it was opt-in. No alerting existed on bulk data exports from accounts that had never previously exported anything. Snowflake's event logging was a paid add-on that most affected customers hadn't enabled.

Missing After Authentication

Behavioral anomaly detection — an account that has never run a bulk export query suddenly exporting 100M rows is an obvious signal. No egress volume thresholds. No alerting on logins from IPs with no history on the account.