Article Details
Scrape Timestamp (UTC): 2025-10-03 14:17:55.238
Original Article Text
Click to Toggle View
ShinyHunters launches Salesforce data leak site to extort 39 victims. An extortion group has launched a new data leak site to publicly extort dozens of companies impacted by a wave of Salesforce breaches, leaking samples of data stolen in the attacks. The threat actors responsible for these attacks claim to be part of the ShinyHunters, Scattered Spider, and Lapsus$ groups, collectively referring to themselves as "Scattered Lapsus$ Hunters." Today, they launched a new data leak site containing 39 companies impacted by the attacks. Each entry includes samples of data allegedly stolen from victims' Salesforce instances, and warns the victims to reach out to "prevent public disclosure" of their data before the October 10 deadline is reached. The companies being extorted on the data leak site include well-known brands and organizations, including FedEx, Disney/Hulu, Home Depot, Marriott, Google, Cisco, Toyota, Gap, McDonald's, Walgreens, Instacart, Cartier, Adidas, Sake Fifth Avenue, Air France & KLM, Transunion, HBO MAX, UPS, Chanel, and IKEA. "We highly advise you proceed into the right decision, your organisation can prevent the release of this data, regain control over the situation and all operations remain stable as always," they said. "We highly recommend a decision-maker to get involved as we are presenting a clear and mutually beneficial opportunity to resolve this matter." They also added a separate entry requesting that Salesforce pay a ransom to prevent all impacted customers' data (approximately 1 billion records containing personal information) from being leaked. "Should you comply, we will withdraw from any active or pending negotiation indiviually from your customers. Your customers will not be attacked again nor will they face a ransom from us again, should you pay," they added. The extortion group also threatened the company, stating that it would help law firms pursue civil and commercial lawsuits against Salesforce following the data breaches and warned that the company had also failed to protect customers' data as required by the European General Data Protection Regulation (GDPR). Scattered Lapsus$ Hunters have been targeting Salesforce customers with voice phishing attacks since the beginning of the year, leading to breaches that have impacted companies such as Google, Cisco, Qantas, Adidas, Allianz Life, Farmers Insurance, Workday, as well as LVMH subsidiaries, including Dior, Louis Vuitton, and Tiffany & Co. In these attacks, the threat actors tricked employees into linking a malicious OAuth app to their company's Salesforce instance. Once connected, the attackers stole company databases and used the data to extort victims via email. These extortion emails were signed by ShinyHunters, a notorious extortion group linked to a long string of high-profile breaches in recent years, including the Snowflake attacks and those against AT&T and PowerSchool. ShinyHunters also claimed to have used stolen OAuth tokens for Salesloft's Drift AI chat integration with Salesforce to steal sensitive information, including passwords, AWS access keys, and Snowflake tokens, from customers' Salesforce instances. These attacks were tracked by Mandiant under a separate threat cluster named "UNC6395" as they have been unable to formally link the breaches to this group. On a Telegram channel associated with the extortion group, the threat actors claim that they will begin extorting companies affected by the Salesloft Drift attacks on a separate data leak site launching on October 10th. ShinyHunters previously told BleepingComputer that the Salesloft data theft attacks impacted approximately 760 companies and resulted in the theft of 1.5 billion Salesforce records. The Salesloft attacks are known to have impacted Google, Palo Alto Networks, CyberArk, Cloudflare, Rubrik, Elastic, BeyondTrust, Proofpoint, JFrog, Zscaler, Tenable, Nutanix, Qualys, Cato Networks, and many more. The Security Validation Event of the Year: The Picus BAS Summit Join the Breach and Attack Simulation Summit and experience the future of security validation. Hear from top experts and see how AI-powered BAS is transforming breach and attack simulation. Don't miss the event that will shape the future of your security strategy
Daily Brief Summary
ShinyHunters has launched a data leak site targeting 39 companies, leveraging Salesforce breaches to extort victims by threatening public disclosure of sensitive data.
Impacted organizations include high-profile names such as FedEx, Disney, Google, and Marriott, with threats to release stolen data if demands are not met by October 10.
The group claims to possess approximately 1 billion records, urging Salesforce to pay a ransom to prevent further data exposure and legal repercussions under GDPR.
Attackers used voice phishing to trick employees into linking malicious OAuth apps to Salesforce, facilitating unauthorized access and data theft.
Mandiant tracks these incidents under the threat cluster "UNC6395," though formal attribution to ShinyHunters remains unconfirmed.
ShinyHunters announced plans to target companies affected by Salesloft Drift attacks, impacting 760 companies and compromising 1.5 billion records.
The breaches highlight vulnerabilities in OAuth integrations and the need for enhanced employee training to prevent social engineering attacks.