Google Confirms Salesforce Data Breach Amid ShinyHunters' Extortion Spree
Share this article
Google's Salesforce Breach: A Wake-Up Call for Cloud Security
In a stark escalation of cybersecurity threats targeting cloud-based customer management systems, Google has confirmed its own data breach as part of an ongoing extortion campaign by the ShinyHunters hacking group. The incident, disclosed in an update to a June security advisory, reveals how even tech giants are vulnerable to sophisticated social engineering attacks aimed at Salesforce CRM instances—a critical tool for businesses worldwide.
The Anatomy of the Attack
The breach occurred in June when threat actors, tracked by Google as UNC6040 (now identified as ShinyHunters), executed voice phishing (vishing) attacks against employees. By impersonating trusted entities, they gained access to a corporate Salesforce instance storing contact details for small and medium businesses. Google stated:
"Analysis revealed that data was retrieved by the threat actor during a small window of time before the access was cut off. The data retrieved was confined to basic and largely publicly available business information, such as business names and contact details."
Despite the limited sensitivity of the stolen data, the breach highlights a critical vulnerability: Salesforce environments, often housing vast amounts of customer data, are becoming prime targets for exploitation.
ShinyHunters: The Masterminds Behind the Chaos
BleepingComputer's investigation, led by Lawrence Abrams, has linked UNC6040 to ShinyHunters—a prolific cybercriminal group responsible for high-profile breaches at Snowflake, AT&T, Oracle Cloud, and others. In a direct conversation with BleepingComputer, ShinyHunters claimed responsibility for the Salesforce attacks, boasting of compromising "a trillion-dollar company" (potentially Google) and threatening to leak data if ransoms aren't paid. Their modus operandi involves:
- Extortion Tactics: Demanding payments in cryptocurrency, with one victim already paying 4 Bitcoins (~$400,000) to prevent data leaks.
- Widespread Targeting: Victims include Adidas, Qantas, Allianz Life, Cisco, and luxury brands under LVMH like Louis Vuitton and Dior.
- Data Monetization: After private extortion attempts, ShinyHunters plans to publicly leak or sell stolen data on hacking forums, amplifying the fallout.
Broader Implications for Tech and Security Teams
This campaign exposes systemic risks in SaaS platforms like Salesforce, where compromised credentials or social engineering can lead to cascading data theft. The attacks exploit human elements rather than technical flaws, emphasizing the need for:
- Enhanced employee training to recognize vishing attempts.
- Stricter access controls and multi-factor authentication for CRM systems.
- Real-time monitoring to detect unusual data exports.
As detailed in the Picus Red Report 2025, such incidents align with rising malware tactics targeting credential stores—underscoring why defenses must evolve to counter social engineering.
Google's breach, while limited, serves as a stark reminder that no organization is immune. With ShinyHunters actively expanding their operations, companies must prioritize securing customer data pipelines or face not just financial losses but irreparable reputational damage. The era of assuming cloud platforms are inherently secure is over—vigilance and proactive mitigation are now non-negotiable.
Source: BleepingComputer (Lawrence Abrams), August 6, 2025