Salesforce Breach Intelligence

Salesforce Data Theft Alerts

ShinyHunters and affiliated groups have turned Salesforce into a primary attack vector. Track every incident, understand the tactics, and get alerted when the next one hits.

1,400 Companies Targeted
1 Billion+ Records Exposed
ACTIVE CAMPAIGN: ShinyHunters' Salesforce Experience Cloud campaign is ongoing as of April 2026, targeting overly permissive guest user configurations across 400+ sites. See latest below.
Incident Timeline
Apr 2026
Udemy — 1.4M Salesforce Records Leaked

On April 24, ShinyHunters listed Udemy on their dark web leak site, claiming 1.4 million records of PII and internal corporate data stolen from its Salesforce environment. After Udemy declined to negotiate, the group released the dataset publicly on April 27. Have I Been Pwned confirmed 1.4 million email addresses in the dump, including names, addresses, phone numbers, employer information, and instructor payout data.

Victims: Udemy — 1.4M records confirmed by HIBP; names, addresses, phone numbers, employer and payout data
Salesforce Pay or Leak Education
Sources: Cybernews · Hackread
Apr 2026
Zara, Carnival Corporation & 7-Eleven — April Leak Wave

ShinyHunters listed Zara, Carnival, and 7-Eleven on their dark web site on April 18 with an April 21 ransom deadline. All three refused to pay and had their data publicly dumped. Zara (Inditex) was breached via the Anodot-Snowflake chain — Inditex confirmed "unauthorized access to databases" stemming from "a former technology provider." 7-Eleven had 600,000+ Salesforce records stolen via the group's CRM access campaign. Carnival Corporation had 8.7 million customer records exfiltrated. Also listed in the same wave: Pitney Bowes, Canada Life Assurance Company (5.6M Salesforce records), Aman Resorts, Marcus & Millichap, Alert 360 (2.5M records), and Medtronic (9M records — later removed from the leak site, suggesting payment or negotiation).

Victims: Zara/Inditex (Anodot/Snowflake), Carnival (8.7M records), 7-Eleven (600K Salesforce records), Pitney Bowes, Canada Life (5.6M), Aman Resorts, Marcus & Millichap, Alert 360 (2.5M), Medtronic (9M)
Salesforce Anodot / Snowflake Pay or Leak 40 Victims Total
Sources: Cybernews · TechRadar · SC Media
Apr 2026
Mytheresa — Luxury Retailer Breached April 12

High-end luxury e-commerce platform Mytheresa — carrying over 200 designer brands including Gucci, Prada, Bottega Veneta, and Saint Laurent — was breached by ShinyHunters on April 12. The group threatened to leak "sensitive customer PII and transactional history" and warned of "several annoying digital problems" if Mytheresa did not negotiate. The data was subsequently dumped after the ransom deadline expired.

Victims: Mytheresa customers — PII and transactional history exposed
Luxury Retail PII + Transactional Data Pay or Leak
Sources: Cybernews · TechRadar
Apr 2026
Amtrak — 9.4M Salesforce Records via Social Engineering

ShinyHunters posted Amtrak on their dark web blog on April 12, claiming 9.4 million Salesforce records containing PII and internal corporate data, with a ransom deadline of April 14. The group gained access via social engineering attacks on Amtrak employees earlier in 2026. Have I Been Pwned subsequently confirmed over 2 million unique email addresses in the leaked dataset, alongside names, physical addresses, and customer support records.

Victims: Amtrak — 9.4M records claimed; 2M+ unique emails confirmed by HIBP
Salesforce Social Engineering Transportation HIBP Confirmed
Mar–Apr 2026
Hallmark — 8M Salesforce Records via Gainsight

ShinyHunters posted a final warning to Hallmark with an April 2 deadline, claiming nearly 8 million records of PII and internal corporate data stolen via a compromise of Hallmark's Salesforce environment through the Gainsight AppExchange integration. After Hallmark declined to pay, the data was released in mid-April. Have I Been Pwned confirmed 1.7 million unique email addresses across Hallmark Cards and Hallmark+ streaming subscribers. ShinyHunters cited this breach alongside claims of "almost 1,000" total Salesforce victims.

Victims: Hallmark Cards + Hallmark+ — 8M records claimed; 1.7M emails confirmed by HIBP
Salesforce Gainsight / AppExchange Supply Chain HIBP Confirmed
Sources: Salesforce Ben · TechNadu
Apr 2026
McGraw-Hill — Salesforce Misconfiguration

ShinyHunters issued an extortion threat against McGraw-Hill after exploiting a Salesforce environment misconfiguration. The group claimed 45 million records containing PII — Have I Been Pwned independently verified 13.5 million accounts and over 100GB of leaked data. McGraw-Hill stated that core Salesforce accounts and customer databases were not accessed.

Victims: McGraw-Hill — 13.5M accounts confirmed leaked (45M claimed)
Misconfiguration PII Exposure Extortion ShinyHunters
Apr 2026
Rockstar Games — Snowflake via Anodot Integration

ShinyHunters breached Rockstar Games' Snowflake environment via Anodot, a SaaS cloud-cost monitoring tool. Attackers used authentication tokens stolen from the Anodot integration to access Rockstar's data warehouses as a legitimate internal service — going undetected for an extended period. The group claimed nearly 80 million records and set a ransom deadline of April 14, after which they leaked GTA Online and Red Dead Online analytics data. Rockstar confirmed the breach.

Victims: Rockstar Games — ~80M records claimed; internal analytics leaked
Snowflake Anodot Integration Token Theft Supply Chain
Mar 2026
Ameriprise Financial — Salesforce Records & SharePoint Data

ShinyHunters posted a "final warning" on their dark web site on March 22, claiming to hold Ameriprise Financial Salesforce records containing customer PII and over 200GB of compressed SharePoint internal corporate data. The group gave Ameriprise — a Minneapolis wealth management firm overseeing $1.17 trillion in assets — until March 25 to make contact or face a leak. No public statement was made by Ameriprise in response.

Victims: Ameriprise Financial customers — Salesforce PII + 200GB SharePoint data claimed
Financial Services Salesforce PII SharePoint Extortion
Sources: Cybernews · Prism News
Mar 2026
ShinyHunters — Experience Cloud Mass Campaign (300–400 Orgs)

ShinyHunters claimed to have compromised between 300 and 400 companies by exploiting overly permissive guest user configurations in Salesforce's Experience Cloud (Aura). Mandiant confirmed the group weaponized AuraInspector — a security audit tool Mandiant itself released in January 2026 — to automate mass scanning and data extraction. Salesforce issued a trust advisory. FINRA issued a cybersecurity alert to member firms. Notable named victims included LexisNexis (3.9M records) and Loblaw (75.1M records claimed).

Affected: 300–400 companies including LexisNexis, Loblaw, cybersecurity firm Aura.com
Aura / Experience Cloud AuraInspector Guest User Misconfiguration Mandiant
Mar 2026
Infinite Campus — Compromised Employee Salesforce Account

Infinite Campus, a K-12 student information system serving 3,200+ school districts and 11 million students across 46 states, notified customers of a breach after an employee's Salesforce account was compromised. ShinyHunters posted a "final warning" on March 24 demanding ransom contact by March 25. The company confirmed it would not comply. Exposed data consisted primarily of school staff names and contact details.

Victims: Infinite Campus — school staff across 3,200+ US districts; 11M student records at risk
Education Compromised Account K-12 Data
Mar 2026
Telus Digital — ~1 Petabyte via Salesloft Credential Chain

One of the largest data thefts ever recorded by volume. ShinyHunters found Google Cloud Platform credentials belonging to Telus Digital buried inside Salesforce data stolen from Salesloft in 2025. Using those GCP credentials, attackers accessed Telus's BigQuery databases and ran TruffleHog to find additional embedded credentials, pivoting across multiple systems. The haul included call-center records, source code, FBI background checks, Salesforce data, AI training data, and voice recordings. ShinyHunters demanded $65 million. Telus refused to engage.

Victims: Telus Digital + 28 named corporate clients — ~1 petabyte of data claimed
Supply Chain GCP Credentials Salesloft Pivot $65M Ransom
Mar 2026
European Commission — AWS & Europa.eu Breach (350GB)

ShinyHunters breached and leaked over 350GB of data from the European Commission's Europa.eu platform, accessing at least one AWS account. CERT-EU attributed the breach to ShinyHunters. Exposed data included PII, internal email communications, sensitive documents, technical data, and records belonging to 42 internal clients and at least 29 EU entities. The Commission confirmed the breach, stating it took immediate steps to contain the incident.

Victims: European Commission — 350GB leaked; 42 internal clients and 29 EU entities affected
AWS EU Government CERT-EU Attributed 350GB Leaked
Mar 2026
Axios npm Library — Software Supply Chain Attack

On March 30, 2026, an unnamed threat actor compromised an npm account associated with the widely-used Axios JavaScript HTTP client library, injecting malicious code into the package. Reported by StepSecurity, the attack represents a software supply chain approach — targeting the building blocks of SaaS ecosystems rather than individual organizations. Any Salesforce integration or downstream application relying on the compromised Axios package was potentially affected.

Victims: Downstream applications and Salesforce integrations dependent on the Axios npm package
Supply Chain npm Compromise Malicious Package
Sources: Salesforce Ben · RH-ISAC
Feb 2026
Odido (Netherlands) — 15M Salesforce Records

Dutch telecom Odido (formerly T-Mobile Netherlands) was breached via social engineering attacks targeting its Salesforce instances. ShinyHunters ultimately released the full dataset — claiming over 15 million Salesforce records containing full names, physical addresses, email addresses, phone numbers, IBAN numbers, plaintext passwords, passport numbers, and driver's license numbers. Have I Been Pwned confirmed 6.1 million unique email addresses across four data releases.

Victims: Odido — 15M Salesforce records; 6.1M unique emails confirmed by HIBP
Salesforce Vishing Telecom IBAN / Passport Data Full Dump Released
Jan 2026
Grubhub — Data Loader Social Engineering

Grubhub became the first confirmed major victim of the ShinyHunters Salesforce campaign in 2026. Attackers used a fraudulent version of the Salesforce Data Loader application, obtained after social engineering employees via phone calls impersonating IT support, to extract data from Grubhub's Salesforce environment.

Victims: Grubhub customers — contact data exposed
Data Loader Abuse Vishing Social Engineering
Jan 2026
Panera Bread, Match Group & Bumble — SSO Vishing Wave

A large-scale vishing campaign using voice-cloning and SSO credential harvesting swept through major consumer brands. Panera Bread confirmed 14 million records compromised (5.1M emails verified by HIBP). Match Group confirmed an incident affecting Hinge, Match.com, and OkCupid — approximately 10 million records. Bumble was separately hit with 30GB claimed from Google Drive and Slack. The campaign exploited Okta and Microsoft Entra SSO platforms.

Victims: Panera Bread (14M records), Match/Hinge/OkCupid (10M records), Bumble (30GB claimed)
SSO Vishing Okta Voice Cloning Consumer Data
Dec–Jan 2025–26
SoundCloud, Betterment, Crunchbase & Others — SSO Campaign

ShinyHunters expanded their SSO credential-harvesting campaign through late 2025 and early 2026, hitting consumer platforms and financial services. SoundCloud was breached in December 2025 with roughly 29.8 million user accounts exposed. Betterment confirmed 1.4 million records stolen. Other victims in the same wave included Crunchbase, CarGurus, Canada Goose, CarMax, Edmunds, and Figure Technology Solutions (~1M records).

Victims: SoundCloud (29.8M), Betterment (1.4M), Crunchbase, CarGurus, Canada Goose, Figure, CarMax, Edmunds
SSO Compromise Okta / Microsoft Entra Consumer Platforms Financial Services
Oct 2025
Mass Data Release After Failed Ransoms + FBI BreachForums Seizure

After ransom negotiations broke down with multiple Salesforce victims, ShinyHunters released millions of records on the dark web. The FBI simultaneously seized a BreachForums domain used by the group as a data-leak extortion site. Separately, Google confirmed that one of its corporate Salesforce instances was breached — exposing primarily publicly-available SMB customer data.

Victims: Multiple unnamed Salesforce customers; Google (Salesforce instance confirmed)
Data Leak Ransom Failed FBI Seizure BreachForums
Jun–Sep 2025
The 91-Org Campaign — Luxury, Retail & Aviation

In mid-2025, a coordinated wave of intrusions targeted Salesforce environments across technology, retail, luxury fashion, aviation, and insurance. The campaign, tracked by Google as UNC6040 and attributed to ShinyHunters, relied entirely on social engineering — primarily voice phishing (vishing) — rather than any Salesforce platform vulnerability. Attackers posed as IT support staff to trick employees into downloading a trojanized Data Loader app. A ransom message claimed 91 organizations were compromised.

Named victims: Adidas, Cartier, Google, Louis Vuitton, Dior, Chanel, Tiffany & Co., Qantas, Air France–KLM, Allianz Life, Cisco, Pandora, Workday
UNC6040 Vishing Data Loader 91 Orgs Extortion
Aug 2025
Salesloft Drift — OAuth Token Theft

Attackers stole OAuth tokens from the Salesloft integration known as Drift, enabling unauthorized access and data exfiltration from 760 customer Salesforce instances. The incident shares significant technical similarity with a later Gainsight/AppExchange attack in which Salesforce was forced to revoke OAuth tokens and temporarily delist related applications. This OAuth-abuse vector represents a distinct and growing second attack pathway beyond social engineering.

Victims: 760 Salesforce instances via the Drift/Salesloft integration
OAuth Token Theft Third-Party Integration AppExchange Risk
Late 2025
Gainsight AppExchange — OAuth Revocation Event

Salesforce detected unusual activity related to Gainsight applications connected to its platform. In response, Salesforce revoked OAuth access and refresh tokens for the affected apps and temporarily removed them from AppExchange while the investigation was ongoing. The incident highlighted supply-chain risk through third-party AppExchange integrations and echoed the Drift OAuth theft methodology.

Victims: Gainsight-connected Salesforce customers (scope under investigation)
AppExchange OAuth Revocation Supply Chain Gainsight
2019– 2024
ShinyHunters Origins — Pre-Salesforce Campaign

ShinyHunters emerged around 2019 as a financially motivated hacking group, initially targeting consumer platforms and universities using phishing, social engineering, and third-party SaaS exploitation. Prior to the Salesforce-focused campaign, notable victims included AT&T Wireless, Microsoft, Santander, and Ticketmaster — many via abuse of unsecured Snowflake accounts. The group pioneered "pay or leak" extortion as a standard operating procedure. By 2024–2025, they pivoted to enterprise Salesforce environments as a systematic target.

Historic victims: AT&T, Microsoft, Santander, Ticketmaster, Snowflake customers
Snowflake Pay-or-Leak Consumer Platforms 2019–2024
ShinyHunters is still active. Get alerted the moment the next Salesforce breach breaks.