ShinyHunters focus on customer accounts, not Salesforce itself, in a large-scale extortion campaign
Khaled Hassan
Graphic showing Salesforce logo with a warning sign related to the ShinyHunters attack
Another big cybersecurity story is making headlines. This time, it’s Salesforce customers under fire. A hacker group called ShinyHunters has launched a leak site and claims to have stolen data from 39 different companies. Their aim? Extortion—pay up or see your data published online.
The important part: Salesforce itself wasn’t hacked. Instead, attackers went after customer accounts and integrations, mainly by tricking people and abusing connected apps.
ShinyHunters is a well-known hacking group that’s been around since 2020, responsible for several major data leaks. They usually show up on dark web forums with massive stolen databases.
In this campaign, they’re using methods similar to Scattered Spider (UNC6040)—focusing on people and third-party connections instead of breaking into Salesforce’s core systems.
Hackers didn’t exploit a Salesforce bug. Instead, they used a mix of social engineering and tool abuse:
Attackers called employees, pretended to be tech support, and convinced them to give access.
They got companies to approve malicious apps through OAuth, which handed them valid tokens
They reportedly used modified versions of Salesforce’s Data Loader to pull huge amounts of data quickly
The ShinyHunters leak site lists 39 companies. Some of the most notable include:
Important: being listed doesn’t always mean a full-scale breach—investigations are still ongoing.
Salesforce confirmed its systems remain secure despite ShinyHunters’ extortion campaign
Salesforce has stated its main systems remain secure. The attacks targeted customer environments and integrations.The FBI warned of active campaigns by groups like UNC6040 and UNC6395 against Salesforce customers.Google Threat Intelligence described it as a data extortion operation and urged organizations to check their connected apps.
If private data is exposed, customers may lose confidence.
Companies could face fines under strict data protection laws.
Handling incident response, legal issues, and remediation can be expensive
Negative press and brand image damage may hurt future business
Four key steps businesses can take to protect themselves after the ShinyHunters Salesforce breach
Review all connected apps and revoke suspicious or unnecessary permissions.
Require MFA for all users, especially those with admin rights.
Educate staff to spot phishing or vishing attempts before granting access.
Keep an eye on Salesforce activity logs for unusual behavior.
Limit who can use tools like Data Loader and reduce the number of admins
not the platform itself.
If your company uses Salesforce, don’t wait for a scare like this. Audit your apps, enforce strong login security, and train your employees to spot scams.
Bottom line: Salesforce wasn’t hacked, but attackers took advantage of poor security practices. Now’s the time to lock things down.
Was Salesforce hacked?
No. Salesforce’s core systems remain secure. The attacks targeted customer accounts, integrations, and employees.
Which companies were affected by the ShinyHunters breach?
The leak site listed 39 companies, including Google, Chanel, Adidas, Cisco, Louis Vuitton, Disney, Ikea, and McDonald’s.
How did hackers steal Salesforce data?
They tricked employees with phone scams, abused OAuth permissions, and used modified Data Loader tools to extract large datasets.
What should companies do right now?
Review OAuth apps, enable MFA, train employees, and monitor system logs for unusual activity.
Could my company be at risk?
If you use Salesforce and haven’t reviewed your connected apps or security settings recently, then yes—you could be vulnerable.
Stay secure with DeepStrike penetration testing services. Reach out for a quote or customized technical proposal today
Contact Us