Skip to content
  Tuesday 20 January 2026
Trending
January 23, 2024Senior Cybersecurity Analyst March 7, 2024CISA Adds One Known Exploited JetBrains Vulnerability, CVE-2024-27198, to Catalog April 15, 2024Cybersecurity Firmware Engineer, Mid May 1, 2025How Data-Driven Insights Are Addressing Gaps in Patient Communication and Equity – SmartData Collective May 21, 2025Russian Hackers Exploit Email and VPN Vulnerabilities to Spy on Ukraine Aid Operations January 15, 2026Cybersecurity Program Analyst, Senior October 24, 2024CISA Adds Two Known Exploited Vulnerabilities to Catalog January 13, 2022How to Prevent SQL Injection Attacks 2022 – Secure SQL Databases March 19, 2024Operations Cybersecurity Analyst April 1, 2024Lead Cybersecurity Engineer
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
  Industry News  

ShinyHunters Boasts Massive Data Breach of Salesforce Records

Industry News

ShinyHunters Boasts Massive Data Breach of Salesforce Records

SecuredyouadmSecuredyouadm—September 18, 20250
FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail
More stories

Sudanese Brothers Indicted in High-Profile Anonymous Sudan Cyber Attacks

October 16, 2024

Zoom and Xerox’s Urgent Security Updates: Patching Privilege Escalation and RCE Vulnerabilities

August 13, 2025

Over 200 Chinese Scammers Nabbed by Sri Lankan Police

October 16, 2024

Tariffs and Data Sovereignty: A Dynamic Duo Impacting Global Markets

May 3, 2025



In a recent wave of cybercrime, the notorious hacker group ShinyHunters has claimed responsibility for stealing a staggering 1.5 billion Salesforce records from 760 companies. This group, now operating under the name Scattered Lapsus$ Hunters, is known for its data theft and extortion tactics, often employing ransomware to infiltrate organizational environments. The FBI issued a warning about their latest attack, which involved the theft of OAuth tokens used to integrate Salesloft Drift’s AI chatbot with Salesforce instances. Google’s threat intelligence team traced the beginning of these attacks to August 8, with the operation impacting approximately 700 Salesloft customers.

The breach reportedly began when ShinyHunters infiltrated Salesloft’s GitHub repository, gaining access to private source code. Utilizing the legitimate security tool TruffleHog, the hackers scanned the code to uncover OAuth tokens that allowed them access to companies that had integrated their Drift platform with Salesforce. This method of exploiting GitHub repositories to extract sensitive information has been a favored technique of the ShinyHunters group since 2020, demonstrating its continued effectiveness.

Once inside, ShinyHunters exfiltrated a significant volume of data, including 250 million records from the Account table, 579 million from Contact, and hundreds of millions more from other Salesforce tables. Google’s analysis of this cyberattack revealed the group’s primary objective was to harvest credentials, seeking sensitive information such as AWS access keys and Snowflake-related tokens. This breach extended beyond Salesforce to other applications integrated with Drift, including Google Workspace and several other third-party tools.

In response to the attacks, Salesloft collaborated with Salesforce to revoke and refresh all active OAuth tokens for Drift on August 20, effectively blocking further unauthorized access. Despite these efforts, the ramifications of ShinyHunters’ data heist continue to unfold, with numerous high-profile companies reporting breaches. Victims include BeyondTrust, Cato Networks, Cloudflare, CyberArk, JFrog, Nutanix, Palo Alto Networks, Proofpoint, Qualys, Rubrik, SpyCloud, Tenable, and Zscaler.

While a member of the Scattered Lapsus$ Hunters recently claimed that the group was “going dark,” security experts remain skeptical, pointing to evidence of ongoing activity. The cybersecurity landscape remains vigilant as organizations fortify defenses against the relentless threat posed by sophisticated cybercriminal collectives like ShinyHunters.

FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail

Securedyouadm

Malicious Listener for Ivanti Endpoint Mobile Management Systems
CISA Releases Nine Industrial Control Systems Advisories
Related posts
  • Related posts
  • More from author
Industry News

5 Reasons AI-Driven Business Need Dedicated Servers – SmartData Collective

October 14, 20250
Industry News

The Future of Cyberthreat Sharing Post-CISA 2015: What’s Next?

October 1, 20250
Industry News

Meta Strikes $14.2B AI Deal with CoreWeave for Cutting-Edge Infrastructure

October 1, 20250
Load more
Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Read also
Careers

Cybersecurity Intern

January 19, 20260
Careers

Lead Cybersecurity Assessor

January 19, 20260
Careers

Cybersecurity Engineer

January 19, 20260
Careers

Director of Cybersecurity Architecture

January 19, 20260
Careers

Senior Consultant- Cybersecurity

January 19, 20260
Careers

Industrial Cybersecurity

January 19, 20260
Load more
Stay Social!
192Likes
4,500Followers
13Subscribers
46Followers
Recent posts
  • Cybersecurity Intern
  • Lead Cybersecurity Assessor
  • Cybersecurity Engineer
  • Director of Cybersecurity Architecture
  • Senior Consultant- Cybersecurity

    # TRENDING

    how old is my computerhow old is my dell laptophow old is my HP laptophow old is my laptophow old is my toshiba laptophow to find computer ageverify computer agestar wars theme wallpapersThe Best Hacking Bookswiresharkusb device not found windows 10/11usb device not recognized windows 10/11 errorWhat is AIGPUSnifferuTorrentvulnerability scanner downloadWifi Hacking SoftwareWifi Hacking Appsolved windows 10/11 usb device not recognizedstar wars windows 7 theme downloadTwitter Account Security
    © Copyright Mister Cybersecurity LLC 2023, All Rights Reserved
    • About
    • Contact
    • Privacy
    • ToS
    • Disclosures