Company Details
salesforce
84,115
6,028,213
5112
salesforce.com
4
SAL_2246365
Completed

Salesforce Company CyberSecurity Posture
salesforce.comWe're the #1 AI CRM—where humans with agents drive customer success together with AI, data, and Customer 360 apps on one platform. Privacy Statement: http://www.salesforce.com/company/privacy/
Company Details
salesforce
84,115
6,028,213
5112
salesforce.com
4
SAL_2246365
Completed
Between 0 and 549

Salesforce Global Score (TPRM)XXXX

Description: Salesforce experienced a data breach originating from a third-party provider, **SalesLoft**, specifically via its **Drift app**—an integration used for automated customer communications. The breach was executed by the hacker group **ShinyHunters**, who exploited compromised **GitHub credentials** at SalesLoft between **March and June**, stealing tokens linking Drift to Salesforce environments. This allowed attackers to infiltrate **Drift’s AWS environment**, obtaining **OAuth tokens** from multiple customer organizations, including **Cloudflare, Zscaler, Palo Alto Networks, and others**.The stolen data primarily included **customer contact details, basic IT support information, access tokens, and IT configuration details**. While Salesforce confirmed no direct vulnerability in its own systems, the breach exposed **CRM fields, support cases, and integration data** across **hundreds of affected organizations**. Salesforce refused to pay ransom demands, emphasizing a **no-negotiation stance** against extortion. The **Drift app remains disabled**, and affected customers were advised to **renew access tokens** to mitigate further risks. The full scope of impacted customers and long-term consequences remain undisclosed.
Description: A widespread data breach in **Salesforce** was uncovered by Google’s Threat Intelligence Group (GTIG) and Mandiant, orchestrated by the threat actor **UNC6395** between **August 8–18, 2025**. The attackers exploited **stolen OAuth tokens** from the **Salesloft Drift** third-party application, bypassing **Multi-Factor Authentication (MFA)** by abusing non-human identities (NHIs). This allowed them to **systematically exfiltrate large volumes of data** from corporate Salesforce accounts, focusing on **customer accounts, user details, and high-value secrets**—including **AWS access keys, Snowflake tokens, and other credentials**. The breach targeted **sensitive customer data**, with attackers deleting query logs to obscure their activity. While **Google Cloud customers were unaffected**, Salesforce and Salesloft responded by **revoking all Drift app tokens** and temporarily removing the app from the **AppExchange** during investigations. The incident highlights a growing trend of **NHI-based attacks**, where persistent, high-privilege non-human identities are exploited to **steal credentials and escalate access**. Organizations were urged to **harden access controls, rotate compromised keys, and enforce IP restrictions** to mitigate future risks. The breach underscores critical gaps in **identity governance**, as many firms lack even basic inventories of NHIs, leaving them vulnerable to such **covert, high-impact exfiltration campaigns**.
Description: Salesforce's North American and European customers endured a 15-hour outage after a cyber attack. The incident came after the salesforce technology team blocked access to certain instances that contain customers affected by a database script deployment that inadvertently gave users broader data access than intended. To protect the customers, the company blocked access to all instances that contain affected customers until they could block access to orgs with the inadvertent permissions. As a result, customers who were not affected may also experienced service disruption.
Description: Salesforce was targeted by the newly formed **Scattered LAPSUS$ Hunters (SLH)**, a federated cybercriminal collective merging the capabilities of **Scattered Spider, ShinyHunters, and LAPSUS$**. The attack involved **AI-driven vishing, spearphishing, and zero-day exploitations** (e.g., **CVE-2025-61882** in Oracle E-Business Suite) to compromise Salesforce’s cloud infrastructure. SLH leveraged **credential harvesting, lateral movement, and privilege escalation** to exfiltrate sensitive data, likely including **customer and enterprise SaaS records**. The group announced the breach on their **Telegram-based data-leak site (DLS)**, using psychological tactics to maximize reputational damage. Given SLH’s **Extortion-as-a-Service (EaaS) model** and history of targeting high-value enterprises, the attack likely resulted in **financial fraud, operational disruption, and erosion of customer trust**. The involvement of actors like **‘yuka’ (linked to BlackLotus UEFI bootkit)** suggests advanced persistence mechanisms, increasing the risk of **long-term data exposure or ransomware deployment**. The breach aligns with SLH’s strategy of **high-impact, brand-damaging extortion**, posing existential threats to Salesforce’s market position and regulatory compliance.
Description: Salesforce is facing a major extortion attempt by a crime syndicate known as **Scattered LAPSUS$ Hunters** (tracked as **UNC6040** by Mandiant), which claims to have stolen approximately **1 billion records** from **dozens of Salesforce customers**, including high-profile companies like **Toyota and FedEx**. The attack began in **May 2024**, with the threat actors using **voice phishing (vishing)** to trick employees into connecting a malicious app to their Salesforce portals. The group created a **dedicated leak site**, demanding a ransom from Salesforce itself—threatening to **publicly dump all stolen customer data** if payment was not made by a specified deadline. Salesforce has **refused to negotiate**, risking potential exposure of sensitive customer records. The stolen data reportedly includes **personal, financial, and corporate information** from affected organizations, posing severe reputational, financial, and operational risks. The scale of the breach—nearly **1 billion records**—suggests a **systemic compromise** with far-reaching consequences for Salesforce’s client base, including potential **fraud, identity theft, and regulatory penalties**.
Description: Salesforce suffered a **massive data breach** via two distinct campaigns in 2025, orchestrated by threat actors **Scattered Lapsus$ Hunters** and **ShinyHunters**. The first wave (late 2024) involved **social engineering attacks** impersonating IT support to trick employees into linking malicious OAuth apps to Salesforce instances, enabling the theft of databases. The second wave (August 2025) exploited **stolen SalesLoft Drift OAuth tokens** to pivot into customer CRM environments, exfiltrating **support ticket data, credentials, API tokens, and authentication details**. The attackers claimed to have stolen **~1 billion records** in the first campaign and **1.5 billion records across 760+ companies** in the second, targeting high-profile victims like **Google, Cisco, Disney, FedEx, and Marriott**. A **data leak site** was launched to extort victims, threatening public release if ransoms were unpaid. Salesforce **refused to negotiate or pay**, and the leak site was later **shut down** (potentially via FBI seizure). The breach exposed **sensitive customer and corporate data**, including **authentication tokens, API keys, and support logs**, risking downstream attacks on affected companies. The scale and sophistication of the operation—leveraging **supply-chain and OAuth abuses**—highlighted critical vulnerabilities in Salesforce’s ecosystem, with **prolonged unauthorized access** and **large-scale data exfiltration** as core impacts.
Description: The cybercriminal group **Scattered LAPSUS$ Hunters** (a collaboration of Scattered Spider, ShinyHunters, and Lapsus$) has resurfaced, claiming to have stolen **1 billion customer records** from **40 companies’ Salesforce environments**. The gang is demanding **$989.45** to prevent the data from being leaked online, setting an **October 10 deadline** for negotiation. While Salesforce denies a direct platform breach, the attack appears linked to a prior **OAuth token abuse campaign** via **Salesloft’s Drift integration**, which compromised hundreds of organizations in August 2024. Google and Mandiant confirmed the intrusions, attributing them to **UNC6040 (Salesforce-related breaches)**. The group had previously announced retirement but reemerged following arrests of UK teens tied to **Scattered Spider**, suggesting operational shifts. The leaked data reportedly includes **customer records**, posing severe reputational, financial, and operational risks to affected businesses. Salesforce maintains no evidence of a **platform-level vulnerability**, but the extortion attempt escalates pressure on victims.
Description: The **ShinyHunters** extortion group exploited compromised **Drift OAuth tokens** linked to **Salesloft** to steal over **1.5 billion Salesforce records** from **760 companies**. Attackers used **social engineering and malicious OAuth apps** to infiltrate Salesforce environments, exfiltrating massive CRM data—including **250M Account records, 579M Contact records, 171M Opportunity records, 60M User records, and 459M Case records**. The breach originated from a **GitHub repository compromise** at Salesloft, where attackers used **TruffleHog** to extract secrets, including OAuth tokens for Drift and Drift Email, enabling unauthorized access to Salesforce-integrated systems.The stolen **Case data** was further mined for **AWS keys, Snowflake tokens, and other credentials**, facilitating deeper intrusions into victim networks. High-profile targets allegedly include **Google, Cloudflare, Palo Alto Networks, Zscaler, Tenable, CyberArk, and others**. The attackers demanded **ransom payments** to prevent data leaks, while also **searching for additional secrets** to expand their campaign. The FBI issued an advisory on the threat actors (**UNC6040/6395**), warning of ongoing risks. Salesforce advised customers to enforce **MFA, least-privilege access, and stricter OAuth app management** to mitigate exposure.
Description: The cybercriminal group **ShinyHunters** (operating under the alias *Scattered LAPSUS$ Hunters*) executed a **voice phishing (vishing) campaign** in **May 2025**, tricking employees into connecting a malicious app to their **Salesforce portals**. This breach led to the theft of **over a billion customer records** from **dozens of Fortune 500 firms**, including Toyota, FedEx, Disney/Hulu, and UPS. The group threatened to **publicly leak stolen data** unless ransoms were paid by **October 10, 2025**, via a victim-shaming extortion blog. The compromised data included **customer engagement records, internal communications, and sensitive business details**. Salesforce confirmed the attack but refused to negotiate, stating it would not pay extortion demands. The incident also exposed a broader **supply-chain risk**, as the group claimed responsibility for stealing **authentication tokens from Salesloft** (a Salesforce-integrated AI chatbot provider), further expanding the attack surface. The group’s actions were linked to **multiple zero-day exploits**, including **CVE-2025-61882** in Oracle’s E-Business Suite, which they weaponized for additional data theft.
Description: The FBI seized **BreachForums**, a hacking forum operated by **ShinyHunters**, which was used as a platform for leaking corporate data stolen via **ransomware and extortion campaigns**. Among the targeted victims was **Salesforce**, part of a high-profile breach campaign where hackers claimed to have stolen **over one billion customer records** from multiple companies, including FedEx, Disney, Google, and others. The ShinyHunters group confirmed the seizure of BreachForums’ infrastructure, including **all database backups since 2023 and escrow databases**, but emphasized that their **Salesforce data leak was still proceeding as planned**, scheduled for public release. The breach involved **massive customer data exposure**, with the hackers leveraging the forum to extort companies that refused ransom payments. While the FBI’s takedown disrupted the forum’s operations, the **dark web leak site remained active**, indicating persistent risk. The attack highlights a **large-scale, coordinated extortion scheme** targeting enterprise-level customer databases, with **potential financial, reputational, and operational fallout** for Salesforce and its clients. The stolen records likely include **sensitive personal and corporate information**, amplifying the severity of the incident.
Description: The ransomware group **ShinyHunters (Scattered Lapsus$ Hunters)** breached **Salesforce** by exploiting stolen OAuth tokens from **Salesloft Drift’s AI chatbot integration**, compromising **1.5 billion records** across **760 companies** (including Cisco, Disney, and Marriott). The leaked data includes **PII (names, DOBs, passports, employment histories)**, shipping details, chat transcripts, flight records, and car ownership data—validated by cybersecurity researchers. Attackers first infiltrated **Salesloft’s GitHub repository**, extracting private source code and OAuth tokens, then laterally moved to **Google Workspace, Microsoft 365, and Okta platforms** of victims. The group demanded **separate ransoms** from Salesforce and listed **39 high-profile victims** on a darkweb leak site, pressuring them to pay under threat of full data exposure. The attack leveraged **social engineering (vishing, phishing, IT impersonation)** to trick employees into granting access, highlighting vulnerabilities in **third-party supply-chain integrations** and weak **2FA/OAuth security controls**.
Description: A cybercriminal collective known as **Scattered Lapsus$ Hunters**—an alliance of the notorious **ShinyHunters, Scattered Spider, and LAPSUS$ ransomware groups**—threatened to leak **one billion records** allegedly exfiltrated from **Salesforce’s systems**, targeting **39 of the world’s largest corporations**, including Disney, Toyota, and McDonald’s. The attackers demanded a ransom, warning that failure to comply by **October 10, 2023**, would result in the **massive exposure of customer data** across dark web and Clearnet platforms. The breach, if executed, would compromise **sensitive personal and corporate information** of Salesforce’s high-profile clients, leading to **severe reputational damage, financial fraud risks, and potential regulatory penalties**. The threat underscores a **large-scale, coordinated extortion campaign** leveraging ransomware tactics to pressure Salesforce into negotiation, with the attackers explicitly stating their intent to **‘target each and every individual customer’** if demands were unmet. The incident highlights the **escalating sophistication of cybercriminal syndicates** in exploiting enterprise vulnerabilities for maximal disruption.


Salesforce has 934.48% more incidents than the average of same-industry companies with at least one recorded incident.
Salesforce has 669.23% more incidents than the average of all companies with at least one recorded incident.
Salesforce reported 6 incidents this year: 3 cyber attacks, 1 ransomware, 0 vulnerabilities, 2 data breaches, compared to industry peers with at least 1 incident.
Salesforce cyber incidents detection timeline including parent company and subsidiaries

We're the #1 AI CRM—where humans with agents drive customer success together with AI, data, and Customer 360 apps on one platform. Privacy Statement: http://www.salesforce.com/company/privacy/


A career at Booking.com is all about the journey, helping you explore new challenges in a place where you can be your best self. With plenty of exciting twists, turns and opportunities along the way. We’ve always been pioneers, on a mission to shape the future of travel through cutting edge techno
Pitney Bowes is a technology-driven products and services company that provides SaaS shipping solutions, mailing innovation, and financial services to clients around the world – including more than 90 percent of the Fortune 500. Small businesses to large enterprises, and government entities rely on

**Snowflake is proud to be the Official Data Collaboration Provider for LA28 and Team USA.** Snowflake delivers the AI Data Cloud — a global network where thousands of organizations mobilize data with near-unlimited scale, concurrency, and performance. Inside the AI Data Cloud, organizations unite

OpenText is a leading Cloud and AI company that provides organizations around the world with a comprehensive suite of Business AI, Business Clouds, and Business Technology. We help organizations grow, innovate, become more efficient and effective, and do so in a trusted and secure way—through Inform
Workday is a leading provider of enterprise cloud applications for finance and human resources, helping customers adapt and thrive in a changing world. Workday applications for financial management, human resources, planning, spend management, and analytics are built with artificial intelligence and

With our unique ability to offer end-to-end solutions that connect the three pillars of IoT - Sensors, Software, and Services, we enable businesses to move from the traditional to the digital, or improve businesses by introducing a digital element in their products and processes. Now more than ever

About Lazada Group Founded in 2012, Lazada Group is the leading eCommerce platform in Southeast Asia. We are accelerating progress in Indonesia, Malaysia, the Philippines, Singapore, Thailand and Vietnam through commerce and technology. With the largest logistics and payments networks in the regio

Cox Automotive is the world’s largest automotive services and technology provider. Fueled by the largest breadth of first-party data fed by 2.3 billion online interactions a year, Cox Automotive tailors leading solutions for car shoppers, auto manufacturers, dealers, lenders and fleets. The company

We’re the delivery market leader in Latin America. Our platform connects over 77.000 restaurants, supermarkets, pharmacies and stores with millions of users. Nowadays we operate in more than 500 cities in Latinamerica. And we are now over 3.400 employees. PedidosYa is available for iOS, Android and
.png)
Gainsight, the leading customer success platform, has confirmed that a security incident involving its Salesforce integration compromised...
The company has been in regular contact with customers, and says only a handful have seen data directly impacted.
Indicators of compromise related to Gainsight breach point to when the attacks against customers' Salesforce instances likely started.
In the wake of recent reports concerning unauthorized access to Salesforce customer data through Gainsight applications, it's important to...
The Shadow Over Salesforce: Unraveling the Gainsight Breach That Shook Corporate Cybersecurity. In the fast-paced world of enterprise...
Gainsight on Monday said connections to Zendesk and Hubspot have been temporarily paused following a supply chain attack targeting its...
This story was originally published on Cybersecurity Dive. To receive daily news and insights, subscribe to our free daily Cybersecurity...
Welcome to this week's edition of the Cybersecurity News Weekly Newsletter, where we analyze the critical incidents defining the current...
The highly publicized data breaches earlier this fall of Salesforce customers that were linked to Salesloft's Drift application are coming...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Salesforce is http://www.salesforce.com.
According to Rankiteo, Salesforce’s AI-generated cybersecurity score is 549, reflecting their Critical security posture.
According to Rankiteo, Salesforce currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Salesforce is not certified under SOC 2 Type 1.
According to Rankiteo, Salesforce does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Salesforce is not listed as GDPR compliant.
According to Rankiteo, Salesforce does not currently maintain PCI DSS compliance.
According to Rankiteo, Salesforce is not compliant with HIPAA regulations.
According to Rankiteo,Salesforce is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Salesforce operates primarily in the Software Development industry.
Salesforce employs approximately 84,115 people worldwide.
Salesforce presently has no subsidiaries across any sectors.
Salesforce’s official LinkedIn profile has approximately 6,028,213 followers.
Salesforce is classified under the NAICS code 5112, which corresponds to Software Publishers.
Yes, Salesforce has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/salesforce.
Yes, Salesforce maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/salesforce.
As of December 11, 2025, Rankiteo reports that Salesforce has experienced 12 cybersecurity incidents.
Salesforce has an estimated 27,532 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Cyber Attack, Ransomware and Breach.
Detection and Response: The company detects and responds to cybersecurity incidents through an containment measures with blocked access to affected instances, and remediation measures with blocked access to orgs with inadvertent permissions, and and third party assistance with google threat intelligence group (gtig), third party assistance with mandiant, third party assistance with astrix security, and containment measures with revoked all active access tokens for drift app (august 20, 2025), containment measures with temporarily removed drift from salesforce appexchange, and remediation measures with restricting connected app scopes, remediation measures with searching for exposed secrets in salesforce data, remediation measures with rotating compromised credentials, remediation measures with enforcing ip restrictions, and communication strategy with advisories issued by gtig/mandiant, communication strategy with notifications to affected organizations, communication strategy with public blog post by astrix security, and enhanced monitoring with checking for specific ip addresses/user-agent strings linked to attackers, and third party assistance with google mandiant (threat intelligence), third party assistance with fbi (advisory & investigation), and law enforcement notified with fbi, and remediation measures with salesforce recommendations: enforce multi-factor authentication (mfa), remediation measures with apply principle of least privilege, remediation measures with closely manage connected applications, and communication strategy with salesforce customer advisories, communication strategy with fbi public advisory on unc6040/6395, and incident response plan activated with yes (salesforce, mandiant, and affected companies), and third party assistance with mandiant (google’s incident response), third party assistance with salesforce security team, third party assistance with fbi cyber division, and law enforcement notified with yes (fbi issued advisory on 2023-09-12), and containment measures with revoking compromised oauth tokens, containment measures with isolating affected salesforce instances, containment measures with disabling salesloft drift integrations, and remediation measures with enforcing 2fa for oauth apps, remediation measures with patching salesloft drift vulnerabilities, remediation measures with audit of third-party integrations, and recovery measures with data backup restoration (if applicable), recovery measures with customer notification plans, recovery measures with dark web monitoring for leaked data, and communication strategy with public disclosure via media (ismg, bleepingcomputer), communication strategy with customer advisories (pending), communication strategy with regulatory notifications, and network segmentation with recommended (to limit lateral movement), and enhanced monitoring with salesforce instance logs, enhanced monitoring with cloud platform (google workspace, microsoft 365, okta) activity, and incident response plan activated with yes (salesforce engaged external experts and authorities), and third party assistance with mandiant (google), third party assistance with external cybersecurity experts, and law enforcement notified with yes (us and uk authorities involved), and remediation measures with customer notifications, remediation measures with investigation of oauth abuse, and communication strategy with public security advisory, communication strategy with media statements, and incident response plan activated with yes (salesforce notified customers), and law enforcement notified with likely (fbi may have seized extortion domain), and remediation measures with refusal to pay ransom, remediation measures with customer notifications, and communication strategy with public statements and customer emails, and and third party assistance with google threat intelligence group (gtig), third party assistance with mandiant (malware analysis), third party assistance with law enforcement (fbi, uk nca), and and containment measures with salesforce: disabled malicious oauth apps, containment measures with red hat: isolated compromised gitlab server, containment measures with discord: terminated third-party vendor access, containment measures with oracle: emergency patch for cve-2025-61882, and remediation measures with salesforce: forensic analysis, customer support, remediation measures with red hat: customer notifications, repository audits, remediation measures with discord: affected user notifications, password resets, remediation measures with oracle: urged customers to apply patch, and recovery measures with salesforce: refused to pay ransom, focused on defense, recovery measures with red hat: restored gitlab from backups, recovery measures with discord: enhanced vendor security controls, and communication strategy with salesforce: customer advisories (no negotiation policy), communication strategy with red hat: public disclosure (october 2, 2025), communication strategy with discord: direct emails to affected users, communication strategy with oracle: security advisory for cve-2025-61882, and enhanced monitoring with salesforce: increased logging for oauth integrations, enhanced monitoring with red hat: gitlab access audits, and and third party assistance with google threat intelligence group (warnings), and containment measures with disabled drift app integration, containment measures with token renewal mandate for customers, and remediation measures with customer support outreach, remediation measures with oauth token rotation, and recovery measures with reactivated salesloft integrations (except drift), and communication strategy with internal memo (bloomberg-leaked), communication strategy with public statement on non-payment of ransom, communication strategy with customer advisories, and enhanced monitoring with likely (implied by google threat intelligence collaboration), and incident response plan activated with likely (salesforce refused ransom demand), and third party assistance with mandiant (google-owned threat intelligence), and communication strategy with public refusal of ransom demand (email statement), and incident response plan activated with yes (fbi and france's bl2c unit), and third party assistance with french law enforcement (bl2c unit), and law enforcement notified with yes (fbi-led operation), and containment measures with domain seizure, containment measures with backend server seizure, containment measures with nameserver redirection to fbi, and remediation measures with permanent shutdown of breachforums, remediation measures with prevention of data leak (salesforce campaign disrupted), and communication strategy with public announcement via bleepingcomputer, communication strategy with pgp-signed message from shinyhunters on telegram..
Title: Salesforce 15-Hour Outage Due to Cyber Attack
Description: Salesforce's North American and European customers endured a 15-hour outage after a cyber attack. The incident came after the salesforce technology team blocked access to certain instances that contain customers affected by a database script deployment that inadvertently gave users broader data access than intended. To protect the customers, the company blocked access to all instances that contain affected customers until they could block access to orgs with the inadvertent permissions. As a result, customers who were not affected may also experienced service disruption.
Type: Cyber Attack
Attack Vector: Database Script Deployment
Vulnerability Exploited: Inadvertent Permissions
Title: Widespread Data Breach in Salesforce via OAuth Token Abuse by UNC6395
Description: A widespread data theft campaign targeting Salesforce was carried out by threat actor UNC6395 between August 8 and August 18, 2025. The attackers bypassed MFA by compromising OAuth tokens from the Salesloft Drift third-party application, exporting large volumes of data from corporate Salesforce accounts. Their primary goal was to harvest credentials and high-value 'secrets' like AWS access keys and Snowflake tokens. The breach was detected and mitigated through revocation of access tokens and removal of the Drift app from Salesforce’s AppExchange.
Date Detected: 2025-08-18
Date Publicly Disclosed: 2025-08-20
Date Resolved: 2025-08-20
Type: Data Breach
Attack Vector: OAuth Token AbuseNon-Human Identity (NHI) ExploitationBypassing MFA
Vulnerability Exploited: Compromised OAuth tokens from Salesloft Drift third-party application (no core Salesforce vulnerability)
Threat Actor: UNC6395
Motivation: Data ExfiltrationCredential HarvestingHigh-Value Secrets Theft (e.g., AWS keys, Snowflake tokens)
Title: ShinyHunters Exploits Compromised Drift OAuth Tokens to Steal 1.5B Salesforce Records
Description: The ShinyHunters extortion group claims to have stolen over 1.5 billion Salesforce records from 760 companies by exploiting compromised Drift OAuth tokens linked to Salesloft. Attackers used social engineering and malicious OAuth apps to infiltrate Salesforce environments, exfiltrating data and extorting victims with ransom demands. The campaigns are tied to groups operating under the names ShinyHunters, Scattered Spider, and Lapsus$ (now calling themselves 'Scattered Lapsus$ Hunters'). In March, an actor breached Salesloft’s GitHub repository, locating secrets—including OAuth tokens for Drift and Drift Email—using the TruffleHog tool. The stolen data spans Salesforce objects including Account, Contact, Opportunity, User, and Case tables. Attackers also searched Case data for secrets like AWS keys and Snowflake tokens to enable further intrusions. Victims allegedly include Google, Cloudflare, Palo Alto Networks, Zscaler, and others. The FBI issued an advisory on UNC6040/6395, warning of ongoing campaigns.
Type: Data Breach
Attack Vector: Social EngineeringMalicious OAuth ApplicationsCompromised GitHub RepositoryExploited OAuth Tokens (Drift/Salesloft)Secrets Exposure (TruffleHog)
Vulnerability Exploited: Weak OAuth Token ManagementLack of Multi-Factor Authentication (MFA)Excessive Privileges in Connected ApplicationsExposed Secrets in GitHub Repository
Threat Actor: ShinyHuntersScattered SpiderLapsus$UNC6040 (Google Mandiant)UNC6395 (Google Mandiant)Scattered Lapsus$ Hunters
Motivation: Financial Gain (Extortion)Data Theft for ResaleReputation DamageFurther Intrusion (Credential Harvesting)
Title: Scattered Lapsus$ Hunters Ransomware Attack on Salesforce Customer Data via Salesloft Drift Integration
Description: A notorious ransomware group, Scattered Lapsus$ Hunters (aka ShinyHunters), launched a darkweb data-leak site targeting 39 victims—including Cisco, Disney, KFC, Ikea, Marriott, McDonald's, Walgreens, Albertsons, and Saks Fifth Avenue—whose Salesforce CRM was integrated with the Salesloft Drift AI chatbot. The group claims to have stolen **1.5 billion Salesforce records** from **760 Salesloft Drift-using companies**, with leaked samples confirming exposure of **PII (names, DOBs, nationalities, passport numbers, contact details, employment histories)**, shipping data, marketing leads, support case records, chat transcripts, flight details, and car ownership records. The attack exploited **stolen OAuth tokens** from Salesloft’s GitHub repository, granting access to Salesforce instances and other cloud resources (Google Workspace, Microsoft 365, Okta). The FBI and Google’s Mandiant linked the attacks to **UNC6040**, a threat cluster using **social engineering (vishing, phishing, IT impersonation)** to trick support staff into granting access. ShinyHunters demanded separate ransoms from Salesforce and listed victims, threatening to leak data for non-payment.
Date Detected: 2023-08-08
Date Publicly Disclosed: 2023-09-15
Type: Data Breach
Attack Vector: Stolen OAuth TokensGitHub Repository CompromiseSocial Engineering (Vishing/Phishing)Third-Party Software Exploitation (Salesloft Drift)Lateral Movement to Cloud Platforms (Google Workspace, Microsoft 365, Okta)
Vulnerability Exploited: Weak OAuth Token SecurityLack of Multi-Factor Authentication (2FA) for OAuth AppsUnpatched Third-Party Integrations (Salesloft Drift)Human Error (Support Staff Tricked via Impersonation)
Threat Actor: Scattered Lapsus$ Hunters (aka ShinyHunters)UNC6040The Com (English-speaking cybercrime collective)
Motivation: Financial Gain (Extortion/Ransom)Data Theft for Dark Web SalesReputation Damage
Title: Scattered LAPSUS$ Hunters Extortion Campaign Targeting Salesforce Environments
Description: A threat actor group calling itself Scattered LAPSUS$ Hunters (SLH) has launched a data-leak site listing about 40 companies’ Salesforce environments, demanding $989.45 to prevent the publication of what it claims is about 1 billion stolen records. The group set an October 10 deadline for Salesforce to negotiate payment or face data leakage. The incident is linked to prior OAuth token abuse campaigns via Salesloft's Drift integration, which affected hundreds of organizations. Salesforce denies platform compromise but acknowledges extortion attempts tied to past or unsubstantiated incidents. The group includes members from Scattered Spider, ShinyHunters, and Lapsus$, some of whom were recently arrested in connection with other high-profile attacks.
Date Publicly Disclosed: 2024-09-27
Type: Extortion
Attack Vector: OAuth Token Abuse (via Salesloft's Drift integration)Social EngineeringCredential Stuffing
Vulnerability Exploited: Misconfigured OAuth integrations (historical, via Salesloft's Drift)
Threat Actor: Scattered LAPSUS$ Hunters (SLH)Scattered SpiderShinyHuntersLapsus$
Motivation: Financial GainExtortionReputation Damage
Title: Salesforce Data Theft and Extortion Campaigns (2024-2025)
Description: Salesforce confirmed it would not negotiate with or pay ransom to the threat actors behind a massive wave of data theft attacks impacting its customers in 2025. The attacks involved two separate campaigns: (1) social engineering impersonating IT support to trick employees into linking malicious OAuth apps to Salesforce instances (late 2024), and (2) exploitation of stolen SalesLoft Drift OAuth tokens to pivot to CRM environments and exfiltrate data (August 2025). Threat actors, including 'Scattered Lapsus$ Hunters' and 'ShinyHunters,' claimed to have stolen nearly 1 billion records in the first campaign and 1.5 billion records (760+ companies) in the second. A data leak site was launched to extort 39 companies, including FedEx, Disney, Google, and others, but was later shut down. The FBI may have seized the domain.
Date Publicly Disclosed: 2025-09-17T00:00:00Z
Type: Data Breach
Attack Vector: Social Engineering (OAuth Phishing)Stolen OAuth Tokens (SalesLoft Drift)Supply Chain Compromise
Vulnerability Exploited: OAuth Application AbuseStolen Credentials/API TokensImproper Access Controls
Threat Actor: Scattered Lapsus$ HuntersShinyHunters
Motivation: Financial Gain (Extortion)
Title: ShinyHunters/Scattered LAPSUS$ Hunters Multi-Company Data Breach and Extortion Campaign (2025)
Description: A cybercriminal group (ShinyHunters/Scattered LAPSUS$ Hunters) used voice phishing (vishing) to compromise Salesforce instances of Fortune 500 companies, stealing over a billion records. The group launched a victim-shame blog threatening to leak data unless ransoms were paid. Additional breaches included Discord (via a third-party vendor), Red Hat (GitLab server compromise), and exploitation of a zero-day in Oracle E-Business Suite (CVE-2025-61882). The group also sent malware-laced threats to security researchers and leveraged ASYNCRAT trojan for persistence. Law enforcement actions targeted members, including arrests and extraditions.
Date Detected: 2025-05
Date Publicly Disclosed: 2025-06-01
Type: Data Breach
Attack Vector: Voice Phishing (Vishing)Malicious OAuth App Integration (Salesforce)Exploit of CVE-2025-61882 (Oracle E-Business Suite)Compromised Third-Party Vendor (Discord)GitLab Server Exfiltration (Red Hat)Malware-Laced Emails (ASYNCRAT Trojan)
Vulnerability Exploited: CVE-2025-61882 (Oracle E-Business Suite - Unauthenticated RCE)Salesforce OAuth Misconfiguration (via Vishing)Third-Party Customer Service Provider (Discord)GitLab Server Misconfiguration (Red Hat)
Threat Actor: Name: ShinyHunters (UNC6040), Aliases: ['Scattered LAPSUS$ Hunters', 'UNC6240', 'UNC6395'], Affiliation: ['Scattered Spider', 'Lapsus$', 'The Com (Cybercriminal Community)'], Nationality: English-speaking (Multinational), Name: Crimson Collective, Role: Claimed Responsibility for Red Hat Breach, Name: Clop Ransomware Gang, Role: Exploited CVE-2025-61882 Prior to Public Disclosure.
Motivation: Financial Gain (Extortion)Data Theft for Resale (Dark Web)Reputation Damage (Victim-Shaming)Harassment of Security Researchers
Title: Salesforce Data Breach via SalesLoft's Drift App by ShinyHunters
Description: Salesforce informed customers that it will not pay ransom to hackers (ShinyHunters) threatening to publish stolen customer data. The breach originated from a security incident at third-party provider SalesLoft, specifically its Drift app (integrated with Salesforce for automated customer communications). Attackers accessed SalesLoft’s GitHub account (March–June), stole OAuth tokens linking Drift to Salesforce environments, and penetrated Drift’s AWS environment to exfiltrate data from hundreds of organizations, including Cloudflare, Zscaler, and Palo Alto Networks. Stolen data included customer contact details, IT support info, access tokens, and IT configurations. Salesforce disabled the Drift app and is supporting affected customers without negotiating with attackers.
Type: Data Breach
Attack Vector: Compromised GitHub AccountStolen OAuth TokensAWS Environment InfiltrationThird-Party App Exploitation (Drift)
Vulnerability Exploited: Improper Token ManagementGitHub Account Security WeaknessThird-Party Integration Risks
Threat Actor: ShinyHunters
Motivation: Financial ExtortionData Theft for Dark Web Sale
Title: Salesforce Data Extortion Campaign by Scattered LAPSUS$ Hunters
Description: Salesforce refused to pay an extortion demand made by a crime syndicate (Scattered LAPSUS$ Hunters) claiming to have stolen roughly 1 billion records from dozens of Salesforce customers. The group, tracked as UNC6040 by Mandiant, initiated the campaign in May 2024 by making voice calls to organizations, tricking them into connecting an attacker-controlled app to their Salesforce portals. The group created a website naming affected customers (including Toyota and FedEx) and demanded ransom from Salesforce, threatening to leak the data if unpaid. Salesforce rejected the demand.
Date Detected: 2024-05-01
Date Publicly Disclosed: 2024-06-01
Type: Data Breach
Attack Vector: Voice Phishing (Vishing)Malicious App IntegrationSocial Engineering
Vulnerability Exploited: Human Error (Compliance with Fraudulent Requests)
Threat Actor: Scattered LAPSUS$ HuntersUNC6040 (Mandiant designation)
Motivation: Financial Gain (Extortion)
Title: FBI Seizure of BreachForums Hacking Forum Operated by ShinyHunters
Description: The FBI, in collaboration with law enforcement authorities in France, seized all domains for the BreachForums hacking forum, a platform primarily used by the ShinyHunters group to leak corporate data stolen in ransomware and extortion attacks. The seizure occurred before the Scattered Lapsus$ Hunters hacker could leak data from Salesforce breaches targeting companies that refused to pay ransoms. The operation compromised all BreachForums database backups since 2023, including escrow databases, and seized backend servers. Despite the takedown, the gang's dark web data leak site remains operational, and the Salesforce data leak (affecting over 1 billion customer records from companies like FedEx, Disney, Google, and others) is still scheduled for release. ShinyHunters confirmed no arrests of core admin team members but declared the 'era of forums' over, warning future platforms may be honeypots.
Date Publicly Disclosed: 2025-10-09
Type: Law Enforcement Takedown
Threat Actor: ShinyHuntersScattered Lapsus$ Hunters
Motivation: Financial Gain (Extortion)Data LeakageCybercrime Facilitation
Title: Scattered Lapsus$ Hunters Threatens to Leak One Billion Records Allegedly Stolen from Salesforce Systems
Description: A message on the BreachForums extortion site threatened to leak one billion records allegedly stolen from the Salesforce systems of 39 of the largest companies in the world, including Disney, Toyota, Adidas, McDonald's, IKEA, and Home Depot. The threat was issued by a super-alliance of the ShinyHunters, Scattered Spider, and LAPSUS$ ransomware groups, known as Scattered Lapsus$ Hunters. The group vowed to carry out the leak via dark web and Clearnet sites if Salesforce did not pay a ransom by 11:59 p.m. EST on October 10, 2023. The message warned of targeting individual customers of Salesforce if the company failed to comply.
Type: data breach
Threat Actor: ShinyHuntersScattered SpiderLAPSUS$Scattered Lapsus$ Hunters
Motivation: financial gainextortion
Title: Formation of Scattered LAPSUS$ Hunters (SLH) Cybercriminal Collective and Targeting of Salesforce
Description: The cybercriminal underground witnessed a significant consolidation as three notorious threat actors—Scattered Spider, ShinyHunters, and LAPSUS$—formally aligned to create the **Scattered LAPSUS$ Hunters (SLH)**, a federated collective that emerged in **early August 2025**. The alliance operates primarily through **Telegram**, leveraging it as both a coordination tool and a performative marketing channel. SLH announced **Salesforce** as one of its victims, targeting high-value enterprises including SaaS providers. The group exhibits sophisticated technical capabilities, including **AI-automated vishing, spearphishing, exploit development (e.g., CVE-2025-61882, CVE-2025-31324), and zero-day vulnerability brokerage**, while formalizing an **Extortion-as-a-Service (EaaS) model**. Core operators include **'shinycorp' (principal orchestrator)** and **'yuka' (exploit developer linked to BlackLotus UEFI bootkit and Medusa rootkit)**. The collective demonstrates **adaptive resilience** through repeated Telegram channel recreations and centralized decision-making, blending **theatrical brand management** with calculated extortion tactics.
Date Detected: 2025-08-08
Date Publicly Disclosed: 2025-08-08
Type: Cybercriminal Alliance Formation
Attack Vector: AI-automated vishingSpearphishingCredential HarvestingLateral MovementPrivilege EscalationZero-day Exploitation (e.g., CVE-2025-61882, CVE-2025-31324)Exploit BrokerageData ExfiltrationExtortion-as-a-Service (EaaS)
Vulnerability Exploited: CVE-2025-61882 (Oracle E-Business Suite)CVE-2025-31324 (unspecified CRM/DBMS/SaaS target)Zero-day vulnerabilities in cloud infrastructure/SaaS platforms
Threat Actor: Name: Scattered LAPSUS$ Hunters (SLH), Aliases: ['SLH', 'scattered LAPSUS$ hunters 7.0'], Affiliated Groups: ['Scattered Spider', 'ShinyHunters', 'LAPSUS$', 'The Com'], Core Members: [{'alias': 'shinycorp', 'handles': ['@sp1d3rhunters', '@shinyc0rp'], 'role': 'Principal Orchestrator'}, {'alias': 'yuka', 'handles': None, 'role': 'Exploit Developer', 'associated_malware': ['BlackLotus UEFI bootkit', 'Medusa rootkit']}, {'alias': 'Alg0d', 'handles': None, 'role': 'Auxiliary Operator'}, {'alias': 'UNC5537', 'handles': None, 'role': 'Auxiliary Operator'}], Operational Model: ['Extortion-as-a-Service (EaaS)', 'Crowdsourced Extortion', 'Vulnerability Brokerage'].
Motivation: Financial GainReputational CapitalOperational ResilienceNarrative ControlPsychological Impact (Theatrical Branding)
Common Attack Types: The most common types of attacks the company has faced is Cyber Attack.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Compromised OAuth tokens from Salesloft Drift application, Compromised Salesloft GitHub Repository (Secrets Exposure)Malicious OAuth Applications (Drift/Salesforce Integration), Salesloft GitHub Repository (Stolen OAuth Tokens), OAuth tokens via Salesloft's Drift integration, Malicious OAuth ApplicationsStolen SalesLoft Drift OAuth Tokens, Voice Phishing Calls (Salesforce)Compromised Third-Party Vendor (Discord)Exploited GitLab Misconfiguration (Red Hat)Zero-Day Exploit (Oracle CVE-2025-61882)Malicious OAuth App (Salesforce), SalesLoft GitHub Account (Compromised March–June 2024), Voice Phishing (Vishing) Calls and AI-automated vishingSpearphishingCredential Harvesting.

Systems Affected: Customer Instances
Downtime: 15 hours
Operational Impact: Service Disruption

Data Compromised: Customer account data, User data, Opportunities data, Aws access keys, Snowflake tokens, High-value secrets
Systems Affected: Salesforce corporate accountsSalesloft Drift application
Operational Impact: Temporary removal of Drift app from Salesforce AppExchangeRevocation of active access tokens
Brand Reputation Impact: Potential reputational damage due to unauthorized data access and credential theft
Identity Theft Risk: High (due to stolen credentials and secrets)

Data Compromised: Salesforce Account: 2, 5, 0, , m, i, l, l, i, o, n, , r, e, c, o, r, d, s, Salesforce Contact: 5, 7, 9, , m, i, l, l, i, o, n, , r, e, c, o, r, d, s, Salesforce Opportunity: 1, 7, 1, , m, i, l, l, i, o, n, , r, e, c, o, r, d, s, Salesforce User: 6, 0, , m, i, l, l, i, o, n, , r, e, c, o, r, d, s, Salesforce Case: 4, 5, 9, , m, i, l, l, i, o, n, , r, e, c, o, r, d, s, Total: 1, ., 5, , b, i, l, l, i, o, n, , r, e, c, o, r, d, s,
Systems Affected: Salesforce CRMDrift AI Chat/Email ServicesSalesloft PlatformGitHub Repository (Salesloft)Connected Applications (AWS, Snowflake, etc.)
Operational Impact: Unauthorized Data AccessExtortion ThreatsPotential Further Intrusions via Stolen CredentialsReputation Damage for Affected Companies
Brand Reputation Impact: High (Public Disclosure of Breach)Loss of Customer TrustPotential Regulatory Scrutiny
Identity Theft Risk: ['High (PII in Contact/Account Records)', 'Credential Stuffing Risk']

Data Compromised: Personally identifiable information (pii), Shipping information, Marketing lead data, Customer support case records, Chat transcripts, Flight details, Car ownership records, Employment histories, Passport numbers, Full contact information
Systems Affected: Salesforce CRM InstancesSalesloft Drift AI ChatbotGoogle WorkspaceMicrosoft 365Okta PlatformsGitHub Repository (Salesloft)
Operational Impact: Potential Disruption to CRM OperationsCustomer Data Exposure RisksIncident Response Activation
Brand Reputation Impact: High (Public Data Leak Site)Loss of Customer TrustMedia Scrutiny
Legal Liabilities: Potential GDPR/CCPA ViolationsRegulatory FinesClass-Action Lawsuits
Identity Theft Risk: High (Exposed PII Includes Passport Numbers, DOBs, Contact Details)

Data Compromised: 1 billion records (claimed by threat actors)
Systems Affected: Salesforce environments of ~40 companiesCustomer data via OAuth abuse
Brand Reputation Impact: High (public extortion threats, media coverage)
Identity Theft Risk: Potential (if PII was exposed)

Data Compromised: Customer data, Support tickets, Credentials, Api tokens, Authentication tokens
Systems Affected: Salesforce CRM InstancesSalesLoft Drift Environments
Operational Impact: Potential infrastructure breaches due to stolen credentials/tokens
Brand Reputation Impact: High (public extortion of major brands)
Identity Theft Risk: High (PII and credentials exposed)

Data Compromised: Salesforce customer records (>1b), Discord user data (usernames, emails, ip addresses, payment card last 4 digits, government ids), Red hat gitlab repositories (28,000+ repos, 5,000+ customer engagement reports, api tokens, infrastructure details), Oracle e-business suite data (via cve-2025-61882), Salesloft authentication tokens (cloud services: snowflake, aws)
Systems Affected: Salesforce Instances (Multiple Fortune 500 Companies)Discord Third-Party Customer Service ProviderRed Hat GitLab ServerOracle E-Business Suite ServersSalesloft AI Chatbot Platform
Operational Impact: Forensic Investigations (Salesforce, Red Hat, Discord)Customer Notifications (Ongoing)Regulatory ScrutinyReputation Damage for Victim Companies
Customer Complaints: Expected (Due to Data Leak Threats)
Brand Reputation Impact: Salesforce (Extortion Refusal Publicized)Fortune 500 Victims (Named on Victim-Shame Blog)Red Hat (Trust Erosion Due to GitLab Breach)Discord (User Privacy Concerns)
Legal Liabilities: Potential GDPR/CCPA Violations (Discord, Salesforce Customers)Regulatory Fines (Pending Investigations)Lawsuits from Affected Individuals
Identity Theft Risk: High (Discord Government IDs, Payment Data)
Payment Information Risk: Moderate (Discord: Last 4 Digits of Cards)

Data Compromised: Customer contact details, It support information, Access tokens, It configurations, Crm fields, Support cases, Integration data
Systems Affected: SalesLoft Drift AppSalesforce IntegrationsDrift’s AWS EnvironmentGitHub Account (SalesLoft)
Operational Impact: Disabled Drift App IntegrationToken Renewal Required for CustomersOngoing Customer Support Efforts
Brand Reputation Impact: Public Refusal to Pay RansomThird-Party Trust ErosionMedia Coverage (Bloomberg, Google Threat Intelligence)
Identity Theft Risk: ['Low (Primarily Corporate Data)']

Data Compromised: ~1 billion records
Systems Affected: Salesforce Customer Portals
Brand Reputation Impact: High (Public extortion threat and data leak risk)
Identity Theft Risk: Potential (depends on compromised data types)

Data Compromised: Corporate data, Customer records (1+ billion), Escrow databases, Database backups (since 2023)
Systems Affected: BreachForums DomainsBackend ServersDatabase Backups
Downtime: ['BreachForums (Permanent)', 'Forum Infrastructure (Seized)']
Operational Impact: Termination of BreachForums OperationsDisruption of Cybercrime EcosystemLoss of Trust in Hacking Forums
Brand Reputation Impact: Negative (for Affected Companies)Loss of Anonymity for Cybercriminals
Legal Liabilities: Potential Charges for BreachForums Admins (e.g., Kai West aka 'IntelBroker')Regulatory Scrutiny for Affected Companies
Identity Theft Risk: ['High (1+ billion customer records exposed)']

Data Compromised: one billion records (alleged)
Brand Reputation Impact: high (potential, due to threat of massive data leak)
Identity Theft Risk: high (potential, given scale of alleged breach)

Data Compromised: Potential crm/saas/database records (salesforce and other high-value enterprises)
Systems Affected: Cloud InfrastructureSaaS Platforms (e.g., Salesforce)Database Systems
Operational Impact: Disruption of SaaS OperationsPotential Supply Chain Risks
Brand Reputation Impact: High (Targeting of Salesforce and public extortion tactics)
Identity Theft Risk: ['Potential (PII in compromised databases)']
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Customer Account Data, User Data, Opportunities Data, Credentials, Aws Access Keys, Snowflake Tokens, High-Value Secrets, , Crm Data (Salesforce Objects), Account Records, Contact Records (Pii), Opportunity Records, User Records, Case Records (Support Tickets), Aws Keys, Snowflake Tokens, Other Credentials, , Pii, Customer Support Records, Chat Transcripts, Marketing Data, Shipping Information, Flight Details, Employment Histories, , Customer Data, Potentially Pii (Unconfirmed), , Customer Records, Support Tickets, Credentials, Api Tokens, Authentication Tokens, , Customer Records (Salesforce), User Pii (Discord: Emails, Ips, Government Ids), Source Code (Red Hat Git Repos), Api Tokens (Red Hat Cers), Infrastructure Details (Red Hat Audits), Authentication Tokens (Salesloft), , Customer Contact Details, It Support Information, Oauth Tokens, It Configurations, Crm Data, Support Cases, , Customer Records, Corporate Data, Escrow Databases, Database Backups, , Potentially Pii, Crm Data, Saas Configuration Details and .

Entity Name: Salesforce
Entity Type: Company
Industry: Technology
Location: North AmericaEurope

Entity Name: Salesforce
Entity Type: Cloud CRM Platform
Industry: Technology
Location: Global
Size: Large Enterprise
Customers Affected: Multiple corporate Salesforce accounts (exact number undisclosed)

Entity Name: Salesloft (Drift application)
Entity Type: Third-Party SaaS Provider
Industry: Sales Engagement
Location: Global

Entity Name: Multiple Unnamed Organizations
Entity Type: Corporate, Enterprise
Industry: Various
Location: Global

Entity Name: Salesforce
Entity Type: Cloud CRM Provider
Industry: Technology/Software
Location: Global (HQ: San Francisco, USA)
Size: Enterprise
Customers Affected: 760 companies

Entity Name: Salesloft
Entity Type: Sales Engagement Platform
Industry: Technology/Software
Location: USA (HQ: Atlanta, Georgia)
Size: Mid-to-Large Enterprise

Entity Name: Drift
Entity Type: Conversational Marketing Platform
Industry: Technology/Software
Location: USA (HQ: Boston, Massachusetts)
Size: Mid-to-Large Enterprise

Entity Name: Google
Entity Type: Technology Conglomerate
Industry: Technology/Internet Services
Location: Global (HQ: Mountain View, USA)
Size: Mega-Enterprise

Entity Name: Cloudflare
Entity Type: Web Infrastructure & Security
Industry: Technology/Cybersecurity
Location: Global (HQ: San Francisco, USA)
Size: Enterprise

Entity Name: Palo Alto Networks
Entity Type: Cybersecurity
Industry: Technology/Cybersecurity
Location: Global (HQ: Santa Clara, USA)
Size: Enterprise

Entity Name: Zscaler
Entity Type: Cloud Security
Industry: Technology/Cybersecurity
Location: Global (HQ: San Jose, USA)
Size: Enterprise

Entity Name: Tenable
Entity Type: Vulnerability Management
Industry: Technology/Cybersecurity
Location: Global (HQ: Columbia, USA)
Size: Enterprise

Entity Name: CyberArk
Entity Type: Privileged Access Management
Industry: Technology/Cybersecurity
Location: Global (HQ: Petah Tikva, Israel)
Size: Enterprise

Entity Name: Elastic
Entity Type: Search & Analytics
Industry: Technology/Software
Location: Global (HQ: Mountain View, USA)
Size: Enterprise

Entity Name: Qualys
Entity Type: IT Security & Compliance
Industry: Technology/Cybersecurity
Location: Global (HQ: Foster City, USA)
Size: Enterprise

Entity Name: Nutanix
Entity Type: Cloud Computing
Industry: Technology/Software
Location: Global (HQ: San Jose, USA)
Size: Enterprise

Entity Name: Proofpoint
Entity Type: Cybersecurity (Email Security)
Industry: Technology/Cybersecurity
Location: Global (HQ: Sunnyvale, USA)
Size: Enterprise

Entity Name: BeyondTrust
Entity Type: Privileged Access Management
Industry: Technology/Cybersecurity
Location: Global (HQ: Phoenix, USA)
Size: Enterprise

Entity Name: Rubrik
Entity Type: Data Management & Security
Industry: Technology/Cybersecurity
Location: Global (HQ: Palo Alto, USA)
Size: Enterprise

Entity Name: Cato Networks
Entity Type: Network Security
Industry: Technology/Cybersecurity
Location: Global (HQ: Tel Aviv, Israel)
Size: Mid-to-Large Enterprise

Entity Name: Salesforce
Entity Type: Software Company (CRM)
Industry: Technology
Location: Global (HQ: San Francisco, USA)
Size: Enterprise
Customers Affected: 760+ (via Salesloft Drift integration)

Entity Name: Salesloft (Drift)
Entity Type: Software Company (AI Chatbot)
Industry: Technology/SaaS
Location: Global (HQ: Atlanta, USA)
Size: Mid-to-Large
Customers Affected: 760+

Entity Name: Cisco
Entity Type: Corporation
Industry: Technology
Location: Global (HQ: San Jose, USA)
Size: Enterprise

Entity Name: The Walt Disney Company
Entity Type: Corporation
Industry: Entertainment
Location: Global (HQ: Burbank, USA)
Size: Enterprise

Entity Name: KFC (Yum! Brands)
Entity Type: Restaurant Chain
Industry: Food & Beverage
Location: Global
Size: Enterprise

Entity Name: IKEA
Entity Type: Retailer
Industry: Furniture
Location: Global (HQ: Netherlands)
Size: Enterprise

Entity Name: Marriott International
Entity Type: Hospitality
Industry: Hotels
Location: Global (HQ: Bethesda, USA)
Size: Enterprise

Entity Name: McDonald's
Entity Type: Restaurant Chain
Industry: Food & Beverage
Location: Global (HQ: Chicago, USA)
Size: Enterprise

Entity Name: Walgreens Boots Alliance
Entity Type: Pharmacy Retailer
Industry: Healthcare/Retail
Location: Global (HQ: Deerfield, USA)
Size: Enterprise

Entity Name: Albertsons Companies
Entity Type: Grocery Retailer
Industry: Retail
Location: USA
Size: Enterprise

Entity Name: Saks Fifth Avenue
Entity Type: Luxury Retailer
Industry: Retail
Location: USA (HQ: New York)
Size: Large

Entity Name: Salesforce
Entity Type: Corporation
Industry: Cloud Computing / CRM
Location: San Francisco, California, USA
Size: Large (Enterprise)
Customers Affected: ~40 companies (via Salesforce environments)

Entity Name: Salesloft (Drift integration)
Entity Type: Corporation
Industry: Sales Engagement Software
Location: Atlanta, Georgia, USA
Customers Affected: Hundreds of organizations (via OAuth abuse)

Entity Name: Multiple Unnamed Companies
Entity Type: Corporations, Organizations
Industry: Various
Location: Global

Entity Name: Salesforce
Entity Type: Cloud Service Provider
Industry: Technology (CRM/SaaS)
Location: San Francisco, California, USA
Size: Enterprise
Customers Affected: 39+ (direct extortion targets), 760+ (SalesLoft campaign)

Entity Name: FedEx
Entity Type: Corporation
Industry: Logistics
Location: Memphis, Tennessee, USA
Size: Enterprise

Entity Name: Disney/Hulu
Entity Type: Corporation
Industry: Entertainment
Location: Burbank, California, USA
Size: Enterprise

Entity Name: Home Depot
Entity Type: Corporation
Industry: Retail
Location: Atlanta, Georgia, USA
Size: Enterprise

Entity Name: Marriott
Entity Type: Corporation
Industry: Hospitality
Location: Bethesda, Maryland, USA
Size: Enterprise

Entity Name: Google
Entity Type: Corporation
Industry: Technology
Location: Mountain View, California, USA
Size: Enterprise

Entity Name: Cisco
Entity Type: Corporation
Industry: Technology
Location: San Jose, California, USA
Size: Enterprise

Entity Name: Toyota
Entity Type: Corporation
Industry: Automotive
Location: Toyota City, Aichi, Japan
Size: Enterprise

Entity Name: Gap
Entity Type: Corporation
Industry: Retail
Location: San Francisco, California, USA
Size: Enterprise

Entity Name: Kering
Entity Type: Corporation
Industry: Luxury Goods
Location: Paris, France
Size: Enterprise

Entity Name: McDonald's
Entity Type: Corporation
Industry: Food Service
Location: Chicago, Illinois, USA
Size: Enterprise

Entity Name: Walgreens
Entity Type: Corporation
Industry: Pharmacy/Retail
Location: Deerfield, Illinois, USA
Size: Enterprise

Entity Name: Instacart
Entity Type: Corporation
Industry: E-commerce
Location: San Francisco, California, USA
Size: Enterprise

Entity Name: Cartier
Entity Type: Corporation
Industry: Luxury Goods
Location: Paris, France
Size: Enterprise

Entity Name: Adidas
Entity Type: Corporation
Industry: Apparel
Location: Herzogenaurach, Germany
Size: Enterprise

Entity Name: Saks Fifth Avenue
Entity Type: Corporation
Industry: Retail
Location: New York, New York, USA
Size: Enterprise

Entity Name: Air France & KLM
Entity Type: Corporation
Industry: Aviation
Location: Paris, France / Amstelveen, Netherlands
Size: Enterprise

Entity Name: TransUnion
Entity Type: Corporation
Industry: Credit Reporting
Location: Chicago, Illinois, USA
Size: Enterprise

Entity Name: HBO Max
Entity Type: Corporation
Industry: Entertainment
Location: New York, New York, USA
Size: Enterprise

Entity Name: UPS
Entity Type: Corporation
Industry: Logistics
Location: Atlanta, Georgia, USA
Size: Enterprise

Entity Name: Chanel
Entity Type: Corporation
Industry: Luxury Goods
Location: Paris, France
Size: Enterprise

Entity Name: IKEA
Entity Type: Corporation
Industry: Retail
Location: Delft, Netherlands
Size: Enterprise

Entity Name: Qantas
Entity Type: Corporation
Industry: Aviation
Location: Sydney, Australia
Size: Enterprise

Entity Name: Allianz Life
Entity Type: Corporation
Industry: Insurance
Location: Minneapolis, Minnesota, USA
Size: Enterprise

Entity Name: Farmers Insurance
Entity Type: Corporation
Industry: Insurance
Location: Los Angeles, California, USA
Size: Enterprise

Entity Name: Workday
Entity Type: Corporation
Industry: Technology (HR/Finance SaaS)
Location: Pleasanton, California, USA
Size: Enterprise

Entity Name: LVMH (Dior, Louis Vuitton, Tiffany & Co.)
Entity Type: Corporation
Industry: Luxury Goods
Location: Paris, France
Size: Enterprise

Entity Name: Cloudflare
Entity Type: Corporation
Industry: Technology (Cybersecurity)
Location: San Francisco, California, USA
Size: Enterprise

Entity Name: Zscaler
Entity Type: Corporation
Industry: Technology (Cybersecurity)
Location: San Jose, California, USA
Size: Enterprise

Entity Name: Tenable
Entity Type: Corporation
Industry: Technology (Cybersecurity)
Location: Columbia, Maryland, USA
Size: Enterprise

Entity Name: CyberArk
Entity Type: Corporation
Industry: Technology (Cybersecurity)
Location: Petah Tikva, Israel
Size: Enterprise

Entity Name: Elastic
Entity Type: Corporation
Industry: Technology (Search/Data Analytics)
Location: Mountain View, California, USA
Size: Enterprise

Entity Name: BeyondTrust
Entity Type: Corporation
Industry: Technology (Cybersecurity)
Location: Phoenix, Arizona, USA
Size: Enterprise

Entity Name: Proofpoint
Entity Type: Corporation
Industry: Technology (Cybersecurity)
Location: Sunnyvale, California, USA
Size: Enterprise

Entity Name: JFrog
Entity Type: Corporation
Industry: Technology (DevOps)
Location: Sunnyvale, California, USA
Size: Enterprise

Entity Name: Nutanix
Entity Type: Corporation
Industry: Technology (Cloud Computing)
Location: San Jose, California, USA
Size: Enterprise

Entity Name: Qualys
Entity Type: Corporation
Industry: Technology (Cybersecurity)
Location: Foster City, California, USA
Size: Enterprise

Entity Name: Rubrik
Entity Type: Corporation
Industry: Technology (Data Management)
Location: Palo Alto, California, USA
Size: Enterprise

Entity Name: Cato Networks
Entity Type: Corporation
Industry: Technology (Network Security)
Location: Tel Aviv, Israel
Size: Enterprise

Entity Name: Palo Alto Networks
Entity Type: Corporation
Industry: Technology (Cybersecurity)
Location: Santa Clara, California, USA
Size: Enterprise

Entity Name: Salesforce
Entity Type: CRM Platform
Industry: Enterprise Software
Location: USA (Global Operations)
Size: Large (Fortune 500)
Customers Affected: >1B Records (Across Dozens of Clients)

Entity Name: Google
Entity Type: Technology
Industry: Internet Services
Location: USA
Size: Large
Customers Affected: Corporate Salesforce Instance Compromised

Entity Name: Toyota
Entity Type: Corporation
Industry: Automotive
Location: Japan/Global
Size: Large
Customers Affected: Salesforce Data Stolen (Volume Undisclosed)

Entity Name: FedEx
Entity Type: Corporation
Industry: Logistics
Location: USA/Global
Size: Large
Customers Affected: Salesforce Data Stolen (Volume Undisclosed)

Entity Name: Disney/Hulu
Entity Type: Corporation
Industry: Entertainment
Location: USA
Size: Large
Customers Affected: Salesforce Data Stolen (Volume Undisclosed)

Entity Name: UPS
Entity Type: Corporation
Industry: Logistics
Location: USA/Global
Size: Large
Customers Affected: Salesforce Data Stolen (Volume Undisclosed)

Entity Name: Red Hat (IBM)
Entity Type: Subsidiary
Industry: Enterprise Software
Location: USA/Global
Size: Large
Customers Affected: 28,000+ Git Repos, 5,000+ Customer Engagement Reports

Entity Name: Discord
Entity Type: Corporation
Industry: Social Media/Communication
Location: USA
Size: Large
Customers Affected: Limited Number of Users (Support/Trust & Safety Interactions)

Entity Name: Oracle
Entity Type: Corporation
Industry: Enterprise Software
Location: USA/Global
Size: Large
Customers Affected: E-Business Suite Users (Via CVE-2025-61882)

Entity Name: Salesloft
Entity Type: Corporation
Industry: Sales Engagement
Location: USA
Size: Medium
Customers Affected: Authentication Tokens Stolen (Impacted Cloud Services: Snowflake, AWS)

Entity Name: Salesforce
Entity Type: CRM Provider
Industry: Cloud Computing / SaaS
Location: San Francisco, California, USA
Size: Enterprise (150,000+ employees)
Customers Affected: Unknown (Hundreds of organizations)

Entity Name: SalesLoft
Entity Type: Sales Engagement Platform
Industry: Sales Technology
Location: Atlanta, Georgia, USA
Size: Mid-Large (500+ employees)
Customers Affected: Unknown (Via Drift App)

Entity Name: Cloudflare
Entity Type: Web Infrastructure & Security
Industry: Cybersecurity
Location: San Francisco, California, USA
Size: Enterprise

Entity Name: Zscaler
Entity Type: Cloud Security
Industry: Cybersecurity
Location: San Jose, California, USA
Size: Enterprise

Entity Name: Palo Alto Networks
Entity Type: Cybersecurity
Industry: Network Security
Location: Santa Clara, California, USA
Size: Enterprise

Entity Name: CyberArk
Entity Type: Privileged Access Security
Industry: Cybersecurity
Location: Petah Tikva, Israel / Newton, Massachusetts, USA
Size: Enterprise

Entity Name: Rubrik
Entity Type: Data Management & Security
Industry: Cloud Data Protection
Location: Palo Alto, California, USA
Size: Mid-Large

Entity Name: Nutanix
Entity Type: Hybrid Cloud Computing
Industry: IT Infrastructure
Location: San Jose, California, USA
Size: Enterprise

Entity Name: Ericsson
Entity Type: Telecommunications
Industry: Networking & 5G
Location: Stockholm, Sweden
Size: Enterprise

Entity Name: JFrog
Entity Type: DevOps Platform
Industry: Software Development
Location: Sunnyvale, California, USA
Size: Mid-Large

Entity Name: Salesforce
Entity Type: Cloud CRM Provider
Industry: Technology
Location: San Francisco, California, USA
Size: Large Enterprise
Customers Affected: Dozens (including Toyota, FedEx, and 37 others)

Entity Name: Toyota
Entity Type: Automotive Manufacturer
Industry: Automotive
Location: Global
Size: Large Enterprise

Entity Name: FedEx
Entity Type: Logistics Company
Industry: Transportation/Logistics
Location: Global
Size: Large Enterprise

Entity Name: BreachForums
Entity Type: Hacking Forum / Data Extortion Site
Industry: Cybercrime
Location: Global (Seized by U.S. and France)

Entity Name: Salesforce (Indirectly Affected via Breach)
Entity Type: Cloud Computing / CRM
Industry: Technology
Location: Global
Size: Enterprise
Customers Affected: 1+ billion records (across multiple companies)

Entity Name: FedEx
Entity Type: Logistics
Industry: Transportation
Location: Global
Size: Enterprise

Entity Name: Disney/Hulu
Entity Type: Entertainment
Industry: Media
Location: Global
Size: Enterprise

Entity Name: Home Depot
Entity Type: Retail
Industry: Home Improvement
Location: Global
Size: Enterprise

Entity Name: Marriott
Entity Type: Hospitality
Industry: Travel
Location: Global
Size: Enterprise

Entity Name: Google
Entity Type: Technology
Industry: Internet Services
Location: Global
Size: Enterprise

Entity Name: Cisco
Entity Type: Technology
Industry: Networking
Location: Global
Size: Enterprise

Entity Name: Toyota
Entity Type: Automotive
Industry: Manufacturing
Location: Global
Size: Enterprise

Entity Name: Gap
Entity Type: Retail
Industry: Fashion
Location: Global
Size: Enterprise

Entity Name: McDonald's
Entity Type: Food Service
Industry: Restaurant
Location: Global
Size: Enterprise

Entity Name: Walgreens
Entity Type: Retail
Industry: Pharmacy
Location: Global
Size: Enterprise

Entity Name: Instacart
Entity Type: E-Commerce
Industry: Grocery Delivery
Location: Global
Size: Enterprise

Entity Name: Cartier
Entity Type: Luxury Goods
Industry: Retail
Location: Global
Size: Enterprise

Entity Name: Adidas
Entity Type: Retail
Industry: Sportswear
Location: Global
Size: Enterprise

Entity Name: Saks Fifth Avenue
Entity Type: Retail
Industry: Luxury Department Store
Location: Global
Size: Enterprise

Entity Name: Air France & KLM
Entity Type: Aviation
Industry: Travel
Location: Global
Size: Enterprise

Entity Name: TransUnion
Entity Type: Financial Services
Industry: Credit Reporting
Location: Global
Size: Enterprise

Entity Name: HBO Max
Entity Type: Entertainment
Industry: Streaming
Location: Global
Size: Enterprise

Entity Name: UPS
Entity Type: Logistics
Industry: Transportation
Location: Global
Size: Enterprise

Entity Name: Chanel
Entity Type: Luxury Goods
Industry: Retail
Location: Global
Size: Enterprise

Entity Name: IKEA
Entity Type: Retail
Industry: Furniture
Location: Global
Size: Enterprise

Entity Name: Salesforce
Entity Type: corporation
Industry: cloud computing / CRM
Location: San Francisco, California, USA
Size: large
Customers Affected: 39 (including Disney, Toyota, Adidas, McDonald's, IKEA, Home Depot)

Entity Name: Disney
Entity Type: corporation
Industry: entertainment
Location: Burbank, California, USA
Size: large

Entity Name: Toyota
Entity Type: corporation
Industry: automotive
Location: Toyota City, Aichi, Japan
Size: large

Entity Name: Adidas
Entity Type: corporation
Industry: sportswear
Location: Herzogenaurach, Germany
Size: large

Entity Name: McDonald's
Entity Type: corporation
Industry: fast food
Location: Chicago, Illinois, USA
Size: large

Entity Name: IKEA
Entity Type: corporation
Industry: retail / furniture
Location: Delft, Netherlands
Size: large

Entity Name: Home Depot
Entity Type: corporation
Industry: retail / home improvement
Location: Atlanta, Georgia, USA
Size: large

Entity Name: Salesforce
Entity Type: SaaS Provider
Industry: Customer Relationship Management (CRM)
Location: Global (HQ: San Francisco, USA)
Size: Enterprise

Containment Measures: Blocked access to affected instances
Remediation Measures: Blocked access to orgs with inadvertent permissions

Incident Response Plan Activated: True
Third Party Assistance: Google Threat Intelligence Group (Gtig), Mandiant, Astrix Security.
Containment Measures: Revoked all active access tokens for Drift app (August 20, 2025)Temporarily removed Drift from Salesforce AppExchange
Remediation Measures: Restricting Connected App scopesSearching for exposed secrets in Salesforce dataRotating compromised credentialsEnforcing IP restrictions
Communication Strategy: Advisories issued by GTIG/MandiantNotifications to affected organizationsPublic blog post by Astrix Security
Enhanced Monitoring: Checking for specific IP addresses/User-Agent strings linked to attackers

Third Party Assistance: Google Mandiant (Threat Intelligence), Fbi (Advisory & Investigation).
Law Enforcement Notified: FBI,
Remediation Measures: Salesforce Recommendations: Enforce Multi-Factor Authentication (MFA)Apply Principle of Least PrivilegeClosely Manage Connected Applications
Communication Strategy: Salesforce Customer AdvisoriesFBI Public Advisory on UNC6040/6395

Incident Response Plan Activated: Yes (Salesforce, Mandiant, and Affected Companies)
Third Party Assistance: Mandiant (Google’S Incident Response), Salesforce Security Team, Fbi Cyber Division.
Law Enforcement Notified: Yes (FBI Issued Advisory on 2023-09-12)
Containment Measures: Revoking Compromised OAuth TokensIsolating Affected Salesforce InstancesDisabling Salesloft Drift Integrations
Remediation Measures: Enforcing 2FA for OAuth AppsPatching Salesloft Drift VulnerabilitiesAudit of Third-Party Integrations
Recovery Measures: Data Backup Restoration (if applicable)Customer Notification PlansDark Web Monitoring for Leaked Data
Communication Strategy: Public Disclosure via Media (ISMG, BleepingComputer)Customer Advisories (Pending)Regulatory Notifications
Network Segmentation: Recommended (to Limit Lateral Movement)
Enhanced Monitoring: Salesforce Instance LogsCloud Platform (Google Workspace, Microsoft 365, Okta) Activity

Incident Response Plan Activated: Yes (Salesforce engaged external experts and authorities)
Third Party Assistance: Mandiant (Google), External Cybersecurity Experts.
Law Enforcement Notified: Yes (US and UK authorities involved)
Remediation Measures: Customer notificationsInvestigation of OAuth abuse
Communication Strategy: Public security advisoryMedia statements

Incident Response Plan Activated: Yes (Salesforce notified customers)
Law Enforcement Notified: Likely (FBI may have seized extortion domain)
Remediation Measures: Refusal to pay ransomCustomer notifications
Communication Strategy: Public statements and customer emails

Incident Response Plan Activated: True
Third Party Assistance: Google Threat Intelligence Group (Gtig), Mandiant (Malware Analysis), Law Enforcement (Fbi, Uk Nca).
Containment Measures: Salesforce: Disabled Malicious OAuth AppsRed Hat: Isolated Compromised GitLab ServerDiscord: Terminated Third-Party Vendor AccessOracle: Emergency Patch for CVE-2025-61882
Remediation Measures: Salesforce: Forensic Analysis, Customer SupportRed Hat: Customer Notifications, Repository AuditsDiscord: Affected User Notifications, Password ResetsOracle: Urged Customers to Apply Patch
Recovery Measures: Salesforce: Refused to Pay Ransom, Focused on DefenseRed Hat: Restored GitLab from BackupsDiscord: Enhanced Vendor Security Controls
Communication Strategy: Salesforce: Customer Advisories (No Negotiation Policy)Red Hat: Public Disclosure (October 2, 2025)Discord: Direct Emails to Affected UsersOracle: Security Advisory for CVE-2025-61882
Enhanced Monitoring: Salesforce: Increased Logging for OAuth IntegrationsRed Hat: GitLab Access Audits

Incident Response Plan Activated: True
Third Party Assistance: Google Threat Intelligence Group (Warnings).
Containment Measures: Disabled Drift App IntegrationToken Renewal Mandate for Customers
Remediation Measures: Customer Support OutreachOAuth Token Rotation
Recovery Measures: Reactivated SalesLoft Integrations (Except Drift)
Communication Strategy: Internal Memo (Bloomberg-Leaked)Public Statement on Non-Payment of RansomCustomer Advisories
Enhanced Monitoring: Likely (Implied by Google Threat Intelligence Collaboration)

Incident Response Plan Activated: Likely (Salesforce refused ransom demand)
Third Party Assistance: Mandiant (Google-Owned Threat Intelligence).
Communication Strategy: Public refusal of ransom demand (email statement)

Incident Response Plan Activated: Yes (FBI and France's BL2C Unit)
Third Party Assistance: French Law Enforcement (Bl2C Unit).
Law Enforcement Notified: Yes (FBI-led operation)
Containment Measures: Domain SeizureBackend Server SeizureNameserver Redirection to FBI
Remediation Measures: Permanent Shutdown of BreachForumsPrevention of Data Leak (Salesforce Campaign Disrupted)
Communication Strategy: Public Announcement via BleepingComputerPGP-Signed Message from ShinyHunters on Telegram
Incident Response Plan: The company's incident response plan is described as Yes (Salesforce, Mandiant, and Affected Companies), Yes (Salesforce engaged external experts and authorities), Yes (Salesforce notified customers), , , Likely (Salesforce refused ransom demand), Yes (FBI and France's BL2C Unit).
Third-Party Assistance: The company involves third-party assistance in incident response through Google Threat Intelligence Group (GTIG), Mandiant, Astrix Security, , Google Mandiant (Threat Intelligence), FBI (Advisory & Investigation), , Mandiant (Google’s Incident Response), Salesforce Security Team, FBI Cyber Division, , Mandiant (Google), External cybersecurity experts, , Google Threat Intelligence Group (GTIG), Mandiant (Malware Analysis), Law Enforcement (FBI, UK NCA), , Google Threat Intelligence Group (Warnings), , Mandiant (Google-owned threat intelligence), , French Law Enforcement (BL2C Unit), .

Type of Data Compromised: Customer account data, User data, Opportunities data, Credentials, Aws access keys, Snowflake tokens, High-value secrets
Sensitivity of Data: High (includes cloud infrastructure keys and authentication tokens)

Type of Data Compromised: Crm data (salesforce objects), Account records, Contact records (pii), Opportunity records, User records, Case records (support tickets), Aws keys, Snowflake tokens, Other credentials
Number of Records Exposed: 1.5 billion
Sensitivity of Data: High (PII, Business-Critical CRM Data, Credentials)
Data Exfiltration: Confirmed (Massive Scale)Evidence: Shared File Listing Salesloft’s Breached Source Code Folders
File Types Exposed: Salesforce Database RecordsSource Code (Salesloft GitHub)Configuration FilesAPI Keys/Secrets
Personally Identifiable Information: Contact Records (Names, Email Addresses, Phone Numbers, etc.)User Records (Employee/Client Data)

Type of Data Compromised: Pii, Customer support records, Chat transcripts, Marketing data, Shipping information, Flight details, Employment histories
Number of Records Exposed: 1,500,000,000 (claimed)
Sensitivity of Data: High (Includes Passport Numbers, Nationalities, Contact Details)
Data Exfiltration: Confirmed (Samples Validated by Researchers)
Data Encryption: No (Data Stolen in Plaintext)
File Types Exposed: Database DumpsCSV/Excel FilesJSON/Log FilesChat Transcripts
Personally Identifiable Information: Full NamesDates of BirthNationalitiesPassport NumbersEmail AddressesPhone NumbersPhysical AddressesEmployment Histories

Type of Data Compromised: Customer data, Potentially pii (unconfirmed)
Number of Records Exposed: 1 billion (claimed; unverified)
Sensitivity of Data: Moderate to High (if PII included)
Data Exfiltration: Claimed by threat actors
Personally Identifiable Information: Potential (unconfirmed)

Type of Data Compromised: Customer records, Support tickets, Credentials, Api tokens, Authentication tokens
Number of Records Exposed: ~2.5 billion (1B in first campaign, 1.5B in second)
Sensitivity of Data: High (PII, credentials, business-sensitive data)
Data Exfiltration: Yes
File Types Exposed: DatabasesSupport LogsConfiguration Files
Personally Identifiable Information: Yes

Type of Data Compromised: Customer records (salesforce), User pii (discord: emails, ips, government ids), Source code (red hat git repos), Api tokens (red hat cers), Infrastructure details (red hat audits), Authentication tokens (salesloft)
Number of Records Exposed: >1B (Salesforce) + Undisclosed (Discord, Red Hat, Oracle)
Sensitivity of Data: High (PII, Government IDs, Source Code, API Tokens)
File Types Exposed: Salesforce Database ExportsGit Repositories (Red Hat)Customer Support Tickets (Discord)Oracle E-Business Suite Records
Personally Identifiable Information: Discord: Usernames, Emails, IPs, Government ID ImagesSalesforce: Customer Data (Varies by Client)Red Hat: Business Contact Information (Limited)

Type of Data Compromised: Customer contact details, It support information, Oauth tokens, It configurations, Crm data, Support cases
Number of Records Exposed: Unknown (Hundreds of organizations affected)
Sensitivity of Data: Moderate (Corporate IT and Customer Data)
Personally Identifiable Information: Limited (Primarily Corporate PII)

Number of Records Exposed: 989.45 million (~1 billion)
Data Exfiltration: Claimed by threat actor

Type of Data Compromised: Customer records, Corporate data, Escrow databases, Database backups
Number of Records Exposed: 1+ billion (Salesforce campaign)
Sensitivity of Data: High (Personally Identifiable Information)
Data Exfiltration: Yes (Stolen from Salesforce breaches)
Personally Identifiable Information: Yes

Number of Records Exposed: one billion (alleged)
Data Exfiltration: alleged

Type of Data Compromised: Potentially pii, crm data, saas configuration details
Sensitivity of Data: High (Enterprise SaaS and cloud infrastructure)
Personally Identifiable Information: Likely (based on target profile)
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Blocked access to orgs with inadvertent permissions, , Restricting Connected App scopes, Searching for exposed secrets in Salesforce data, Rotating compromised credentials, Enforcing IP restrictions, , Salesforce Recommendations: Enforce Multi-Factor Authentication (MFA), Apply Principle of Least Privilege, Closely Manage Connected Applications, , Enforcing 2FA for OAuth Apps, Patching Salesloft Drift Vulnerabilities, Audit of Third-Party Integrations, , Customer notifications, Investigation of OAuth abuse, , Refusal to pay ransom, Customer notifications, , Salesforce: Forensic Analysis, Customer Support, Red Hat: Customer Notifications, Repository Audits, Discord: Affected User Notifications, Password Resets, Oracle: Urged Customers to Apply Patch, , Customer Support Outreach, OAuth Token Rotation, , Permanent Shutdown of BreachForums, Prevention of Data Leak (Salesforce Campaign Disrupted), .
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by blocked access to affected instances, , revoked all active access tokens for drift app (august 20, 2025), temporarily removed drift from salesforce appexchange, , revoking compromised oauth tokens, isolating affected salesforce instances, disabling salesloft drift integrations, , salesforce: disabled malicious oauth apps, red hat: isolated compromised gitlab server, discord: terminated third-party vendor access, oracle: emergency patch for cve-2025-61882, , disabled drift app integration, token renewal mandate for customers, , domain seizure, backend server seizure, nameserver redirection to fbi and .

Data Exfiltration: True

Ransom Demanded: ['Extortion Threats (No Specific Ransom Amount Disclosed)']
Data Exfiltration: ['Yes (Extortion-Based)']

Ransom Demanded: ['Separate Ransoms from Salesforce and Listed Victims', 'Extortion Threats via Dark Web Leak Site']
Data Encryption: No (Data Theft Without Encryption)
Data Exfiltration: Yes (1.5B Records Claimed)

Ransom Demanded: $989.45 (for all data)
Ransom Paid: No (as of disclosure)
Data Exfiltration: Claimed

Ransom Demanded: Unspecified (extortion demands to companies or Salesforce)
Ransom Paid: No (Salesforce refused to pay)
Data Encryption: No (data theft, not encryption)
Data Exfiltration: Yes

Ransom Demanded: Unspecified (Threatened Public Leak if Unpaid by October 10, 2025)
Data Exfiltration: True

Ransom Demanded: Unspecified (extortion demand to Salesforce)
Ransom Paid: No (Salesforce refused)
Data Exfiltration: Claimed (~1 billion records)

Ransom Demanded: Yes (Salesforce Campaign)
Ransom Paid: Unknown (Companies targeted for non-payment)
Data Exfiltration: Yes

Ransom Demanded: unspecified (threatened leak if unpaid by October 10, 2023, 11:59 p.m. EST)
Data Exfiltration: alleged

Data Exfiltration: True
Data Recovery from Ransomware: The company recovers data encrypted by ransomware through Data Backup Restoration (if applicable), Customer Notification Plans, Dark Web Monitoring for Leaked Data, , Salesforce: Refused to Pay Ransom, Focused on Defense, Red Hat: Restored GitLab from Backups, Discord: Enhanced Vendor Security Controls, , Reactivated SalesLoft Integrations (Except Drift), .

Regulatory Notifications: Notifications sent to affected organizations (details undisclosed)

Regulations Violated: Potential GDPR (EU), CCPA (California), Sector-Specific Data Protection Laws,
Legal Actions: Pending (Potential Class-Action Lawsuits), Regulatory Investigations,
Regulatory Notifications: Likely Required (e.g., GDPR 72-Hour Rule)State Attorney General Notifications (USA)

Legal Actions: Arrests of UK teens (Scattered Spider members), Ongoing investigations,

Regulations Violated: Potential GDPR (EU Customer Data in Salesforce/Discord), Potential CCPA (California Residents), Industry-Specific Compliance (e.g., PCI DSS for Payment Data),
Legal Actions: UK Charges Against Scattered Spider Members (September 2025), US Charges Against Thalha Jubair (MGM, Caesars, Harrods Attacks), Extradition of Tyler Buchanan (Spain to US, April 2025), Noah Urban Sentencing (10 Years, August 2025),
Regulatory Notifications: Salesforce: Notified Customers (No Regulatory Filings Mentioned)Red Hat: Customer Notifications (October 2, 2025)Discord: Affected User Notifications (Ongoing)

Legal Actions: Arrests of BreachForums Admins (France), Charges Against Kai West ('IntelBroker') in U.S.,
Ensuring Regulatory Compliance: The company ensures compliance with regulatory requirements through Pending (Potential Class-Action Lawsuits), Regulatory Investigations, , Arrests of UK teens (Scattered Spider members), Ongoing investigations, , UK Charges Against Scattered Spider Members (September 2025), US Charges Against Thalha Jubair (MGM, Caesars, Harrods Attacks), Extradition of Tyler Buchanan (Spain to US, April 2025), Noah Urban Sentencing (10 Years, August 2025), , Arrests of BreachForums Admins (France), Charges Against Kai West ('IntelBroker') in U.S., .

Lessons Learned: Non-human identities (NHIs) are persistent, high-privilege targets for attackers., OAuth token abuse can bypass MFA, highlighting the need for stricter access controls., Organizations often lack visibility into NHIs, increasing risk of exploitation., Proactive measures (e.g., IP restrictions, secret scanning) are critical to mitigate NHI-based attacks.

Lessons Learned: OAuth tokens and connected applications are high-value targets for attackers., Social engineering and malicious OAuth apps can bypass traditional security controls., Exposed secrets in repositories (e.g., GitHub) enable supply chain attacks., Extortion groups increasingly target CRM data for its sensitivity and leverage in negotiations., Multi-factor authentication (MFA) and least privilege principles are critical for mitigating such breaches.

Lessons Learned: Third-party integrations (e.g., Salesloft Drift) introduce significant supply-chain risks; rigorous vendor security assessments are critical., OAuth tokens and API keys must be protected with **2FA and strict access controls** to prevent abuse., Social engineering (vishing/phishing) remains a highly effective attack vector; **employee training and verification protocols** are essential., Lateral movement to cloud platforms (Google Workspace, Microsoft 365, Okta) underscores the need for **zero-trust architecture and segmentation**., Proactive threat hunting and **dark web monitoring** can help detect stolen data early., Incident response plans must include **third-party breach scenarios** with clear escalation paths.

Lessons Learned: Vishing Remains Effective for OAuth Abuse (Salesforce), Third-Party Vendors Are Critical Attack Vectors (Discord, Salesloft), GitLab Server Hardening Needed (Red Hat), Zero-Day Patching Urgency (Oracle CVE-2025-61882), Extortion Groups Evolve Tactics (Victim-Shaming Blogs, Malware Threats), Cross-Group Collaboration (Scattered Spider + Lapsus$ + ShinyHunters)

Lessons Learned: Third-party app integrations introduce significant risk; rigorous vetting and monitoring are critical., OAuth token management requires stricter controls (e.g., rotation, least-privilege access)., GitHub account security is a high-value target for attackers; MFA and access logging are essential., Public refusal to pay ransom can deter attackers but may escalate data leak risks.

Lessons Learned: Cybercrime forums are vulnerable to law enforcement takedowns, especially with international cooperation., Data backups can be compromised if stored within seized infrastructure., High-profile data leak threats can accelerate law enforcement action., The 'era of forums' for cybercriminals may be ending due to increased scrutiny and takedowns.

Lessons Learned: Cybercriminal consolidation enhances operational resilience and technical sophistication., Telegram’s role as both a coordination and performative marketing tool amplifies psychological impact., Exploit brokerage and zero-day vulnerabilities are critical force multipliers for modern threat actors., Extortion-as-a-Service (EaaS) models lower the barrier to entry for affiliate-driven attacks., Theatrical branding and narrative control are strategic assets equivalent to technical capabilities.

Recommendations: Hardening access controls by restricting Connected App scopes in Salesforce., Conducting audits to identify and secure exposed secrets within Salesforce data., Rotating compromised credentials and enforcing least-privilege access for NHIs., Implementing IP restrictions to limit access to trusted locations., Monitoring for suspicious IP addresses/User-Agent strings associated with attackers., Creating an inventory of non-human identities (NHIs) to improve visibility and security.Hardening access controls by restricting Connected App scopes in Salesforce., Conducting audits to identify and secure exposed secrets within Salesforce data., Rotating compromised credentials and enforcing least-privilege access for NHIs., Implementing IP restrictions to limit access to trusted locations., Monitoring for suspicious IP addresses/User-Agent strings associated with attackers., Creating an inventory of non-human identities (NHIs) to improve visibility and security.Hardening access controls by restricting Connected App scopes in Salesforce., Conducting audits to identify and secure exposed secrets within Salesforce data., Rotating compromised credentials and enforcing least-privilege access for NHIs., Implementing IP restrictions to limit access to trusted locations., Monitoring for suspicious IP addresses/User-Agent strings associated with attackers., Creating an inventory of non-human identities (NHIs) to improve visibility and security.Hardening access controls by restricting Connected App scopes in Salesforce., Conducting audits to identify and secure exposed secrets within Salesforce data., Rotating compromised credentials and enforcing least-privilege access for NHIs., Implementing IP restrictions to limit access to trusted locations., Monitoring for suspicious IP addresses/User-Agent strings associated with attackers., Creating an inventory of non-human identities (NHIs) to improve visibility and security.Hardening access controls by restricting Connected App scopes in Salesforce., Conducting audits to identify and secure exposed secrets within Salesforce data., Rotating compromised credentials and enforcing least-privilege access for NHIs., Implementing IP restrictions to limit access to trusted locations., Monitoring for suspicious IP addresses/User-Agent strings associated with attackers., Creating an inventory of non-human identities (NHIs) to improve visibility and security.Hardening access controls by restricting Connected App scopes in Salesforce., Conducting audits to identify and secure exposed secrets within Salesforce data., Rotating compromised credentials and enforcing least-privilege access for NHIs., Implementing IP restrictions to limit access to trusted locations., Monitoring for suspicious IP addresses/User-Agent strings associated with attackers., Creating an inventory of non-human identities (NHIs) to improve visibility and security.

Recommendations: Enforce MFA for all user and service accounts, especially those with access to sensitive data., Audit and monitor OAuth applications and connected apps for suspicious activity., Implement the principle of least privilege to limit access to CRM data and APIs., Regularly scan repositories (e.g., GitHub) for exposed secrets using tools like TruffleHog., Monitor for unusual data access patterns, especially in Salesforce environments., Educate employees on social engineering tactics, particularly phishing and malicious OAuth app requests., Isolate high-value systems (e.g., CRM) from less secure environments to limit lateral movement., Develop and test incident response plans for extortion and data breach scenarios.Enforce MFA for all user and service accounts, especially those with access to sensitive data., Audit and monitor OAuth applications and connected apps for suspicious activity., Implement the principle of least privilege to limit access to CRM data and APIs., Regularly scan repositories (e.g., GitHub) for exposed secrets using tools like TruffleHog., Monitor for unusual data access patterns, especially in Salesforce environments., Educate employees on social engineering tactics, particularly phishing and malicious OAuth app requests., Isolate high-value systems (e.g., CRM) from less secure environments to limit lateral movement., Develop and test incident response plans for extortion and data breach scenarios.Enforce MFA for all user and service accounts, especially those with access to sensitive data., Audit and monitor OAuth applications and connected apps for suspicious activity., Implement the principle of least privilege to limit access to CRM data and APIs., Regularly scan repositories (e.g., GitHub) for exposed secrets using tools like TruffleHog., Monitor for unusual data access patterns, especially in Salesforce environments., Educate employees on social engineering tactics, particularly phishing and malicious OAuth app requests., Isolate high-value systems (e.g., CRM) from less secure environments to limit lateral movement., Develop and test incident response plans for extortion and data breach scenarios.Enforce MFA for all user and service accounts, especially those with access to sensitive data., Audit and monitor OAuth applications and connected apps for suspicious activity., Implement the principle of least privilege to limit access to CRM data and APIs., Regularly scan repositories (e.g., GitHub) for exposed secrets using tools like TruffleHog., Monitor for unusual data access patterns, especially in Salesforce environments., Educate employees on social engineering tactics, particularly phishing and malicious OAuth app requests., Isolate high-value systems (e.g., CRM) from less secure environments to limit lateral movement., Develop and test incident response plans for extortion and data breach scenarios.Enforce MFA for all user and service accounts, especially those with access to sensitive data., Audit and monitor OAuth applications and connected apps for suspicious activity., Implement the principle of least privilege to limit access to CRM data and APIs., Regularly scan repositories (e.g., GitHub) for exposed secrets using tools like TruffleHog., Monitor for unusual data access patterns, especially in Salesforce environments., Educate employees on social engineering tactics, particularly phishing and malicious OAuth app requests., Isolate high-value systems (e.g., CRM) from less secure environments to limit lateral movement., Develop and test incident response plans for extortion and data breach scenarios.Enforce MFA for all user and service accounts, especially those with access to sensitive data., Audit and monitor OAuth applications and connected apps for suspicious activity., Implement the principle of least privilege to limit access to CRM data and APIs., Regularly scan repositories (e.g., GitHub) for exposed secrets using tools like TruffleHog., Monitor for unusual data access patterns, especially in Salesforce environments., Educate employees on social engineering tactics, particularly phishing and malicious OAuth app requests., Isolate high-value systems (e.g., CRM) from less secure environments to limit lateral movement., Develop and test incident response plans for extortion and data breach scenarios.Enforce MFA for all user and service accounts, especially those with access to sensitive data., Audit and monitor OAuth applications and connected apps for suspicious activity., Implement the principle of least privilege to limit access to CRM data and APIs., Regularly scan repositories (e.g., GitHub) for exposed secrets using tools like TruffleHog., Monitor for unusual data access patterns, especially in Salesforce environments., Educate employees on social engineering tactics, particularly phishing and malicious OAuth app requests., Isolate high-value systems (e.g., CRM) from less secure environments to limit lateral movement., Develop and test incident response plans for extortion and data breach scenarios.Enforce MFA for all user and service accounts, especially those with access to sensitive data., Audit and monitor OAuth applications and connected apps for suspicious activity., Implement the principle of least privilege to limit access to CRM data and APIs., Regularly scan repositories (e.g., GitHub) for exposed secrets using tools like TruffleHog., Monitor for unusual data access patterns, especially in Salesforce environments., Educate employees on social engineering tactics, particularly phishing and malicious OAuth app requests., Isolate high-value systems (e.g., CRM) from less secure environments to limit lateral movement., Develop and test incident response plans for extortion and data breach scenarios.

Recommendations: **For Salesforce/Salesloft Customers:**, - Immediately **revoke and rotate OAuth tokens** for all third-party integrations., - Enforce **multi-factor authentication (2FA) for all OAuth applications** and admin accounts., - Conduct a **full audit of third-party app permissions** in Salesforce and disable unused integrations., - Implement **network segmentation** to limit lateral movement between cloud platforms (e.g., Salesforce, Google Workspace, Okta)., - Deploy **behavioral analytics and anomaly detection** to identify suspicious access patterns., **For All Organizations:**, - **Assess third-party vendor security** with penetration testing and contractually enforce security standards., - **Train employees on social engineering tactics**, especially vishing and IT impersonation scams., - **Monitor dark web forums** for leaked credentials or mentions of your organization., - **Develop a third-party breach response plan** with legal, PR, and technical playbooks., - **Patch promptly**—unpatched software (e.g., Oracle E-Business Suite) is a common attack vector.**For Salesforce/Salesloft Customers:**, - Immediately **revoke and rotate OAuth tokens** for all third-party integrations., - Enforce **multi-factor authentication (2FA) for all OAuth applications** and admin accounts., - Conduct a **full audit of third-party app permissions** in Salesforce and disable unused integrations., - Implement **network segmentation** to limit lateral movement between cloud platforms (e.g., Salesforce, Google Workspace, Okta)., - Deploy **behavioral analytics and anomaly detection** to identify suspicious access patterns., **For All Organizations:**, - **Assess third-party vendor security** with penetration testing and contractually enforce security standards., - **Train employees on social engineering tactics**, especially vishing and IT impersonation scams., - **Monitor dark web forums** for leaked credentials or mentions of your organization., - **Develop a third-party breach response plan** with legal, PR, and technical playbooks., - **Patch promptly**—unpatched software (e.g., Oracle E-Business Suite) is a common attack vector.**For Salesforce/Salesloft Customers:**, - Immediately **revoke and rotate OAuth tokens** for all third-party integrations., - Enforce **multi-factor authentication (2FA) for all OAuth applications** and admin accounts., - Conduct a **full audit of third-party app permissions** in Salesforce and disable unused integrations., - Implement **network segmentation** to limit lateral movement between cloud platforms (e.g., Salesforce, Google Workspace, Okta)., - Deploy **behavioral analytics and anomaly detection** to identify suspicious access patterns., **For All Organizations:**, - **Assess third-party vendor security** with penetration testing and contractually enforce security standards., - **Train employees on social engineering tactics**, especially vishing and IT impersonation scams., - **Monitor dark web forums** for leaked credentials or mentions of your organization., - **Develop a third-party breach response plan** with legal, PR, and technical playbooks., - **Patch promptly**—unpatched software (e.g., Oracle E-Business Suite) is a common attack vector.**For Salesforce/Salesloft Customers:**, - Immediately **revoke and rotate OAuth tokens** for all third-party integrations., - Enforce **multi-factor authentication (2FA) for all OAuth applications** and admin accounts., - Conduct a **full audit of third-party app permissions** in Salesforce and disable unused integrations., - Implement **network segmentation** to limit lateral movement between cloud platforms (e.g., Salesforce, Google Workspace, Okta)., - Deploy **behavioral analytics and anomaly detection** to identify suspicious access patterns., **For All Organizations:**, - **Assess third-party vendor security** with penetration testing and contractually enforce security standards., - **Train employees on social engineering tactics**, especially vishing and IT impersonation scams., - **Monitor dark web forums** for leaked credentials or mentions of your organization., - **Develop a third-party breach response plan** with legal, PR, and technical playbooks., - **Patch promptly**—unpatched software (e.g., Oracle E-Business Suite) is a common attack vector.**For Salesforce/Salesloft Customers:**, - Immediately **revoke and rotate OAuth tokens** for all third-party integrations., - Enforce **multi-factor authentication (2FA) for all OAuth applications** and admin accounts., - Conduct a **full audit of third-party app permissions** in Salesforce and disable unused integrations., - Implement **network segmentation** to limit lateral movement between cloud platforms (e.g., Salesforce, Google Workspace, Okta)., - Deploy **behavioral analytics and anomaly detection** to identify suspicious access patterns., **For All Organizations:**, - **Assess third-party vendor security** with penetration testing and contractually enforce security standards., - **Train employees on social engineering tactics**, especially vishing and IT impersonation scams., - **Monitor dark web forums** for leaked credentials or mentions of your organization., - **Develop a third-party breach response plan** with legal, PR, and technical playbooks., - **Patch promptly**—unpatched software (e.g., Oracle E-Business Suite) is a common attack vector.**For Salesforce/Salesloft Customers:**, - Immediately **revoke and rotate OAuth tokens** for all third-party integrations., - Enforce **multi-factor authentication (2FA) for all OAuth applications** and admin accounts., - Conduct a **full audit of third-party app permissions** in Salesforce and disable unused integrations., - Implement **network segmentation** to limit lateral movement between cloud platforms (e.g., Salesforce, Google Workspace, Okta)., - Deploy **behavioral analytics and anomaly detection** to identify suspicious access patterns., **For All Organizations:**, - **Assess third-party vendor security** with penetration testing and contractually enforce security standards., - **Train employees on social engineering tactics**, especially vishing and IT impersonation scams., - **Monitor dark web forums** for leaked credentials or mentions of your organization., - **Develop a third-party breach response plan** with legal, PR, and technical playbooks., - **Patch promptly**—unpatched software (e.g., Oracle E-Business Suite) is a common attack vector.**For Salesforce/Salesloft Customers:**, - Immediately **revoke and rotate OAuth tokens** for all third-party integrations., - Enforce **multi-factor authentication (2FA) for all OAuth applications** and admin accounts., - Conduct a **full audit of third-party app permissions** in Salesforce and disable unused integrations., - Implement **network segmentation** to limit lateral movement between cloud platforms (e.g., Salesforce, Google Workspace, Okta)., - Deploy **behavioral analytics and anomaly detection** to identify suspicious access patterns., **For All Organizations:**, - **Assess third-party vendor security** with penetration testing and contractually enforce security standards., - **Train employees on social engineering tactics**, especially vishing and IT impersonation scams., - **Monitor dark web forums** for leaked credentials or mentions of your organization., - **Develop a third-party breach response plan** with legal, PR, and technical playbooks., - **Patch promptly**—unpatched software (e.g., Oracle E-Business Suite) is a common attack vector.**For Salesforce/Salesloft Customers:**, - Immediately **revoke and rotate OAuth tokens** for all third-party integrations., - Enforce **multi-factor authentication (2FA) for all OAuth applications** and admin accounts., - Conduct a **full audit of third-party app permissions** in Salesforce and disable unused integrations., - Implement **network segmentation** to limit lateral movement between cloud platforms (e.g., Salesforce, Google Workspace, Okta)., - Deploy **behavioral analytics and anomaly detection** to identify suspicious access patterns., **For All Organizations:**, - **Assess third-party vendor security** with penetration testing and contractually enforce security standards., - **Train employees on social engineering tactics**, especially vishing and IT impersonation scams., - **Monitor dark web forums** for leaked credentials or mentions of your organization., - **Develop a third-party breach response plan** with legal, PR, and technical playbooks., - **Patch promptly**—unpatched software (e.g., Oracle E-Business Suite) is a common attack vector.**For Salesforce/Salesloft Customers:**, - Immediately **revoke and rotate OAuth tokens** for all third-party integrations., - Enforce **multi-factor authentication (2FA) for all OAuth applications** and admin accounts., - Conduct a **full audit of third-party app permissions** in Salesforce and disable unused integrations., - Implement **network segmentation** to limit lateral movement between cloud platforms (e.g., Salesforce, Google Workspace, Okta)., - Deploy **behavioral analytics and anomaly detection** to identify suspicious access patterns., **For All Organizations:**, - **Assess third-party vendor security** with penetration testing and contractually enforce security standards., - **Train employees on social engineering tactics**, especially vishing and IT impersonation scams., - **Monitor dark web forums** for leaked credentials or mentions of your organization., - **Develop a third-party breach response plan** with legal, PR, and technical playbooks., - **Patch promptly**—unpatched software (e.g., Oracle E-Business Suite) is a common attack vector.**For Salesforce/Salesloft Customers:**, - Immediately **revoke and rotate OAuth tokens** for all third-party integrations., - Enforce **multi-factor authentication (2FA) for all OAuth applications** and admin accounts., - Conduct a **full audit of third-party app permissions** in Salesforce and disable unused integrations., - Implement **network segmentation** to limit lateral movement between cloud platforms (e.g., Salesforce, Google Workspace, Okta)., - Deploy **behavioral analytics and anomaly detection** to identify suspicious access patterns., **For All Organizations:**, - **Assess third-party vendor security** with penetration testing and contractually enforce security standards., - **Train employees on social engineering tactics**, especially vishing and IT impersonation scams., - **Monitor dark web forums** for leaked credentials or mentions of your organization., - **Develop a third-party breach response plan** with legal, PR, and technical playbooks., - **Patch promptly**—unpatched software (e.g., Oracle E-Business Suite) is a common attack vector.**For Salesforce/Salesloft Customers:**, - Immediately **revoke and rotate OAuth tokens** for all third-party integrations., - Enforce **multi-factor authentication (2FA) for all OAuth applications** and admin accounts., - Conduct a **full audit of third-party app permissions** in Salesforce and disable unused integrations., - Implement **network segmentation** to limit lateral movement between cloud platforms (e.g., Salesforce, Google Workspace, Okta)., - Deploy **behavioral analytics and anomaly detection** to identify suspicious access patterns., **For All Organizations:**, - **Assess third-party vendor security** with penetration testing and contractually enforce security standards., - **Train employees on social engineering tactics**, especially vishing and IT impersonation scams., - **Monitor dark web forums** for leaked credentials or mentions of your organization., - **Develop a third-party breach response plan** with legal, PR, and technical playbooks., - **Patch promptly**—unpatched software (e.g., Oracle E-Business Suite) is a common attack vector.**For Salesforce/Salesloft Customers:**, - Immediately **revoke and rotate OAuth tokens** for all third-party integrations., - Enforce **multi-factor authentication (2FA) for all OAuth applications** and admin accounts., - Conduct a **full audit of third-party app permissions** in Salesforce and disable unused integrations., - Implement **network segmentation** to limit lateral movement between cloud platforms (e.g., Salesforce, Google Workspace, Okta)., - Deploy **behavioral analytics and anomaly detection** to identify suspicious access patterns., **For All Organizations:**, - **Assess third-party vendor security** with penetration testing and contractually enforce security standards., - **Train employees on social engineering tactics**, especially vishing and IT impersonation scams., - **Monitor dark web forums** for leaked credentials or mentions of your organization., - **Develop a third-party breach response plan** with legal, PR, and technical playbooks., - **Patch promptly**—unpatched software (e.g., Oracle E-Business Suite) is a common attack vector.

Recommendations: Enhance OAuth application security and monitoring, Implement stricter access controls for third-party integrations, Conduct regular security awareness training for social engineering risks, Monitor for unauthorized data exfiltration in CRM environments, Review supply chain security for third-party SaaS providersEnhance OAuth application security and monitoring, Implement stricter access controls for third-party integrations, Conduct regular security awareness training for social engineering risks, Monitor for unauthorized data exfiltration in CRM environments, Review supply chain security for third-party SaaS providersEnhance OAuth application security and monitoring, Implement stricter access controls for third-party integrations, Conduct regular security awareness training for social engineering risks, Monitor for unauthorized data exfiltration in CRM environments, Review supply chain security for third-party SaaS providersEnhance OAuth application security and monitoring, Implement stricter access controls for third-party integrations, Conduct regular security awareness training for social engineering risks, Monitor for unauthorized data exfiltration in CRM environments, Review supply chain security for third-party SaaS providersEnhance OAuth application security and monitoring, Implement stricter access controls for third-party integrations, Conduct regular security awareness training for social engineering risks, Monitor for unauthorized data exfiltration in CRM environments, Review supply chain security for third-party SaaS providers

Recommendations: Implement MFA for OAuth Integrations (Salesforce), Audit Third-Party Vendor Security (Discord, Salesloft), Isolate GitLab/Sensitive Repos (Red Hat), Monitor Dark Web for Stolen Data (All Victims), Enhance Employee Training on Vishing (Salesforce Customers), Apply Zero-Day Patches Immediately (Oracle), Coordinate with Law Enforcement (FBI, INTERPOL for Cross-Border Cases)Implement MFA for OAuth Integrations (Salesforce), Audit Third-Party Vendor Security (Discord, Salesloft), Isolate GitLab/Sensitive Repos (Red Hat), Monitor Dark Web for Stolen Data (All Victims), Enhance Employee Training on Vishing (Salesforce Customers), Apply Zero-Day Patches Immediately (Oracle), Coordinate with Law Enforcement (FBI, INTERPOL for Cross-Border Cases)Implement MFA for OAuth Integrations (Salesforce), Audit Third-Party Vendor Security (Discord, Salesloft), Isolate GitLab/Sensitive Repos (Red Hat), Monitor Dark Web for Stolen Data (All Victims), Enhance Employee Training on Vishing (Salesforce Customers), Apply Zero-Day Patches Immediately (Oracle), Coordinate with Law Enforcement (FBI, INTERPOL for Cross-Border Cases)Implement MFA for OAuth Integrations (Salesforce), Audit Third-Party Vendor Security (Discord, Salesloft), Isolate GitLab/Sensitive Repos (Red Hat), Monitor Dark Web for Stolen Data (All Victims), Enhance Employee Training on Vishing (Salesforce Customers), Apply Zero-Day Patches Immediately (Oracle), Coordinate with Law Enforcement (FBI, INTERPOL for Cross-Border Cases)Implement MFA for OAuth Integrations (Salesforce), Audit Third-Party Vendor Security (Discord, Salesloft), Isolate GitLab/Sensitive Repos (Red Hat), Monitor Dark Web for Stolen Data (All Victims), Enhance Employee Training on Vishing (Salesforce Customers), Apply Zero-Day Patches Immediately (Oracle), Coordinate with Law Enforcement (FBI, INTERPOL for Cross-Border Cases)Implement MFA for OAuth Integrations (Salesforce), Audit Third-Party Vendor Security (Discord, Salesloft), Isolate GitLab/Sensitive Repos (Red Hat), Monitor Dark Web for Stolen Data (All Victims), Enhance Employee Training on Vishing (Salesforce Customers), Apply Zero-Day Patches Immediately (Oracle), Coordinate with Law Enforcement (FBI, INTERPOL for Cross-Border Cases)Implement MFA for OAuth Integrations (Salesforce), Audit Third-Party Vendor Security (Discord, Salesloft), Isolate GitLab/Sensitive Repos (Red Hat), Monitor Dark Web for Stolen Data (All Victims), Enhance Employee Training on Vishing (Salesforce Customers), Apply Zero-Day Patches Immediately (Oracle), Coordinate with Law Enforcement (FBI, INTERPOL for Cross-Border Cases)

Recommendations: Conduct third-party security audits for all integrated apps, especially those with OAuth access., Implement automated token rotation and anomaly detection for cloud environments., Enhance GitHub security with mandatory MFA, IP restrictions, and regular access reviews., Develop a unified incident response plan for supply chain attacks involving multiple vendors., Proactively communicate with customers about breach scope and mitigation steps to maintain trust.Conduct third-party security audits for all integrated apps, especially those with OAuth access., Implement automated token rotation and anomaly detection for cloud environments., Enhance GitHub security with mandatory MFA, IP restrictions, and regular access reviews., Develop a unified incident response plan for supply chain attacks involving multiple vendors., Proactively communicate with customers about breach scope and mitigation steps to maintain trust.Conduct third-party security audits for all integrated apps, especially those with OAuth access., Implement automated token rotation and anomaly detection for cloud environments., Enhance GitHub security with mandatory MFA, IP restrictions, and regular access reviews., Develop a unified incident response plan for supply chain attacks involving multiple vendors., Proactively communicate with customers about breach scope and mitigation steps to maintain trust.Conduct third-party security audits for all integrated apps, especially those with OAuth access., Implement automated token rotation and anomaly detection for cloud environments., Enhance GitHub security with mandatory MFA, IP restrictions, and regular access reviews., Develop a unified incident response plan for supply chain attacks involving multiple vendors., Proactively communicate with customers about breach scope and mitigation steps to maintain trust.Conduct third-party security audits for all integrated apps, especially those with OAuth access., Implement automated token rotation and anomaly detection for cloud environments., Enhance GitHub security with mandatory MFA, IP restrictions, and regular access reviews., Develop a unified incident response plan for supply chain attacks involving multiple vendors., Proactively communicate with customers about breach scope and mitigation steps to maintain trust.

Recommendations: Companies should proactively monitor dark web leak sites for exposed data., Enhance third-party risk management to mitigate supply chain attacks (e.g., Salesforce breaches)., Law enforcement should continue targeting cybercrime infrastructure to disrupt operations., Organizations should prepare for potential data leaks even after ransomware attacks are 'resolved.'Companies should proactively monitor dark web leak sites for exposed data., Enhance third-party risk management to mitigate supply chain attacks (e.g., Salesforce breaches)., Law enforcement should continue targeting cybercrime infrastructure to disrupt operations., Organizations should prepare for potential data leaks even after ransomware attacks are 'resolved.'Companies should proactively monitor dark web leak sites for exposed data., Enhance third-party risk management to mitigate supply chain attacks (e.g., Salesforce breaches)., Law enforcement should continue targeting cybercrime infrastructure to disrupt operations., Organizations should prepare for potential data leaks even after ransomware attacks are 'resolved.'Companies should proactively monitor dark web leak sites for exposed data., Enhance third-party risk management to mitigate supply chain attacks (e.g., Salesforce breaches)., Law enforcement should continue targeting cybercrime infrastructure to disrupt operations., Organizations should prepare for potential data leaks even after ransomware attacks are 'resolved.'

Recommendations: Monitor dark web/Telegram channels for SLH activity and zero-day exploit discussions., Enhance AI-driven phishing/vishing detection for credential harvesting campaigns., Implement zero-trust architectures to mitigate lateral movement risks in cloud/SaaS environments., Collaborate with vulnerability brokerage programs to preempt exploit proliferation., Develop counter-narrative strategies to disrupt threat actor branding and psychological operations.Monitor dark web/Telegram channels for SLH activity and zero-day exploit discussions., Enhance AI-driven phishing/vishing detection for credential harvesting campaigns., Implement zero-trust architectures to mitigate lateral movement risks in cloud/SaaS environments., Collaborate with vulnerability brokerage programs to preempt exploit proliferation., Develop counter-narrative strategies to disrupt threat actor branding and psychological operations.Monitor dark web/Telegram channels for SLH activity and zero-day exploit discussions., Enhance AI-driven phishing/vishing detection for credential harvesting campaigns., Implement zero-trust architectures to mitigate lateral movement risks in cloud/SaaS environments., Collaborate with vulnerability brokerage programs to preempt exploit proliferation., Develop counter-narrative strategies to disrupt threat actor branding and psychological operations.Monitor dark web/Telegram channels for SLH activity and zero-day exploit discussions., Enhance AI-driven phishing/vishing detection for credential harvesting campaigns., Implement zero-trust architectures to mitigate lateral movement risks in cloud/SaaS environments., Collaborate with vulnerability brokerage programs to preempt exploit proliferation., Develop counter-narrative strategies to disrupt threat actor branding and psychological operations.Monitor dark web/Telegram channels for SLH activity and zero-day exploit discussions., Enhance AI-driven phishing/vishing detection for credential harvesting campaigns., Implement zero-trust architectures to mitigate lateral movement risks in cloud/SaaS environments., Collaborate with vulnerability brokerage programs to preempt exploit proliferation., Develop counter-narrative strategies to disrupt threat actor branding and psychological operations.
Key Lessons Learned: The key lessons learned from past incidents are Non-human identities (NHIs) are persistent, high-privilege targets for attackers.,OAuth token abuse can bypass MFA, highlighting the need for stricter access controls.,Organizations often lack visibility into NHIs, increasing risk of exploitation.,Proactive measures (e.g., IP restrictions, secret scanning) are critical to mitigate NHI-based attacks.OAuth tokens and connected applications are high-value targets for attackers.,Social engineering and malicious OAuth apps can bypass traditional security controls.,Exposed secrets in repositories (e.g., GitHub) enable supply chain attacks.,Extortion groups increasingly target CRM data for its sensitivity and leverage in negotiations.,Multi-factor authentication (MFA) and least privilege principles are critical for mitigating such breaches.Third-party integrations (e.g., Salesloft Drift) introduce significant supply-chain risks; rigorous vendor security assessments are critical.,OAuth tokens and API keys must be protected with **2FA and strict access controls** to prevent abuse.,Social engineering (vishing/phishing) remains a highly effective attack vector; **employee training and verification protocols** are essential.,Lateral movement to cloud platforms (Google Workspace, Microsoft 365, Okta) underscores the need for **zero-trust architecture and segmentation**.,Proactive threat hunting and **dark web monitoring** can help detect stolen data early.,Incident response plans must include **third-party breach scenarios** with clear escalation paths.Vishing Remains Effective for OAuth Abuse (Salesforce),Third-Party Vendors Are Critical Attack Vectors (Discord, Salesloft),GitLab Server Hardening Needed (Red Hat),Zero-Day Patching Urgency (Oracle CVE-2025-61882),Extortion Groups Evolve Tactics (Victim-Shaming Blogs, Malware Threats),Cross-Group Collaboration (Scattered Spider + Lapsus$ + ShinyHunters)Third-party app integrations introduce significant risk; rigorous vetting and monitoring are critical.,OAuth token management requires stricter controls (e.g., rotation, least-privilege access).,GitHub account security is a high-value target for attackers; MFA and access logging are essential.,Public refusal to pay ransom can deter attackers but may escalate data leak risks.Cybercrime forums are vulnerable to law enforcement takedowns, especially with international cooperation.,Data backups can be compromised if stored within seized infrastructure.,High-profile data leak threats can accelerate law enforcement action.,The 'era of forums' for cybercriminals may be ending due to increased scrutiny and takedowns.Cybercriminal consolidation enhances operational resilience and technical sophistication.,Telegram’s role as both a coordination and performative marketing tool amplifies psychological impact.,Exploit brokerage and zero-day vulnerabilities are critical force multipliers for modern threat actors.,Extortion-as-a-Service (EaaS) models lower the barrier to entry for affiliate-driven attacks.,Theatrical branding and narrative control are strategic assets equivalent to technical capabilities.

Source: Google Threat Intelligence Group (GTIG) and Mandiant Advisory
Date Accessed: 2025-08-20

Source: Hackread.com (Jonathan Sander interview)
URL: https://hackread.com
Date Accessed: 2025-08-20

Source: Google Mandiant Threat Intelligence Report on UNC6040/UNC6395

Source: FBI Advisory on ShinyHunters/Scattered Spider Campaigns

Source: Salesforce Customer Advisory on Mitigation Measures

Source: ShinyHunters Telegram/Leak Site (Evidence of Breach)

Source: Media Reports on Breach (e.g., BleepingComputer, KrebsOnSecurity)

Source: Information Security Media Group (ISMG)
URL: https://www.ismg.com
Date Accessed: 2023-09-15

Source: FBI Cyber Division Advisory (UNC6040)
URL: https://www.fbi.gov
Date Accessed: 2023-09-12

Source: Google Mandiant Defensive Framework
Date Accessed: 2023-09-12

Source: Resecurity Report on 'The Com' Cybercrime Collective
URL: https://www.resecurity.com
Date Accessed: 2023-09-10

Source: The Register
URL: https://www.theregister.com/2024/09/27/salesforce_extortion_scattered_lapsus_hunters/
Date Accessed: 2024-09-27

Source: Google Threat Intelligence Group
Date Accessed: 2024-08-08

Source: BleepingComputer
URL: https://www.bleepingcomputer.com
Date Accessed: 2025-09-17T00:00:00Z

Source: Bloomberg
URL: https://www.bloomberg.com
Date Accessed: 2025-09-17T00:00:00Z

Source: KrebsOnSecurity
URL: https://krebsonsecurity.com
Date Accessed: 2025-10

Source: Google Threat Intelligence Group (GTIG)
URL: https://blog.google/threat-analysis-group/
Date Accessed: 2025-06

Source: Mandiant (Charles Carmichael LinkedIn)
URL: https://www.linkedin.com/in/charles-carmichael-mandiant
Date Accessed: 2025-10-05

Source: Red Hat Security Advisory
URL: https://access.redhat.com/security
Date Accessed: 2025-10-02

Source: US Department of Justice (Noah Urban Sentencing)
Date Accessed: 2025-08

Source: UK National Crime Agency (Scattered Spider Charges)
URL: https://www.nationalcrimeagency.gov.uk/news
Date Accessed: 2025-09

Source: Bloomberg

Source: Google Threat Intelligence Group
Date Accessed: August 2024

Source: BleepingComputer
URL: https://www.bleepingcomputer.com
Date Accessed: 2025-10-09

Source: BreachForums extortion site

Source: GBHackers (GBH)

Source: SLH Telegram Channels (e.g., 'scattered LAPSUS$ hunters 7.0')

Source: GitHub Repository (Yukari/Cvsp - BlackLotus/Medusa)
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Google Threat Intelligence Group (GTIG) and Mandiant AdvisoryDate Accessed: 2025-08-20, and Source: Astrix Security Blog PostDate Accessed: 2025-08-20, and Source: Hackread.com (Jonathan Sander interview)Url: https://hackread.comDate Accessed: 2025-08-20, and Source: Google Mandiant Threat Intelligence Report on UNC6040/UNC6395, and Source: FBI Advisory on ShinyHunters/Scattered Spider Campaigns, and Source: Salesforce Customer Advisory on Mitigation Measures, and Source: ShinyHunters Telegram/Leak Site (Evidence of Breach), and Source: Media Reports on Breach (e.g., BleepingComputer, KrebsOnSecurity), and Source: Information Security Media Group (ISMG)Url: https://www.ismg.comDate Accessed: 2023-09-15, and Source: BleepingComputerUrl: https://www.bleepingcomputer.com/news/security/shinyhunters-ransomware-group-leaks-salesforce-customer-data/Date Accessed: 2023-09-15, and Source: FBI Cyber Division Advisory (UNC6040)Url: https://www.fbi.govDate Accessed: 2023-09-12, and Source: Google Mandiant Defensive FrameworkUrl: https://www.mandiant.comDate Accessed: 2023-09-12, and Source: Resecurity Report on 'The Com' Cybercrime CollectiveUrl: https://www.resecurity.comDate Accessed: 2023-09-10, and Source: The RegisterUrl: https://www.theregister.com/2024/09/27/salesforce_extortion_scattered_lapsus_hunters/Date Accessed: 2024-09-27, and Source: Salesforce Security AdvisoryDate Accessed: 2024-09-26, and Source: Google Threat Intelligence GroupDate Accessed: 2024-08-08, and Source: Cloudflare (OAuth Abuse Report)Date Accessed: 2024-08, and Source: BleepingComputerUrl: https://www.bleepingcomputer.comDate Accessed: 2025-09-17T00:00:00Z, and Source: BloombergUrl: https://www.bloomberg.comDate Accessed: 2025-09-17T00:00:00Z, and Source: KrebsOnSecurityUrl: https://krebsonsecurity.comDate Accessed: 2025-10, and Source: Google Threat Intelligence Group (GTIG)Url: https://blog.google/threat-analysis-group/Date Accessed: 2025-06, and Source: BleepingComputerUrl: https://www.bleepingcomputer.com/news/security/oracle-rushes-patch-for-zero-day-exploited-by-clop-ransomware/Date Accessed: 2025-10, and Source: Mandiant (Charles Carmichael LinkedIn)Url: https://www.linkedin.com/in/charles-carmichael-mandiantDate Accessed: 2025-10-05, and Source: Red Hat Security AdvisoryUrl: https://access.redhat.com/securityDate Accessed: 2025-10-02, and Source: US Department of Justice (Noah Urban Sentencing)Url: https://www.justice.gov/opa/pr/florida-man-sentenced-10-years-prison-his-role-international-cybercrime-groupDate Accessed: 2025-08, and Source: UK National Crime Agency (Scattered Spider Charges)Url: https://www.nationalcrimeagency.gov.uk/newsDate Accessed: 2025-09, and Source: Bloomberg, and Source: Google Threat Intelligence GroupDate Accessed: August 2024, and Source: Mandiant (Google-owned)Date Accessed: 2024-06-01, and Source: Salesforce Public StatementDate Accessed: 2024-07-10, and Source: BleepingComputerUrl: https://www.bleepingcomputer.comDate Accessed: 2025-10-09, and Source: BreachForums extortion site, and Source: GBHackers (GBH), and Source: SLH Telegram Channels (e.g., 'scattered LAPSUS$ hunters 7.0'), and Source: GitHub Repository (Yukari/Cvsp - BlackLotus/Medusa).

Investigation Status: Ongoing (as of August 20, 2025)

Investigation Status: Ongoing (FBI and Private Sector Investigations)

Investigation Status: Ongoing (FBI, Mandiant, Salesforce, and Affected Companies)

Investigation Status: Ongoing (Salesforce, Mandiant, law enforcement)

Investigation Status: Ongoing (domain seizure suggests active law enforcement involvement)

Investigation Status: Ongoing (Law Enforcement, Forensic Analysis by Victim Companies)

Investigation Status: Ongoing (SalesLoft has not publicly responded; Salesforce supporting customers)

Investigation Status: Ongoing (Mandiant tracking as UNC6040)

Investigation Status: Ongoing (FBI and French authorities)

Investigation Status: ongoing (allegations not confirmed by Salesforce or affected companies as of report)

Investigation Status: Ongoing (as of 2025-2026)
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Advisories Issued By Gtig/Mandiant, Notifications To Affected Organizations, Public Blog Post By Astrix Security, Salesforce Customer Advisories, Fbi Public Advisory On Unc6040/6395, Public Disclosure Via Media (Ismg, Bleepingcomputer), Customer Advisories (Pending), Regulatory Notifications, Public Security Advisory, Media Statements, Public statements and customer emails, Salesforce: Customer Advisories (No Negotiation Policy), Red Hat: Public Disclosure (October 2, 2025), Discord: Direct Emails To Affected Users, Oracle: Security Advisory For Cve-2025-61882, Internal Memo (Bloomberg-Leaked), Public Statement On Non-Payment Of Ransom, Customer Advisories, Public refusal of ransom demand (email statement), Public Announcement Via Bleepingcomputer and Pgp-Signed Message From Shinyhunters On Telegram.

Stakeholder Advisories: Gtig/Mandiant Advisory, Salesforce/Salesloft Notifications To Affected Organizations.
Customer Advisories: Recommendations for credential rotation and access control hardening

Stakeholder Advisories: Salesforce Urgent Security Advisory, Fbi Private Industry Notification (Pin).
Customer Advisories: Salesforce Recommendations for Customers to Secure Environments

Stakeholder Advisories: Salesforce Security Bulletin (Pending), Vendor Notifications To Affected Customers, Regulatory Disclosures (E.G., Sec Filings For Public Companies).
Customer Advisories: Recommended: Password Resets for Affected AccountsCredit Monitoring for Exposed PIIPhishing Awareness Alerts

Stakeholder Advisories: Salesforce security advisory (2024-09-26)
Customer Advisories: Notifications sent to affected organizations (via Salesforce and Google)

Stakeholder Advisories: Salesforce emailed customers on 2025-09-17 to warn about extortion threats and refusal to pay ransom.
Customer Advisories: Customers advised of potential data leaks and encouraged to monitor for unauthorized access.

Stakeholder Advisories: Salesforce: 'Will Not Negotiate Or Pay Extortion' (October 2025), Red Hat: 'Notify Affected Customers' (October 2, 2025), Discord: 'Limited User Impact, Password Resets Advised' (September 2025).
Customer Advisories: Salesforce: Monitor for Phishing, Enable MFADiscord: Reset Passwords, Watch for Identity TheftRed Hat: Audit GitLab Access, Rotate Compromised Tokens

Stakeholder Advisories: Salesforce Internal Memo (Leaked To Bloomberg), Customer Notifications For Token Renewal.
Customer Advisories: Token renewal instructionsSupport channels for affected organizations

Customer Advisories: Companies affected by the Salesforce campaign (e.g., FedEx, Disney, Google) may need to notify customers of potential data exposure.
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Gtig/Mandiant Advisory, Salesforce/Salesloft Notifications To Affected Organizations, Recommendations For Credential Rotation And Access Control Hardening, , Salesforce Urgent Security Advisory, Fbi Private Industry Notification (Pin), Salesforce Recommendations For Customers To Secure Environments, , Salesforce Security Bulletin (Pending), Vendor Notifications To Affected Customers, Regulatory Disclosures (E.G., Sec Filings For Public Companies), Recommended: Password Resets For Affected Accounts, Credit Monitoring For Exposed Pii, Phishing Awareness Alerts, , Salesforce security advisory (2024-09-26), Notifications sent to affected organizations (via Salesforce and Google), Salesforce emailed customers on 2025-09-17 to warn about extortion threats and refusal to pay ransom., Customers advised of potential data leaks and encouraged to monitor for unauthorized access., Salesforce: 'Will Not Negotiate Or Pay Extortion' (October 2025), Red Hat: 'Notify Affected Customers' (October 2, 2025), Discord: 'Limited User Impact, Password Resets Advised' (September 2025), Salesforce: Monitor For Phishing, Enable Mfa, Discord: Reset Passwords, Watch For Identity Theft, Red Hat: Audit Gitlab Access, Rotate Compromised Tokens, , Salesforce Internal Memo (Leaked To Bloomberg), Customer Notifications For Token Renewal, Token Renewal Instructions, Support Channels For Affected Organizations, , Companies Affected By The Salesforce Campaign (E.G., Fedex, Disney, Google) May Need To Notify Customers Of Potential Data Exposure. and .

Entry Point: Compromised OAuth tokens from Salesloft Drift application
Reconnaissance Period: Likely conducted prior to August 8, 2025 (exact duration undisclosed)
High Value Targets: Aws Access Keys, Snowflake Tokens, Customer/Opportunity Data,
Data Sold on Dark Web: Aws Access Keys, Snowflake Tokens, Customer/Opportunity Data,

Entry Point: Compromised Salesloft Github Repository (Secrets Exposure), Malicious Oauth Applications (Drift/Salesforce Integration),
Reconnaissance Period: ['At Least 1 Year (Ongoing Campaigns)']
High Value Targets: Salesforce Crm Data, Aws/Snowflake Credentials In Case Records, Source Code Repositories,
Data Sold on Dark Web: Salesforce Crm Data, Aws/Snowflake Credentials In Case Records, Source Code Repositories,

Entry Point: Salesloft GitHub Repository (Stolen OAuth Tokens)
Reconnaissance Period: 2023-08-08 to 2023-08-18 (Per Google’s Threat Intelligence)
Backdoors Established: ['Persistent Access via Compromised OAuth Tokens', 'Lateral Movement to Google Workspace/Microsoft 365']
High Value Targets: Salesforce Crm Data, Customer Pii, Corporate Support Case Records,
Data Sold on Dark Web: Salesforce Crm Data, Customer Pii, Corporate Support Case Records,

Entry Point: OAuth tokens via Salesloft's Drift integration
High Value Targets: Salesforce Customer Data, Crm Environments,
Data Sold on Dark Web: Salesforce Customer Data, Crm Environments,

Entry Point: Malicious Oauth Applications, Stolen Salesloft Drift Oauth Tokens,
Reconnaissance Period: Late 2024 (first campaign), Early August 2025 (second campaign)
High Value Targets: Crm Databases, Support Tickets, Credentials/Tokens,
Data Sold on Dark Web: Crm Databases, Support Tickets, Credentials/Tokens,

Entry Point: Voice Phishing Calls (Salesforce), Compromised Third-Party Vendor (Discord), Exploited Gitlab Misconfiguration (Red Hat), Zero-Day Exploit (Oracle Cve-2025-61882), Malicious Oauth App (Salesforce),
Reconnaissance Period: Months (Salesforce Campaign Planned Since Early 2025)
Backdoors Established: ['ASYNCRAT Trojan (Targeted Security Researchers)', 'Persistent GitLab Access (Red Hat)']
High Value Targets: Fortune 500 Salesforce Data, Red Hat Customer Engagement Reports (Cers), Oracle E-Business Suite Servers, Discord Government Id Images,
Data Sold on Dark Web: Fortune 500 Salesforce Data, Red Hat Customer Engagement Reports (Cers), Oracle E-Business Suite Servers, Discord Government Id Images,

Entry Point: SalesLoft GitHub Account (Compromised March–June 2024)
Reconnaissance Period: Likely conducted prior to March 2024 (exact duration unknown)
Backdoors Established: ['Stolen OAuth Tokens (Persistent Access)']
High Value Targets: Salesforce Integrations, Drift App Aws Environment, Customer Crm Data,
Data Sold on Dark Web: Salesforce Integrations, Drift App Aws Environment, Customer Crm Data,

Entry Point: Voice Phishing (Vishing) Calls
Reconnaissance Period: Likely conducted prior to May 2024
Backdoors Established: Attacker-controlled app integrated into Salesforce portals
High Value Targets: Salesforce Customer Data,
Data Sold on Dark Web: Salesforce Customer Data,

High Value Targets: Salesforce Customer Data, Corporate Databases,
Data Sold on Dark Web: Salesforce Customer Data, Corporate Databases,

High Value Targets: Salesforce Customer Data (39 Large Corporations),
Data Sold on Dark Web: Salesforce Customer Data (39 Large Corporations),

Entry Point: Ai-Automated Vishing, Spearphishing, Credential Harvesting,
High Value Targets: Salesforce, Saas Providers, Cloud Infrastructure, Database Systems,
Data Sold on Dark Web: Salesforce, Saas Providers, Cloud Infrastructure, Database Systems,

Root Causes: Inadvertent Permissions,
Corrective Actions: Blocked Access To Orgs With Inadvertent Permissions,

Root Causes: Overprivileged Non-Human Identities (Nhis) With Persistent Access., Lack Of Visibility/Management Of Oauth Tokens And Connected Apps., Insufficient Restrictions On Connected App Scopes In Salesforce.,
Corrective Actions: Revoke And Rotate Compromised Oauth Tokens., Enforce Ip Restrictions And User-Agent Monitoring., Audit And Secure Exposed Secrets In Salesforce Environments., Implement Inventory And Governance For Nhis.,

Root Causes: Weak Oauth Token Management In Drift/Salesloft Integrations, Lack Of Mfa For High-Risk Accounts/Applications, Excessive Privileges Granted To Connected Apps, Exposed Secrets In Public/Private Repositories (Github), Inadequate Monitoring For Anomalous Oauth App Activity,
Corrective Actions: Salesforce: Enforced Mfa And Least Privilege Guidelines For Customers, Drift/Salesloft: Revoked Compromised Oauth Tokens And Audited Integrations, Affected Companies: Initiated Credential Rotation And Access Reviews, Fbi: Shared Indicators Of Compromise (Iocs) For Detection,

Root Causes: 1. **Weak Oauth Security**: Salesloft’S Github Repository Lacked Protection For Oauth Tokens, Enabling Initial Access., 2. **Third-Party Risk**: Salesloft Drift Integration Was Not Adequately Vetted For Security Vulnerabilities., 3. **Social Engineering Gaps**: Support Staff Were Tricked Into Granting Access Via Vishing/Phishing (Unc6040 Tactics)., 4. **Lack Of 2Fa**: Oauth Applications And Admin Accounts Did Not Enforce Multi-Factor Authentication., 5. **Lateral Movement Opportunities**: Poor Segmentation Allowed Attackers To Pivot To Google Workspace, Microsoft 365, And Okta.,
Corrective Actions: **Immediate:**, - Revoke All Compromised Oauth Tokens And Enforce 2Fa For New Tokens., - Isolate And Audit All Third-Party Integrations With Salesforce., - Reset Credentials For Affected Employees/Customers., **Short-Term:**, - Deploy **Behavioral Analytics** To Detect Anomalous Access Patterns., - Conduct **Phishing/Vishing Simulations** To Test Employee Awareness., - Implement **Network Segmentation** Between Cloud Platforms., **Long-Term:**, - Establish A **Third-Party Risk Management Program** With Regular Vendor Audits., - Adopt A **Zero-Trust Architecture** To Limit Lateral Movement., - Develop A **Supply-Chain Breach Playbook** For Future Incidents.,

Root Causes: Oauth Token Misuse, Third-Party Integration Vulnerabilities (Drift), Potential Insider Threats Or Credential Theft,

Root Causes: Insufficient Oauth Application Security, Lack Of Monitoring For Anomalous Data Access, Supply Chain Vulnerability (Salesloft Drift Tokens), Successful Social Engineering Attacks,

Root Causes: Lack Of Mfa On Salesforce Oauth Integrations, Insufficient Third-Party Vendor Security (Discord), Gitlab Server Misconfiguration (Red Hat), Delayed Patching (Oracle Cve-2025-61882), Social Engineering Susceptibility (Vishing Success),
Corrective Actions: Salesforce: Stricter Oauth App Review Process, Discord: Vendor Security Audits, Red Hat: Gitlab Hardening, Token Rotation, Oracle: Emergency Patch Deployment, Cross-Industry: Shared Threat Intelligence On Shinyhunters Tactics,

Root Causes: Inadequate Security Controls For Salesloft’S Github Account (E.G., Lack Of Mfa, Monitoring)., Overprivileged Oauth Tokens With Prolonged Validity., Lack Of Segmentation Between Drift App And Salesforce Customer Environments., Delayed Detection Of Github Account Compromise (March–June 2024).,
Corrective Actions: Salesforce Disabled Drift App And Mandated Token Renewal., Salesloft Likely Reviewing Github Security And Token Management (Unconfirmed)., Affected Customers Advised To Rotate Credentials And Audit Integrations.,

Root Causes: Human Error (Compliance With Fraudulent Calls), Lack Of Multi-Factor Authentication For App Integrations,

Root Causes: Centralized Infrastructure (Breachforums) Created A Single Point Of Failure For Cybercriminal Operations., Underestimation Of Law Enforcement'S Ability To Seize Backups And Escrow Databases., Over-Reliance On Forum-Based Models For Data Extortion Campaigns.,
Corrective Actions: Shinyhunters Declared No Further Reboots Of Breachforums, Suggesting A Shift To Decentralized Or Darker Web-Only Operations., Increased Caution Among Cybercriminals Regarding Forum-Based Activities (Perceived As 'Honeypots')., Potential Migration Of Data Leak Operations To More Secure, Less Detectable Platforms.,

Root Causes: Exploitation Of Zero-Day Vulnerabilities (E.G., Cve-2025-61882)., Lack Of Adaptive Defenses Against Ai-Driven Social Engineering., Fragmented Cybercriminal Ecosystems Enabling Consolidation (E.G., Post-Breachforums Vacuum)., Over-Reliance On Traditional Perimeter Security In Cloud/Saas Environments.,
Corrective Actions: Proactive Zero-Day Patch Management And Exploit Mitigation., Behavioral Analytics For Credential-Based Attacks., Dark Web Monitoring For Emerging Threat Actor Alliances., Cross-Sector Collaboration To Disrupt Eaas Models.,
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Google Threat Intelligence Group (Gtig), Mandiant, Astrix Security, , Checking For Specific Ip Addresses/User-Agent Strings Linked To Attackers, , Google Mandiant (Threat Intelligence), Fbi (Advisory & Investigation), , Mandiant (Google’S Incident Response), Salesforce Security Team, Fbi Cyber Division, , Salesforce Instance Logs, Cloud Platform (Google Workspace, Microsoft 365, Okta) Activity, , Mandiant (Google), External Cybersecurity Experts, , Google Threat Intelligence Group (Gtig), Mandiant (Malware Analysis), Law Enforcement (Fbi, Uk Nca), , Salesforce: Increased Logging For Oauth Integrations, Red Hat: Gitlab Access Audits, , Google Threat Intelligence Group (Warnings), , Likely (Implied By Google Threat Intelligence Collaboration), , Mandiant (Google-Owned Threat Intelligence), , French Law Enforcement (Bl2C Unit), .
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Blocked Access To Orgs With Inadvertent Permissions, , Revoke And Rotate Compromised Oauth Tokens., Enforce Ip Restrictions And User-Agent Monitoring., Audit And Secure Exposed Secrets In Salesforce Environments., Implement Inventory And Governance For Nhis., , Salesforce: Enforced Mfa And Least Privilege Guidelines For Customers, Drift/Salesloft: Revoked Compromised Oauth Tokens And Audited Integrations, Affected Companies: Initiated Credential Rotation And Access Reviews, Fbi: Shared Indicators Of Compromise (Iocs) For Detection, , **Immediate:**, - Revoke All Compromised Oauth Tokens And Enforce 2Fa For New Tokens., - Isolate And Audit All Third-Party Integrations With Salesforce., - Reset Credentials For Affected Employees/Customers., **Short-Term:**, - Deploy **Behavioral Analytics** To Detect Anomalous Access Patterns., - Conduct **Phishing/Vishing Simulations** To Test Employee Awareness., - Implement **Network Segmentation** Between Cloud Platforms., **Long-Term:**, - Establish A **Third-Party Risk Management Program** With Regular Vendor Audits., - Adopt A **Zero-Trust Architecture** To Limit Lateral Movement., - Develop A **Supply-Chain Breach Playbook** For Future Incidents., , Salesforce: Stricter Oauth App Review Process, Discord: Vendor Security Audits, Red Hat: Gitlab Hardening, Token Rotation, Oracle: Emergency Patch Deployment, Cross-Industry: Shared Threat Intelligence On Shinyhunters Tactics, , Salesforce Disabled Drift App And Mandated Token Renewal., Salesloft Likely Reviewing Github Security And Token Management (Unconfirmed)., Affected Customers Advised To Rotate Credentials And Audit Integrations., , Shinyhunters Declared No Further Reboots Of Breachforums, Suggesting A Shift To Decentralized Or Darker Web-Only Operations., Increased Caution Among Cybercriminals Regarding Forum-Based Activities (Perceived As 'Honeypots')., Potential Migration Of Data Leak Operations To More Secure, Less Detectable Platforms., , Proactive Zero-Day Patch Management And Exploit Mitigation., Behavioral Analytics For Credential-Based Attacks., Dark Web Monitoring For Emerging Threat Actor Alliances., Cross-Sector Collaboration To Disrupt Eaas Models., .
Ransom Payment History: The company has Paid ransoms in the past.
Last Ransom Demanded: The amount of the last ransom demanded was ['Extortion Threats (No Specific Ransom Amount Disclosed)'].
Last Attacking Group: The attacking group in the last incident were an UNC6395, ShinyHuntersScattered SpiderLapsus$UNC6040 (Google Mandiant)UNC6395 (Google Mandiant)Scattered Lapsus$ Hunters, Scattered Lapsus$ Hunters (aka ShinyHunters)UNC6040The Com (English-speaking cybercrime collective), Scattered LAPSUS$ Hunters (SLH)Scattered SpiderShinyHuntersLapsus$, Scattered Lapsus$ HuntersShinyHunters, Name: ShinyHunters (UNC6040)Aliases: Scattered LAPSUS$ Hunters, Aliases: UNC6240, Aliases: UNC6395, Affiliation: Scattered Spider, Affiliation: Lapsus$, Affiliation: The Com (Cybercriminal Community), Nationality: English-speaking (Multinational)Name: Crimson CollectiveRole: Claimed Responsibility for Red Hat BreachName: Clop Ransomware GangRole: Exploited CVE-2025-61882 Prior to Public Disclosure, ShinyHunters, Scattered LAPSUS$ HuntersUNC6040 (Mandiant designation), ShinyHuntersScattered Lapsus$ Hunters, ShinyHuntersScattered SpiderLAPSUS$Scattered Lapsus$ Hunters, Name: Scattered LAPSUS$ Hunters (SLH)Aliases: SLH, Aliases: scattered LAPSUS$ hunters 7.0, Affiliated Groups: Scattered Spider, Affiliated Groups: ShinyHunters, Affiliated Groups: LAPSUS$, Affiliated Groups: The Com, Alias: shinycorp, Handles: ['@sp1d3rhunters', '@shinyc0rp'], Role: Principal Orchestrator, Alias: yuka, Handles: None, Role: Exploit Developer, Associated Malware: ['BlackLotus UEFI bootkit', 'Medusa rootkit'], Alias: Alg0d, Handles: None, Role: Auxiliary Operator, Alias: UNC5537, Handles: None, Role: Auxiliary Operator, Operational Model: Extortion-as-a-Service (EaaS), Operational Model: Crowdsourced Extortion, Operational Model: Vulnerability Brokerage and .
Most Recent Incident Detected: The most recent incident detected was on 2025-08-18.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2025-08-08.
Most Recent Incident Resolved: The most recent incident resolved was on 2025-08-20.
Most Significant Data Compromised: The most significant data compromised in an incident were Customer account data, User data, Opportunities data, AWS access keys, Snowflake tokens, High-value secrets, Salesforce Account: 250 million records, Salesforce Contact: 579 million records, Salesforce Opportunity: 171 million records, Salesforce User: 60 million records, Salesforce Case: 459 million records, Total: 1.5 billion records, , Salesforce Account: 250 million records, Salesforce Contact: 579 million records, Salesforce Opportunity: 171 million records, Salesforce User: 60 million records, Salesforce Case: 459 million records, Total: 1.5 billion records, , Personally Identifiable Information (PII), Shipping Information, Marketing Lead Data, Customer Support Case Records, Chat Transcripts, Flight Details, Car Ownership Records, Employment Histories, Passport Numbers, Full Contact Information, , 1 billion records (claimed by threat actors), Customer Data, Support Tickets, Credentials, API Tokens, Authentication Tokens, , Salesforce Customer Records (>1B), Discord User Data (Usernames, Emails, IP Addresses, Payment Card Last 4 Digits, Government IDs), Red Hat GitLab Repositories (28,000+ Repos, 5,000+ Customer Engagement Reports, API Tokens, Infrastructure Details), Oracle E-Business Suite Data (Via CVE-2025-61882), Salesloft Authentication Tokens (Cloud Services: Snowflake, AWS), , Customer Contact Details, IT Support Information, Access Tokens, IT Configurations, CRM Fields, Support Cases, Integration Data, , ~1 billion records, Corporate Data, Customer Records (1+ billion), Escrow Databases, Database Backups (since 2023), , one billion records (alleged), Potential CRM/SaaS/Database Records (Salesforce and other high-value enterprises) and .
Most Significant System Affected: The most significant system affected in an incident were Customer Instances and Salesforce corporate accountsSalesloft Drift application and Salesforce CRMDrift AI Chat/Email ServicesSalesloft PlatformGitHub Repository (Salesloft)Connected Applications (AWS, Snowflake, etc.) and Salesforce CRM InstancesSalesloft Drift AI ChatbotGoogle WorkspaceMicrosoft 365Okta PlatformsGitHub Repository (Salesloft) and Salesforce environments of ~40 companiesCustomer data via OAuth abuse and Salesforce CRM InstancesSalesLoft Drift Environments and Salesforce Instances (Multiple Fortune 500 Companies)Discord Third-Party Customer Service ProviderRed Hat GitLab ServerOracle E-Business Suite ServersSalesloft AI Chatbot Platform and SalesLoft Drift AppSalesforce IntegrationsDrift’s AWS EnvironmentGitHub Account (SalesLoft) and Salesforce Customer Portals and BreachForums DomainsBackend ServersDatabase Backups and Cloud InfrastructureSaaS Platforms (e.g., Salesforce)Database Systems.
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was google threat intelligence group (gtig), mandiant, astrix security, , google mandiant (threat intelligence), fbi (advisory & investigation), , mandiant (google’s incident response), salesforce security team, fbi cyber division, , mandiant (google), external cybersecurity experts, , google threat intelligence group (gtig), mandiant (malware analysis), law enforcement (fbi, uk nca), , google threat intelligence group (warnings), , mandiant (google-owned threat intelligence), , french law enforcement (bl2c unit), .
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident were Blocked access to affected instances, Revoked all active access tokens for Drift app (August 20, 2025)Temporarily removed Drift from Salesforce AppExchange, Revoking Compromised OAuth TokensIsolating Affected Salesforce InstancesDisabling Salesloft Drift Integrations, Salesforce: Disabled Malicious OAuth AppsRed Hat: Isolated Compromised GitLab ServerDiscord: Terminated Third-Party Vendor AccessOracle: Emergency Patch for CVE-2025-61882, Disabled Drift App IntegrationToken Renewal Mandate for Customers and Domain SeizureBackend Server SeizureNameserver Redirection to FBI.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Snowflake tokens, Authentication Tokens, Red Hat GitLab Repositories (28,000+ Repos, 5,000+ Customer Engagement Reports, API Tokens, Infrastructure Details), Full Contact Information, Potential CRM/SaaS/Database Records (Salesforce and other high-value enterprises), Integration Data, Chat Transcripts, IT Configurations, Shipping Information, Escrow Databases, Employment Histories, Database Backups (since 2023), Marketing Lead Data, Customer Records (1+ billion), Oracle E-Business Suite Data (Via CVE-2025-61882), AWS access keys, IT Support Information, User data, ~1 billion records, Flight Details, Access Tokens, Support Cases, Corporate Data, 1 billion records (claimed by threat actors), Salesforce Customer Records (>1B), CRM Fields, Passport Numbers, Customer Support Case Records, Customer Contact Details, High-value secrets, one billion records (alleged), API Tokens, Support Tickets, Customer account data, Salesloft Authentication Tokens (Cloud Services: Snowflake, AWS), Credentials, Discord User Data (Usernames, Emails, IP Addresses, Payment Card Last 4 Digits, Government IDs), Car Ownership Records, Customer Data, Personally Identifiable Information (PII) and Opportunities data.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 8.5B.
Highest Ransom Demanded: The highest ransom demanded in a ransomware incident was unspecified (threatened leak if unpaid by October 10, 2023, 11:59 p.m. EST).
Most Significant Legal Action: The most significant legal action taken for a regulatory violation was Pending (Potential Class-Action Lawsuits), Regulatory Investigations, , Arrests of UK teens (Scattered Spider members), Ongoing investigations, , UK Charges Against Scattered Spider Members (September 2025), US Charges Against Thalha Jubair (MGM, Caesars, Harrods Attacks), Extradition of Tyler Buchanan (Spain to US, April 2025), Noah Urban Sentencing (10 Years, August 2025), , Arrests of BreachForums Admins (France), Charges Against Kai West ('IntelBroker') in U.S., .
Most Significant Lesson Learned: The most significant lesson learned from past incidents was Theatrical branding and narrative control are strategic assets equivalent to technical capabilities.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Creating an inventory of non-human identities (NHIs) to improve visibility and security., Monitor for unauthorized data exfiltration in CRM environments, Monitor dark web/Telegram channels for SLH activity and zero-day exploit discussions., Enhance third-party risk management to mitigate supply chain attacks (e.g., Salesforce breaches)., Enhance Employee Training on Vishing (Salesforce Customers), Develop and test incident response plans for extortion and data breach scenarios., Monitoring for suspicious IP addresses/User-Agent strings associated with attackers., - **Train employees on social engineering tactics**, especially vishing and IT impersonation scams., Develop counter-narrative strategies to disrupt threat actor branding and psychological operations., Hardening access controls by restricting Connected App scopes in Salesforce., Educate employees on social engineering tactics, particularly phishing and malicious OAuth app requests., Regularly scan repositories (e.g., GitHub) for exposed secrets using tools like TruffleHog., - **Patch promptly**—unpatched software (e.g., Oracle E-Business Suite) is a common attack vector., Enforce MFA for all user and service accounts, especially those with access to sensitive data., **For Salesforce/Salesloft Customers:**, - **Monitor dark web forums** for leaked credentials or mentions of your organization., Develop a unified incident response plan for supply chain attacks involving multiple vendors., Law enforcement should continue targeting cybercrime infrastructure to disrupt operations., Rotating compromised credentials and enforcing least-privilege access for NHIs., - Deploy **behavioral analytics and anomaly detection** to identify suspicious access patterns., Audit Third-Party Vendor Security (Discord, Salesloft), Conduct regular security awareness training for social engineering risks, Implement stricter access controls for third-party integrations, Collaborate with vulnerability brokerage programs to preempt exploit proliferation., Implementing IP restrictions to limit access to trusted locations., Audit and monitor OAuth applications and connected apps for suspicious activity., Conducting audits to identify and secure exposed secrets within Salesforce data., **For All Organizations:**, Monitor Dark Web for Stolen Data (All Victims), - Enforce **multi-factor authentication (2FA) for all OAuth applications** and admin accounts., Companies should proactively monitor dark web leak sites for exposed data., - Implement **network segmentation** to limit lateral movement between cloud platforms (e.g., Salesforce, Google Workspace, Okta)., Implement MFA for OAuth Integrations (Salesforce), Apply Zero-Day Patches Immediately (Oracle), Monitor for unusual data access patterns, especially in Salesforce environments., Isolate GitLab/Sensitive Repos (Red Hat), Enhance AI-driven phishing/vishing detection for credential harvesting campaigns., Enhance GitHub security with mandatory MFA, IP restrictions, and regular access reviews., - Immediately **revoke and rotate OAuth tokens** for all third-party integrations., - **Develop a third-party breach response plan** with legal, PR, and technical playbooks., Proactively communicate with customers about breach scope and mitigation steps to maintain trust., Isolate high-value systems (e.g., CRM) from less secure environments to limit lateral movement., Implement automated token rotation and anomaly detection for cloud environments., Review supply chain security for third-party SaaS providers, Organizations should prepare for potential data leaks even after ransomware attacks are 'resolved.', Coordinate with Law Enforcement (FBI, INTERPOL for Cross-Border Cases), Implement the principle of least privilege to limit access to CRM data and APIs., Implement zero-trust architectures to mitigate lateral movement risks in cloud/SaaS environments., - **Assess third-party vendor security** with penetration testing and contractually enforce security standards., Enhance OAuth application security and monitoring, - Conduct a **full audit of third-party app permissions** in Salesforce and disable unused integrations., Conduct third-party security audits for all integrated apps and especially those with OAuth access..
Most Recent Source: The most recent source of information about an incident are BleepingComputer, Astrix Security Blog Post, Hackread.com (Jonathan Sander interview), Salesforce Public Statement, KrebsOnSecurity, Bloomberg, Mandiant (Charles Carmichael LinkedIn), Google Mandiant Threat Intelligence Report on UNC6040/UNC6395, SLH Telegram Channels (e.g., 'scattered LAPSUS$ hunters 7.0'), GBHackers (GBH), Google Mandiant Defensive Framework, Mandiant (Google-owned), Media Reports on Breach (e.g., BleepingComputer, KrebsOnSecurity), Google Threat Intelligence Group (GTIG), US Department of Justice (Noah Urban Sentencing), BreachForums extortion site, GitHub Repository (Yukari/Cvsp - BlackLotus/Medusa), Resecurity Report on 'The Com' Cybercrime Collective, Red Hat Security Advisory, Google Threat Intelligence Group, FBI Cyber Division Advisory (UNC6040), Salesforce Security Advisory, FBI Advisory on ShinyHunters/Scattered Spider Campaigns, Salesforce Customer Advisory on Mitigation Measures, The Register, UK National Crime Agency (Scattered Spider Charges), Google Threat Intelligence Group (GTIG) and Mandiant Advisory, ShinyHunters Telegram/Leak Site (Evidence of Breach), Cloudflare (OAuth Abuse Report) and Information Security Media Group (ISMG).
Most Recent URL for Additional Resources: The most recent URL for additional resources on cybersecurity best practices is https://hackread.com, https://www.ismg.com, https://www.bleepingcomputer.com/news/security/shinyhunters-ransomware-group-leaks-salesforce-customer-data/, https://www.fbi.gov, https://www.mandiant.com, https://www.resecurity.com, https://www.theregister.com/2024/09/27/salesforce_extortion_scattered_lapsus_hunters/, https://www.bleepingcomputer.com, https://www.bloomberg.com, https://krebsonsecurity.com, https://blog.google/threat-analysis-group/, https://www.bleepingcomputer.com/news/security/oracle-rushes-patch-for-zero-day-exploited-by-clop-ransomware/, https://www.linkedin.com/in/charles-carmichael-mandiant, https://access.redhat.com/security, https://www.justice.gov/opa/pr/florida-man-sentenced-10-years-prison-his-role-international-cybercrime-group, https://www.nationalcrimeagency.gov.uk/news, https://www.bleepingcomputer.com .
Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing (as of August 20, 2025).
Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was GTIG/Mandiant advisory, Salesforce/Salesloft notifications to affected organizations, Salesforce Urgent Security Advisory, FBI Private Industry Notification (PIN), Salesforce Security Bulletin (Pending), Vendor Notifications to Affected Customers, Regulatory Disclosures (e.g., SEC Filings for Public Companies), Salesforce security advisory (2024-09-26), Salesforce emailed customers on 2025-09-17 to warn about extortion threats and refusal to pay ransom., Salesforce: 'Will Not Negotiate or Pay Extortion' (October 2025), Red Hat: 'Notify Affected Customers' (October 2, 2025), Discord: 'Limited User Impact, Password Resets Advised' (September 2025), Salesforce internal memo (leaked to Bloomberg), Customer notifications for token renewal, .
Most Recent Customer Advisory: The most recent customer advisory issued were an Recommendations for credential rotation and access control hardening, Salesforce Recommendations for Customers to Secure Environments, Recommended: Password Resets for Affected AccountsCredit Monitoring for Exposed PIIPhishing Awareness Alerts, Notifications sent to affected organizations (via Salesforce and Google), Customers advised of potential data leaks and encouraged to monitor for unauthorized access., Salesforce: Monitor for Phishing, Enable MFADiscord: Reset Passwords, Watch for Identity TheftRed Hat: Audit GitLab Access, Rotate Compromised Tokens, Token renewal instructionsSupport channels for affected organizations, Companies affected by the Salesforce campaign (e.g., FedEx, Disney and Google) may need to notify customers of potential data exposure.
Most Recent Entry Point: The most recent entry point used by an initial access broker were an SalesLoft GitHub Account (Compromised March–June 2024), Voice Phishing (Vishing) Calls, Salesloft GitHub Repository (Stolen OAuth Tokens), OAuth tokens via Salesloft's Drift integration and Compromised OAuth tokens from Salesloft Drift application.
Most Recent Reconnaissance Period: The most recent reconnaissance period for an incident was Likely conducted prior to August 8, 2025 (exact duration undisclosed), At Least 1 Year (Ongoing Campaigns), 2023-08-08 to 2023-08-18 (Per Google’s Threat Intelligence), Late 2024 (first campaign), Early August 2025 (second campaign), Months (Salesforce Campaign Planned Since Early 2025), Likely conducted prior to March 2024 (exact duration unknown), Likely conducted prior to May 2024.
Most Significant Root Cause: The most significant root cause identified in post-incident analysis was Inadvertent Permissions, Overprivileged non-human identities (NHIs) with persistent access.Lack of visibility/management of OAuth tokens and connected apps.Insufficient restrictions on Connected App scopes in Salesforce., Weak OAuth Token Management in Drift/Salesloft IntegrationsLack of MFA for High-Risk Accounts/ApplicationsExcessive Privileges Granted to Connected AppsExposed Secrets in Public/Private Repositories (GitHub)Inadequate Monitoring for Anomalous OAuth App Activity, 1. **Weak OAuth Security**: Salesloft’s GitHub repository lacked protection for OAuth tokens, enabling initial access.2. **Third-Party Risk**: Salesloft Drift integration was not adequately vetted for security vulnerabilities.3. **Social Engineering Gaps**: Support staff were tricked into granting access via vishing/phishing (UNC6040 tactics).4. **Lack of 2FA**: OAuth applications and admin accounts did not enforce multi-factor authentication.5. **Lateral Movement Opportunities**: Poor segmentation allowed attackers to pivot to Google Workspace, Microsoft 365, and Okta., OAuth token misuseThird-party integration vulnerabilities (Drift)Potential insider threats or credential theft, Insufficient OAuth application securityLack of monitoring for anomalous data accessSupply chain vulnerability (SalesLoft Drift tokens)Successful social engineering attacks, Lack of MFA on Salesforce OAuth IntegrationsInsufficient Third-Party Vendor Security (Discord)GitLab Server Misconfiguration (Red Hat)Delayed Patching (Oracle CVE-2025-61882)Social Engineering Susceptibility (Vishing Success), Inadequate security controls for SalesLoft’s GitHub account (e.g., lack of MFA, monitoring).Overprivileged OAuth tokens with prolonged validity.Lack of segmentation between Drift app and Salesforce customer environments.Delayed detection of GitHub account compromise (March–June 2024)., Human Error (Compliance with Fraudulent Calls)Lack of Multi-Factor Authentication for App Integrations, Centralized infrastructure (BreachForums) created a single point of failure for cybercriminal operations.Underestimation of law enforcement's ability to seize backups and escrow databases.Over-reliance on forum-based models for data extortion campaigns., Exploitation of zero-day vulnerabilities (e.g., CVE-2025-61882).Lack of adaptive defenses against AI-driven social engineering.Fragmented cybercriminal ecosystems enabling consolidation (e.g., post-BreachForums vacuum).Over-reliance on traditional perimeter security in cloud/SaaS environments..
Most Significant Corrective Action: The most significant corrective action taken based on post-incident analysis was Blocked access to orgs with inadvertent permissions, Revoke and rotate compromised OAuth tokens.Enforce IP restrictions and User-Agent monitoring.Audit and secure exposed secrets in Salesforce environments.Implement inventory and governance for NHIs., Salesforce: Enforced MFA and Least Privilege Guidelines for CustomersDrift/Salesloft: Revoked Compromised OAuth Tokens and Audited IntegrationsAffected Companies: Initiated Credential Rotation and Access ReviewsFBI: Shared Indicators of Compromise (IOCs) for Detection, **Immediate:**- Revoke all compromised OAuth tokens and enforce 2FA for new tokens.- Isolate and audit all third-party integrations with Salesforce.- Reset credentials for affected employees/customers.**Short-Term:**- Deploy **behavioral analytics** to detect anomalous access patterns.- Conduct **phishing/vishing simulations** to test employee awareness.- Implement **network segmentation** between cloud platforms.**Long-Term:**- Establish a **third-party risk management program** with regular vendor audits.- Adopt a **zero-trust architecture** to limit lateral movement.- Develop a **supply-chain breach playbook** for future incidents., Salesforce: Stricter OAuth App Review ProcessDiscord: Vendor Security AuditsRed Hat: GitLab Hardening, Token RotationOracle: Emergency Patch DeploymentCross-Industry: Shared Threat Intelligence on ShinyHunters Tactics, Salesforce disabled Drift app and mandated token renewal.SalesLoft likely reviewing GitHub security and token management (unconfirmed).Affected customers advised to rotate credentials and audit integrations., ShinyHunters declared no further reboots of BreachForums, suggesting a shift to decentralized or darker web-only operations.Increased caution among cybercriminals regarding forum-based activities (perceived as 'honeypots').Potential migration of data leak operations to more secure, less detectable platforms., Proactive zero-day patch management and exploit mitigation.Behavioral analytics for credential-based attacks.Dark web monitoring for emerging threat actor alliances.Cross-sector collaboration to disrupt EaaS models..
.png)
FreePBX Endpoint Manager is a module for managing telephony endpoints in FreePBX systems. Versions prior to 16.0.96 and 17.0.1 through 17.0.9 have a weak default password. By default, this is a 6 digit numeric value which can be brute forced. (This is the app_password parameter). Depending on local configuration, this password could be the extension, voicemail, user manager, DPMA or EPM phone admin password. This issue is fixed in versions 16.0.96 and 17.0.10.
Neuron is a PHP framework for creating and orchestrating AI Agents. In versions 2.8.11 and below, the MySQLWriteTool executes arbitrary SQL provided by the caller using PDO::prepare() + execute() without semantic restrictions. This is consistent with the name (“write tool”), but in an LLM/agent context it becomes a high-risk capability: prompt injection or indirect prompt manipulation can cause execution of destructive queries such as DROP TABLE, TRUNCATE, DELETE, ALTER, or privilege-related statements (subject to DB permissions). Deployments that expose an agent with MySQLWriteTool enabled to untrusted input and/or run the tool with a DB user that has broad privileges are impacted. This issue is fixed in version 2.8.12.
Neuron is a PHP framework for creating and orchestrating AI Agents. Versions 2.8.11 and below use MySQLSelectTool, which is vulnerable to Read-Only Bypass. MySQLSelectTool is intended to be a read-only SQL tool (e.g., for LLM agent querying, however, validation based on the first keyword (e.g., SELECT) and a forbidden-keyword list does not block file-writing constructs such as INTO OUTFILE / INTO DUMPFILE. As a result, an attacker who can influence the tool input (e.g., via prompt injection through a public agent endpoint) may write arbitrary files to the DB server if the MySQL/MariaDB account has the FILE privilege and server configuration permits writes to a useful location (e.g., a web-accessible directory). This issue is fixed in version 2.8.12.
Okta Java Management SDK facilitates interactions with the Okta management API. In versions 11.0.0 through 20.0.0, race conditions may arise from concurrent requests using the ApiClient class. This could cause a status code or response header from one request’s response to influence another request’s response. This issue is fixed in version 20.0.1.
The Auth0 Next.js SDK is a library for implementing user authentication in Next.js applications. When using versions 4.11.0 through 4.11.2 and 4.12.0, simultaneous requests on the same client may result in improper lookups in the TokenRequestCache for the request results. This issue is fixed in versions 4.11.2 and 4.12.1.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.
