Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Google Discloses Data Breach via Salesforce Hack 

Google Discloses Data Breach via Salesforce Hack 

Posted on August 6, 2025August 6, 2025 By CWS

Google revealed on Tuesday that one among its company Salesforce cases was focused by risk actors. The assault seems to be a part of a marketing campaign that has hit a number of main firms.

The tech big mentioned its Salesforce occasion was focused in June and attributed the exercise to a risk group tracked as UNC6040.

Google mentioned the hackers obtained contact info and associated notes for small and medium companies from the compromised atmosphere. 

“Evaluation revealed that knowledge was retrieved by the risk actor throughout a small window of time earlier than the entry was reduce off,” Google defined. “The information retrieved by the risk actor was confined to fundamental and largely publicly out there enterprise info, resembling enterprise names and call particulars.”

Google warned in early June that UNC6040, a risk actor specializing in voice phishing, had focused Salesforce prospects in a large-scale knowledge theft and extortion marketing campaign. 

Google reported on the time that it had discovered hyperlinks to the infamous cybercrime teams Scattered Spider and ShinyHunters. The assault by itself Salesforce occasion was disclosed in an replace to the weblog put up describing the UNC6040 assaults, and the corporate has now reiterated the obvious hyperlink to ShinyHunters.

In response to the tech big, UNC6040 is liable for the preliminary intrusion, whereas a special exercise cluster, tracked as UNC6240, is liable for extortion makes an attempt, which typically are initiated months after the preliminary knowledge theft.

“The extortion includes calls or emails to workers of the sufferer group demanding cost in bitcoin inside 72 hours. Throughout these communications, UNC6240 has persistently claimed to be the risk group ShinyHunters,” Google mentioned.Commercial. Scroll to proceed studying.

“As well as, we imagine risk actors utilizing the ‘ShinyHunters’ model could also be making ready to escalate their extortion ways by launching a knowledge leak website (DLS). These new ways are possible meant to extend strain on victims, together with these related to the latest UNC6040 Salesforce-related knowledge breaches,” it added.

Bleeping Laptop reported — primarily based on info from ShinyHunters — that the latest knowledge breaches disclosed by Adidas, Allianz Life, Cisco, Dior, Louis Vuitton and others are the results of the identical Salesforce hacking marketing campaign. 

Jewellery retailer Pandora additionally disclosed a knowledge breach this week and the corporate was reportedly a goal of the identical marketing campaign. 

Salesforce identified that its methods haven’t been compromised and the assaults don’t exploit any vulnerability in its platform. The corporate steered that the latest assaults are the results of subtle phishing and different social engineering assaults concentrating on its prospects.

DataBreaches reported not too long ago that ShinyHunters seems to have merged with Scattered Spider.

A number of alleged members of each ShinyHunters and Scattered Spider have been arrested over the previous 12 months. 

Associated: Over 1 Million Impacted by DaVita Knowledge Breach

Associated: NASCAR Confirms Private Data Stolen in Ransomware Assault

Security Week News Tags:Breach, Data, Discloses, Google, Hack, Salesforce

Post navigation

Previous Post: PLoB: A Behavioral Fingerprinting Framework to Hunt for Malicious Logins
Next Post: Lazarus Hackers Trick Users Into Believing Their Camera or Microphone is Blocked to Deliver PyLangGhost RAT

Related Posts

Hackers Start Exploiting Critical Cisco ISE Vulnerabilities Hackers Start Exploiting Critical Cisco ISE Vulnerabilities Security Week News
Automotive Titan Stellantis Discloses Data Breach Automotive Titan Stellantis Discloses Data Breach Security Week News
F5 Hack: Attack Linked to China, BIG-IP Flaws Patched, Governments Issue Alerts  F5 Hack: Attack Linked to China, BIG-IP Flaws Patched, Governments Issue Alerts  Security Week News
Critical Flaw in MS-Agent AI Poses Security Risks Critical Flaw in MS-Agent AI Poses Security Risks Security Week News
AI Tools Exploited in Major Mexican Government Cyber Breach AI Tools Exploited in Major Mexican Government Cyber Breach Security Week News
Clorox Sues Cognizant for 0 Million Over 2023 Hack Clorox Sues Cognizant for $380 Million Over 2023 Hack Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark