Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Google Confirms Data Breach – Notifying Users Affected By the Cyberattack

Google Confirms Data Breach – Notifying Users Affected By the Cyberattack

Posted on August 10, 2025August 10, 2025 By CWS

Tech large Google has formally acknowledged a major knowledge breach affecting its company Salesforce database, with the corporate finishing e-mail notifications to affected customers as of August 8, 2025.

Google revealed on August 5 that one in every of its company Salesforce situations was compromised in June 2025 by the infamous cybercriminal group referred to as ShinyHunters, formally tracked as UNC6040 by the Google Menace Intelligence Group.

The breach uncovered contact data and associated notes for small and medium companies saved in Google’s buyer relationship administration system.

The cyberattack was orchestrated via refined voice phishing (vishing) methods, the place risk actors impersonated IT help personnel to deceive Google workers into granting system entry.

This social engineering method has turn out to be more and more prevalent, with attackers manipulating human belief reasonably than exploiting technical vulnerabilities within the Salesforce platform itself.

Based on Google’s evaluation, the attackers gained entry via a malicious model of Salesforce’s Information Loader software. Throughout fraudulent telephone calls, victims had been guided to authorize what seemed to be a reputable linked app, inadvertently granting the cybercriminals in depth capabilities to entry and extract delicate knowledge.

Google described the stolen data as “fundamental and largely publicly obtainable enterprise data, akin to enterprise names and speak to particulars”. Nevertheless, safety researchers report that ShinyHunters claimed to have obtained roughly 2.55 million knowledge information from the breach.

Google emphasised that the breach was contained inside “a small window of time earlier than the entry was lower off”. The corporate instantly:

Terminated the attackers’ entry upon discovery

Performed a complete affect evaluation

Applied extra safety mitigations

Started notifying affected clients

The notification course of started in early August, with Google finishing e-mail alerts to all affected customers by August 8, 2025. The corporate assured customers that cost data remained safe and that there was no affect on Google Advertisements knowledge, Service provider Heart, Google Analytics, or different promoting merchandise.

This assault is a part of a broader marketing campaign by ShinyHunters, a cybercriminal collective that has focused quite a few high-profile organizations all through 2025. The group has been linked to breaches at main corporations together with Cisco, Qantas, LVMH manufacturers (Louis Vuitton, Dior, Tiffany & Co.), Adidas, and Allianz Life.

ShinyHunters sometimes employs a delayed extortion mannequin, ready months after the preliminary knowledge theft to demand ransom funds. The group has been noticed demanding funds in Bitcoin inside 72-hour ultimatums, usually claiming affiliation with different infamous hacking collectives to extend stress on victims.

Based on stories, ShinyHunters demanded 20 Bitcoins (roughly $2.3 million) from Google, although the risk actor later claimed this was despatched “for the lulz” reasonably than as a critical extortion try.

Equip your SOC with full entry to the newest risk knowledge from ANY.RUN TI Lookup that may Enhance incident response -> Get 14-day Free Trial

Cyber Security News Tags:Affected, Breach, Confirms, Cyberattack, Data, Google, Notifying, Users

Post navigation

Previous Post: How to Secure Public Cloud Storage
Next Post: Researchers Detail Windows EPM Poisoning Exploit Chain Leading to Domain Privilege Escalation

Related Posts

New Study Shows GPT-5.2 Can Reliably Develop Zero-Day Exploits at Scale New Study Shows GPT-5.2 Can Reliably Develop Zero-Day Exploits at Scale Cyber Security News
BlackSuit Ransomware Actors Breached Corporate Environment, Including 60+ VMware ESXi hosts BlackSuit Ransomware Actors Breached Corporate Environment, Including 60+ VMware ESXi hosts Cyber Security News
Red Hat Breach Exposes 5000+ High Profile Enterprise Customers at Risk Red Hat Breach Exposes 5000+ High Profile Enterprise Customers at Risk Cyber Security News
ScarCruft Hacker Group Launched a New Malware Attack Using Rust and PubNub ScarCruft Hacker Group Launched a New Malware Attack Using Rust and PubNub Cyber Security News
Open-Source Firewall IPFire 2.29 With New Reporting For Intrusion Prevention System Open-Source Firewall IPFire 2.29 With New Reporting For Intrusion Prevention System Cyber Security News
Critical Cisco Vulnerability Exposes Networks to DoS Attacks Critical Cisco Vulnerability Exposes Networks to DoS Attacks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • F5 Resolves Over 50 Security Flaws in Software
  • Windows Vulnerabilities: BitLocker Bypass and CTFMON Exploit
  • Seedworm Group Exploits Signed Binaries for Cyber Attacks
  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • F5 Resolves Over 50 Security Flaws in Software
  • Windows Vulnerabilities: BitLocker Bypass and CTFMON Exploit
  • Seedworm Group Exploits Signed Binaries for Cyber Attacks
  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark