Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
ShinyHunters Allegedly Breaches Cisco Data

ShinyHunters Allegedly Breaches Cisco Data

Posted on April 1, 2026 By CWS

The cybercrime group known as ShinyHunters has allegedly claimed responsibility for multiple data breaches targeting Cisco Systems, Inc. The breaches reportedly compromised over 3 million Salesforce records, along with sensitive internal corporate data such as GitHub repositories and AWS S3 buckets.

Details of the Alleged Breach

Security researcher Dominic Alvieri has highlighted that ShinyHunters issued a ‘FINAL WARNING’ to Cisco on their data leak site, demanding contact by April 3, 2026, to avoid public data exposure. The breach listing, which was updated on March 31, 2026, points to over 3 million records being compromised through Salesforce CRM, Salesforce Aura, and AWS environments.

ShinyHunters, identified as a black-hat hacker group active since 2019, has been linked to a string of data theft and extortion activities. They operate under aliases like UNC6040 and UNC6395, often employing techniques such as vishing to manipulate employees into granting unauthorized OAuth token access to malicious applications.

Implications and Threats

According to threat intelligence from Resecurity, the data allegedly stolen from Cisco primarily originates from its Salesforce environment, including information related to Cisco’s customers and employees. The records also reportedly involve personnel from the FBI, DHS, DISA, IRS, NASA, and other international government agencies, suggesting potential risks for targeted attacks.

The group’s tactics involve deceiving support employees to authorize malicious Salesforce-connected apps using OAuth tokens, allowing them to bypass security measures like MFA. The subsequent misuse of these tokens enables the exfiltration of sensitive information such as AWS keys and passwords.

Recent Breach History and Recommendations

Cisco’s recent history includes an October 2024 breach where actor IntelBroker allegedly accessed 4.5 TB of data from public-facing environments. Although Cisco confirmed no core systems were breached, certain files were inadvertently exposed due to configuration errors. The company also faced a CRM data breach in August 2025 linked to ShinyHunters.

The ShinyHunters group has a history of targeting major companies, previously claiming attacks on entities like Snowflake and Google. Security experts recommend that organizations immediately review OAuth-connected apps, enforce access controls, and monitor for unauthorized activity to mitigate similar threats.

As of now, Cisco has not released an official statement regarding the latest claims made by ShinyHunters in March 2026. Follow our updates on Google News, LinkedIn, and X for the latest cybersecurity developments.

Cyber Security News Tags:AWS, Cisco breach, cloud security, Cybercrime, Cybersecurity, data leak, data security, Hacking, Information Security, OAuth, Phishing, Salesforce, ShinyHunters, threat intelligence, Vishing

Post navigation

Previous Post: Hotel Booking Scam Targets Guests with Fake Payment Requests

Related Posts

Google Warns Multiple Hacker Groups Are Exploiting React2Shell to Spread Malware Google Warns Multiple Hacker Groups Are Exploiting React2Shell to Spread Malware Cyber Security News
PolarEdge With Custom TLS Server Uses Custom Binary Protocol for C2 Communication PolarEdge With Custom TLS Server Uses Custom Binary Protocol for C2 Communication Cyber Security News
CrazyHunter Ransomware Attacking Healthcare Sector with Advanced Evasion Techniques CrazyHunter Ransomware Attacking Healthcare Sector with Advanced Evasion Techniques Cyber Security News
New macOS TCC Bypass Vulnerability Allow Attackers to Access Sensitive User Data New macOS TCC Bypass Vulnerability Allow Attackers to Access Sensitive User Data Cyber Security News
BreachLock and Vanta Bridge the Gap Between Continuous Security Testing and Compliance with New Integration BreachLock and Vanta Bridge the Gap Between Continuous Security Testing and Compliance with New Integration Cyber Security News
Fake Fortinet Sites Steal VPN Credentials in Sophisticated Phishing Attack Fake Fortinet Sites Steal VPN Credentials in Sophisticated Phishing Attack Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • ShinyHunters Allegedly Breaches Cisco Data
  • Hotel Booking Scam Targets Guests with Fake Payment Requests
  • CrystalX Malware-as-a-Service on Telegram Exposed
  • Agentic AI Tackles Identity Security Gaps
  • EtherRAT Malware Hides Using Ethereum Blockchain

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • ShinyHunters Allegedly Breaches Cisco Data
  • Hotel Booking Scam Targets Guests with Fake Payment Requests
  • CrystalX Malware-as-a-Service on Telegram Exposed
  • Agentic AI Tackles Identity Security Gaps
  • EtherRAT Malware Hides Using Ethereum Blockchain

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark