15.3 C
Canberra
Tuesday, October 21, 2025

Salesforce refuses to pay ransom over widespread knowledge theft assaults


Salesforce refuses to pay ransom over widespread knowledge theft assaults

Salesforce has confirmed that it’s going to not negotiate with or pay a ransom to the menace actors behind a large wave of knowledge theft assaults that impacted the corporate’s prospects this 12 months.

As first reported by Bloomberg, Salesforce emailed prospects on Tuesday to say they might not be paying a ransom and warned that “credible menace intelligence” signifies the menace actors had been planning to leak the stolen knowledge.

“I can affirm Salesforce is not going to interact, negotiate with, or pay any extortion demand,” Salesforce additionally confirmed to BleepingComputer.

This assertion follows the launch of a knowledge leak web site by menace actors often known as “Scattered Lapsus$ Hunters,” who’re trying to extort 39 firms whose knowledge was stolen from Salesforce. The web site was situated on the breachforums[.]hn area, which is called after the infamous BreachForums web site, a hacking discussion board recognized for promoting and leaking stolen knowledge.

The businesses being extorted on the information leak web site included well-known manufacturers and organizations, together with FedEx, Disney/Hulu, House Depot, Marriott, Google, Cisco, Toyota, Hole, Kering, McDonald’s, Walgreens, Instacart, Cartier, Adidas, Sake Fifth Avenue, Air France & KLM, Transunion, HBO MAX, UPS, Chanel, and IKEA.

In whole, the menace actors claimed to have stolen almost 1 billion knowledge information, which might be publicly launched if an extortion demand was paid by particular person firms or as a single cost from Salesforce that will cowl all of the impacted prospects listed on the location.

ShinyHunters Salesforce data leak site
ShinyHunters Salesforce knowledge leak web site
Supply: BleepingComputer

This knowledge was stolen from Salesforce cases in two separate campaigns that occurred in 2025.

The primary knowledge theft marketing campaign started on the finish of 2024, when menace actors began conducting social engineering assaults impersonating IT help workers to trick staff into connecting a malicious OAuth utility to their firm’s Salesforce occasion.

As soon as linked, the menace actors used the connection to obtain and steal the databases, which had been then used to extort the corporate via e mail.

These social engineering assaults impacted Google, Cisco, Qantas, Adidas, Allianz Life, Farmers Insurance coverage, Workday, Kering, and LVMH subsidiaries, resembling Dior, Louis Vuitton, and Tiffany & Co.

A second Salesforce data-theft marketing campaign started in early August 2025, when the menace actors used stolen SalesLoft Drift OAuth tokens to pivot to prospects’ CRM environments and exfiltrate knowledge.

The Salesloft data-theft assaults primarily centered on stealing help ticket knowledge to scan for credentials, API tokens, authentication tokens, and different delicate info that will allow the attackers to breach the corporate’s infrastructure and cloud companies.

One of many menace actors behind the Salesloft assaults, often known as ShinyHunters, informed BleepingComputer that they stole roughly 1.5 billion knowledge information for over 760 firms throughout this marketing campaign.

Many firms have already confirmed they had been impacted by the Salesloft supply-chain assault, together with Google, Cloudflare, Zscaler, Tenable, CyberArk, Elastic, BeyondTrust, Proofpoint, JFrog, Nutanix, Qualys, Rubrik, Cato Networks, Palo Alto Networks, and many extra.

The not too long ago launched knowledge leak web site was used primarily to extort prospects within the unique social engineering assaults, with the menace actors stating they might start publicly extorting these impacted by the Salesloft assaults after October tenth.

Nonetheless, the information leak web site is now shut down, with the area now utilizing nameservers of surina.ns.cloudflare.com and hans.ns.cloudflare.com, which have each been utilized by the FBI previously when seizing domains.

BleepingComputer contacted the FBI about whether or not they seized the area however has not acquired a response right now.

Be a part of the Breach and Assault Simulation Summit and expertise the way forward for safety validation. Hear from high consultants and see how AI-powered BAS is remodeling breach and assault simulation.

Do not miss the occasion that can form the way forward for your safety technique

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

[td_block_social_counter facebook="tagdiv" twitter="tagdivofficial" youtube="tagdiv" style="style8 td-social-boxed td-social-font-icons" tdc_css="eyJhbGwiOnsibWFyZ2luLWJvdHRvbSI6IjM4IiwiZGlzcGxheSI6IiJ9LCJwb3J0cmFpdCI6eyJtYXJnaW4tYm90dG9tIjoiMzAiLCJkaXNwbGF5IjoiIn0sInBvcnRyYWl0X21heF93aWR0aCI6MTAxOCwicG9ydHJhaXRfbWluX3dpZHRoIjo3Njh9" custom_title="Stay Connected" block_template_id="td_block_template_8" f_header_font_family="712" f_header_font_transform="uppercase" f_header_font_weight="500" f_header_font_size="17" border_color="#dd3333"]
- Advertisement -spot_img

Latest Articles