Google has officially confirmed a significant security incident involving the compromise of its corporate Salesforce CRM instance by the notorious ShinyHunters cybercriminal group. The breach, which occurred in June 2025, represents part of a broader campaign targeting organizations utilizing the popular customer relationship management platform.
Attack Details and Compromised Data
According to Google’s official statement, cybercriminals gained unauthorized access to the company’s Salesforce instance containing contact information of small and medium-sized business clients. The tech giant emphasized that the compromised data primarily consisted of basic and publicly available information, including organization names and contact details, limiting the potential impact on affected parties.
Security researchers at Google identified the threat actors as UNC6040 and UNC6240, operating under the collective ShinyHunters banner. The attackers employed sophisticated social engineering techniques combined with vishing (voice phishing) to establish initial access to target systems, demonstrating the evolving nature of modern cyber threats.
ShinyHunters: A Persistent Cyber Threat
ShinyHunters has established itself as a formidable cybercriminal organization with an extensive track record of high-profile corporate breaches. The group’s previous victims include major technology companies such as Oracle Cloud, Snowflake, AT&T, NitroPDF, Wattpad, and MathWay, showcasing their capability to penetrate enterprise-grade security systems.
The group operates on a ransomware-as-a-service model, extracting sensitive data before initiating extortion negotiations with targeted organizations. When victims refuse to pay demanded ransoms, the criminals typically publish stolen information on dark web marketplaces or release it publicly, amplifying the reputational and financial damage to affected companies.
Financial Impact and Ransom Demands
Recent intelligence indicates ShinyHunters commands substantial ransom payments from victims. Security analysts report that one unnamed corporation recently paid the group 4 Bitcoin (approximately $400,000) to prevent the public disclosure of sensitive corporate data, highlighting the significant financial stakes involved in these cyber extortion schemes.
Widespread Salesforce CRM Campaign
The Google incident forms part of an extensive campaign specifically targeting Salesforce CRM users across multiple industries. Confirmed victims of similar attacks include prominent organizations spanning various sectors:
Technology and Aviation: Adidas, Qantas Airways, Allianz Life insurance, and Cisco’s official website have all reported similar security incidents involving unauthorized Salesforce access.
Luxury Fashion Brands: The campaign has particularly impacted high-end fashion companies, including LVMH Group subsidiaries (Louis Vuitton, Dior, Tiffany & Co.), Chanel, and Danish jewelry manufacturer Pandora.
Attack Methodology and Social Engineering Tactics
ShinyHunters’ success stems from their sophisticated approach to social engineering, particularly their mastery of targeted vishing techniques. These voice-based phishing attacks involve criminals impersonating IT support staff or other trusted service representatives via telephone to extract employee credentials and system access information.
This methodology proves particularly effective because it circumvents traditional technical security controls by exploiting human psychology and trust relationships within organizations. The approach represents a concerning trend where cybercriminals increasingly focus on human vulnerabilities rather than purely technical exploits.
Defense Strategies and Security Implications
The Google-Salesforce breach underscores critical gaps in enterprise cybersecurity strategies, particularly regarding cloud service security and employee awareness training. Organizations must recognize that advanced persistent threat groups like ShinyHunters specifically target human elements within security frameworks, making traditional perimeter defenses insufficient.
Effective protection requires implementing multi-layered security approaches combining technical controls with comprehensive staff education programs. Companies should prioritize regular security awareness training focused on social engineering recognition, establish robust identity verification protocols, and maintain continuous monitoring of cloud-based systems.
This incident serves as a stark reminder that even technology giants remain vulnerable to sophisticated social engineering campaigns. Organizations across all sectors must adopt proactive cybersecurity postures that address both technical vulnerabilities and human factors to effectively defend against evolving threats like those posed by ShinyHunters and similar cybercriminal groups.