By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Google falls victim to Salesforce cyberattacks
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > News > Google falls victim to Salesforce cyberattacks
News

Google falls victim to Salesforce cyberattacks

News Room
Last updated: 2025/08/11 at 5:07 PM
News Room Published 11 August 2025
Share
SHARE

The Wiz transaction is the largest ever sought by Google or parent Alphabet Copyright AFP/File Josh Edelson

Google has become the latest victim in extortion group ShinyHunter’s exploitation of Salesforce databases, as the tech giant has disclosed a breach of company data. Google stated the information stolen is largely publicly available, while ShinyHunters maintains the data is more valuable than Google claims.

Salesforce, a leading cloudbased software company, is a frequent target of cyberattacks, including social engineering scams, phishing attacks, and data breaches. 

ShinyHunters is a blackhat criminal hacker group that is believed to have formed in 2020. ShinyHunters have stolen the information of multiple major corporations, including Adidas, Cisco, Dior, and now Google. To learn more about the issue, head from Randolph Barr, CISO at Cequence.

Barr begins his assessment by considering the modalities that can help to establish system flaws: “At a high level, the core security fundamentals continue to be the most common points of failure—particularly around credential hygiene, inconsistent MFA enforcement, and overlooked SaaS integration paths. The recent string of Salesforce CRM compromises illustrates how attackers are exploiting both technical misconfigurations and human factors to gain access and exfiltrate data.”

In terms of what cybercriminals do, Barr identified a twin process, as he explains: “There are two primary techniques being leveraged in these attacks. The first involves the use of infostealer malware. In these cases, attackers gain access by harvesting credentials from malwareinfected devices.”

As to what happens next: “These credentials are then used to access cloud platforms like Salesforce and Snowflake, often through nonUI interfaces such as APIs or service accounts, where MFA enforcement is either weak or nonexistent. This type of compromise relies heavily on poor endpoint hygiene and gaps in identity and access management controls—particularly where organizations have failed to extend MFA to all access vectors, not just the user interface.”

With the other process, Barr finds: “The second technique, which appears to be the method used in Google’s case, involves vishing (voice phishing) attacks by a group tracked as UNC6040. Instead of using malware, these attackers call employees and use social engineering tactics to trick them into providing login credentials or approving MFA prompts. Once inside Salesforce, the attackers download customer data and then attempt to extort the company by threatening to release it.”

This leads to the key risk: “This method underscores the limitations of technical controls when human behaviour becomes the attack surface.”

Linking these processes back to Google, Barr identifies: “In Google’s situation, the stolen data was reportedly limited to publicly available information such as business names and contact details. However, the compromise vector remains concerning. It highlights that even when MFA is in place, it can be bypassed through social engineering or fatigue attacks, especially if organizations haven’t implemented additional safeguards like phishingresistant MFA or stepup authentication.”

Expanding further on the weakness that led to the issue, Barr notes: “While Salesforce began enforcing MFA for UI logins in 2022, many organizations didn’t extend those protections to service accounts or custom integrations—creating blind spots that attackers are now actively exploiting.”

Bridging this towards what needs to be done going forwards, Barr says: “This ongoing campaign reinforces the need for holistic identity security that includes not just MFA, but consistent enforcement across all access paths and a strong focus on reducing human exploitability.”

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Ubuntu 25.10 Will Ship With Linux 6.17 Even If It Means An Unstable “-rc” Kernel
Next Article Flying With Delta? Crunchyroll Anime Is Coming to Your Flights
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Elon Musk cries antitrust as X & Grok can’t compete with OpenAI on Apple’s App Store
News
Think the AI Boom Is Over? Palantir Just Proved Otherwise
News
Avalanche And Helika Launch New Gaming Accelerator – Applications Now Open | HackerNoon
Computing
Looking to Recycle an Old Laptop or Printer? Here's Where You Can Take It
News

You Might also Like

News

Elon Musk cries antitrust as X & Grok can’t compete with OpenAI on Apple’s App Store

6 Min Read
News

Think the AI Boom Is Over? Palantir Just Proved Otherwise

9 Min Read
News

Looking to Recycle an Old Laptop or Printer? Here's Where You Can Take It

6 Min Read
News

The Best Website Builders for 2025

31 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?