Google Confirms Salesforce Data Breach by ShinyHunters Exposing Millions of SMB Records

Aug 11, 2025

Summary

Google has acknowledged a cybersecurity breach impacting one of its corporate Salesforce systems. The intrusion, attributed to the cybercriminal group ShinyHunters (tracked internally as UNC6040), occurred in June 2025 and involved the extraction of basic business contact information, with user notifications completed by August 8, 2025.

What Happened

  • Incident Timing: In June 2025, ShinyHunters infiltrated a Google Salesforce instance used to manage contact details and notes for small and medium-sized businesses.

  • Attack Method: The breach was executed via voice phishing (vishing)—attackers impersonated IT support staff to trick employees into authorizing a malicious Salesforce Data Loader application. This granted the attackers access and allowed data exfiltration.

  • Stolen Data: The compromised data were described as “basic and largely publicly available business information,” including business names, phone numbers, and related agent notes. ShinyHunters claims to have obtained around 2.55 million records, although Google reports the breach was contained quickly.

Google's Response

  • On August 5, 2025, Google publicly confirmed the breach, and notifications to affected parties were completed by August 8, 2025. Users were informed that payment data and core advertising platforms (Ads, Merchant Center, Analytics) remained unaffected.

  • Google's Threat Intelligence Group (GTIG) emphasized that the breach was limited, with access revoked soon after detection.

Broader Context

  • ShinyHunters / UNC6040 is a well-known cybercriminal entity responsible for several high-profile attacks this year, including breaches at Qantas, Allianz Life, Louis Vuitton, Pandora, AT&T, Santander, and Ticketmaster.

  • These campaigns frequently follow data theft with extortion demands, sometimes weeks or months later. A related threat cluster, UNC6240, is known to initiate extortion and prepare data leak sites to pressure victims.

Why It Matters

  • This incident demonstrates that even leading tech organizations like Google remain vulnerable to social-engineering tactics.

  • The breach underscores the importance of human-focused defenses (like training, vishing awareness, and strict controls over connected apps) in cloud environments.

  • SMB vulnerability exposure may be exploited for targeted phishing campaigns or as part of broader attack strategies by adversaries.

Key Takeaways

  • Voice phishing remains a potent tool for breaching corporate systems—even for companies with advanced security infrastructure.

  • Attackers are shifting their tactics from relying solely on technical exploits to leveraging psychological manipulation and app-based abuses of trusted platforms like Salesforce.

  • Organizations should implement robust safeguards: multi-factor authentication, least-privilege access, app consent reviews, and employee training on recognizing vishing attempts.

  • Even “limited impact” breaches can become significant in aggregate, especially when they involve business contacts and pave the way for future threats.

Disclaimer: ClearPhish maintains a strict policy of not participating in the theft, distribution, or handling of stolen data or files. The platform does not engage in exfiltration, downloading, hosting, or reposting any illegally obtained information. Any responsibility or legal inquiries regarding the data should be directed solely at the responsible cybercriminals or attackers, as ClearPhish is not involved in these activities. We encourage parties affected by any breach to seek resolution through legal channels directly with the attackers responsible for such incidents.

Latest News

Fake LastPass Emails Impersonate Password Vault Backup Alerts in New Phishing Campaign
Fake LastPass Emails Impersonate Password Vault Backup Alerts in New Phishing Campaign
Fake LastPass Emails Impersonate Password Vault Backup Alerts in New Phishing Campaign
Fake LastPass Emails Impersonate Password Vault Backup Alerts in New Phishing Campaign

Fake LastPass Emails Impersonate Password Vault Backup Alerts in New Phishing Campaign

Fake LastPass Emails Impersonate Password Vault Backup Alerts in New Phishing Campaign

Fake LastPass Emails Impersonate Password Vault Backup Alerts in New Phishing Campaign

Fake LastPass Emails Impersonate Password Vault Backup Alerts in New Phishing Campaign

Jan 22, 2026

Malicious Chrome Extensions Steal Credentials From Enterprise HR Platforms
Malicious Chrome Extensions Steal Credentials From Enterprise HR Platforms
Malicious Chrome Extensions Steal Credentials From Enterprise HR Platforms
Malicious Chrome Extensions Steal Credentials From Enterprise HR Platforms

Malicious Chrome Extensions Steal Credentials From Enterprise HR Platforms

Malicious Chrome Extensions Steal Credentials From Enterprise HR Platforms

Malicious Chrome Extensions Steal Credentials From Enterprise HR Platforms

Malicious Chrome Extensions Steal Credentials From Enterprise HR Platforms

Jan 20, 2026

Hackers Actively Exploiting Critical Fortinet FortiSIEM Vulnerability
Hackers Actively Exploiting Critical Fortinet FortiSIEM Vulnerability
Hackers Actively Exploiting Critical Fortinet FortiSIEM Vulnerability
Hackers Actively Exploiting Critical Fortinet FortiSIEM Vulnerability

Hackers Actively Exploiting Critical Fortinet FortiSIEM Vulnerability

Hackers Actively Exploiting Critical Fortinet FortiSIEM Vulnerability

Hackers Actively Exploiting Critical Fortinet FortiSIEM Vulnerability

Hackers Actively Exploiting Critical Fortinet FortiSIEM Vulnerability

Jan 19, 2026

Microsoft January 2026 Patch Tuesday Fixes 114 Flaws, 3 Zero-Days Exploited
Microsoft January 2026 Patch Tuesday Fixes 114 Flaws, 3 Zero-Days Exploited
Microsoft January 2026 Patch Tuesday Fixes 114 Flaws, 3 Zero-Days Exploited
Microsoft January 2026 Patch Tuesday Fixes 114 Flaws, 3 Zero-Days Exploited

Microsoft January 2026 Patch Tuesday Fixes 114 Flaws, 3 Zero-Days Exploited

Microsoft January 2026 Patch Tuesday Fixes 114 Flaws, 3 Zero-Days Exploited

Microsoft January 2026 Patch Tuesday Fixes 114 Flaws, 3 Zero-Days Exploited

Microsoft January 2026 Patch Tuesday Fixes 114 Flaws, 3 Zero-Days Exploited

Jan 14, 2026

VMware ESXi Zero-Day Exploits Likely Used a Year Before Disclosure, Researchers Warn
VMware ESXi Zero-Day Exploits Likely Used a Year Before Disclosure, Researchers Warn
VMware ESXi Zero-Day Exploits Likely Used a Year Before Disclosure, Researchers Warn
VMware ESXi Zero-Day Exploits Likely Used a Year Before Disclosure, Researchers Warn

VMware ESXi Zero-Day Exploits Likely Used a Year Before Disclosure, Researchers Warn

VMware ESXi Zero-Day Exploits Likely Used a Year Before Disclosure, Researchers Warn

VMware ESXi Zero-Day Exploits Likely Used a Year Before Disclosure, Researchers Warn

VMware ESXi Zero-Day Exploits Likely Used a Year Before Disclosure, Researchers Warn

Jan 12, 2026

Ni8mare Vulnerability: Max-Severity Flaw Lets Hackers Hijack n8n Automation Servers
Ni8mare Vulnerability: Max-Severity Flaw Lets Hackers Hijack n8n Automation Servers
Ni8mare Vulnerability: Max-Severity Flaw Lets Hackers Hijack n8n Automation Servers
Ni8mare Vulnerability: Max-Severity Flaw Lets Hackers Hijack n8n Automation Servers

Ni8mare Vulnerability: Max-Severity Flaw Lets Hackers Hijack n8n Automation Servers

Ni8mare Vulnerability: Max-Severity Flaw Lets Hackers Hijack n8n Automation Servers

Ni8mare Vulnerability: Max-Severity Flaw Lets Hackers Hijack n8n Automation Servers

Ni8mare Vulnerability: Max-Severity Flaw Lets Hackers Hijack n8n Automation Servers

Jan 8, 2026

Get updates in your inbox directly

You are now subscribed.

Get updates in your inbox directly

You are now subscribed.

Get updates in your

inbox directly

You are now subscribed.

Get updates in your inbox directly

You are now subscribed.

Enable your employees as first line of defense and expand your digital footprints without any fear.

Enable your employees as first line of defense and expand your digital footprints without any fear.

Enable your employees as first line of defense and expand your digital footprints without any fear.

Enable your employees as first line of defense and expand your digital footprints without any fear.