McGraw Hill Data Breach Exposes 13.5 Million Accounts via Salesforce Misconfiguration

Apr 17, 2026

Incident Overview

Attribute

Details

Target

McGraw Hill (EdTech Giant)

Threat Actor

ShinyHunters

Attack Vector

Salesforce misconfiguration

Impacted Records

~13.5 million accounts

Data Exposed

Names, emails, phone numbers, addresses

Data Size

100GB+ leaked dataset

Status

Data publicly leaked after extortion attempt

Education publishing giant McGraw Hill has confirmed a massive data breach affecting approximately 13.5 million user accounts, following an extortion attempt by the ShinyHunters threat group.

The attackers reportedly exploited a misconfiguration in McGraw Hill’s Salesforce environment, gaining unauthorized access to sensitive user data stored on a publicly accessible webpage.

What Happened?

According to official statements, the breach did not involve direct compromise of McGraw Hill’s internal systems, but instead stemmed from a third-party SaaS misconfiguration.

  • Unauthorized access was gained via a Salesforce-hosted webpage

  • The issue appears linked to a broader Salesforce misconfiguration affecting multiple organizations

  • Threat actors exfiltrated large datasets and attempted extortion

When McGraw Hill did not comply with ransom demands, the attackers released the stolen data publicly, escalating the impact significantly.

What Data Was Exposed?

The leaked dataset—over 100GB in size—contains a wide range of personally identifiable information (PII), including:

  • Email addresses (13.5 million unique entries)

  • Full names

  • Phone numbers

  • Physical addresses

Not every record contained all fields, but the dataset is still highly valuable for targeted phishing and social engineering campaigns.

Conflicting Claims: 13.5M vs 45M Records

There is a notable discrepancy in breach scale:

  • Have I Been Pwned confirms exposure of 13.5 million accounts

  • ShinyHunters claims up to 45 million Salesforce records were stolen

This gap suggests either:

  • Partial dataset release

  • Overstatement by threat actors (common in extortion campaigns)

  • Multiple datasets with varying levels of exposure

Threat Actor: ShinyHunters

The attack has been attributed to ShinyHunters, a well-known cybercriminal group that has shifted from ransomware to data extortion and mass leaks.

Their recent campaigns focus heavily on:

  • Exploiting SaaS misconfigurations (especially Salesforce)

  • Exfiltrating large datasets

  • Publishing data if ransom demands are unmet

McGraw Hill’s Response

McGraw Hill has emphasized that:

  • No financial data, Social Security numbers, or educational records were compromised

  • Core systems, including customer databases and courseware, remain secure

  • The vulnerability has been identified and remediated

However, the scale of leaked data raises concerns about underestimation of impact and third-party risk visibility.

Why This Matters

This breach highlights a growing cybersecurity trend:

1. SaaS Misconfigurations Are the New Attack Surface

Organizations increasingly rely on platforms like Salesforce—but misconfigured instances create silent exposure points.

2. Data Exfiltration > Ransomware

Modern threat actors prefer:

  • Stealing data

  • Threatening public leaks
    Rather than encrypting systems

3. Phishing Risk Skyrockets

With access to:

  • Names

  • Emails

  • Phone numbers

Attackers can launch highly personalized phishing campaigns, increasing success rates dramatically.

How Organizations Can Defend

To mitigate similar risks:

  • Audit SaaS configurations regularly (especially public-facing endpoints)

  • Implement least privilege access controls

  • Monitor for unauthorized data exposure in cloud environments

  • Use data loss prevention (DLP) tools

  • Train employees against spear-phishing attacks fueled by breached data

ClearPhish Takeaway

This incident reinforces a critical reality:

Your security is only as strong as your weakest SaaS configuration.

Even without direct system compromise, misconfigured cloud environments can lead to massive data exposure.

At ClearPhish, we’ve seen how breaches like this become fuel for next-gen phishing attacks—where attackers leverage real user data to craft hyper-personalized lures.

Disclaimer: ClearPhish maintains a strict policy of not participating in the theft, distribution, or handling of stolen data or files. The platform does not engage in exfiltration, downloading, hosting, or reposting any illegally obtained information. Any responsibility or legal inquiries regarding the data should be directed solely at the responsible cybercriminals or attackers, as ClearPhish is not involved in these activities. We encourage parties affected by any breach to seek resolution through legal channels directly with the attackers responsible for such incidents.

Latest News

McGraw Hill Data Breach Exposes 13.5 Million Accounts via Salesforce Misconfiguration

McGraw Hill Data Breach Exposes 13.5 Million Accounts via Salesforce Misconfiguration

McGraw Hill Data Breach Exposes 13.5 Million Accounts via Salesforce Misconfiguration

McGraw Hill Data Breach Exposes 13.5 Million Accounts via Salesforce Misconfiguration

McGraw Hill Data Breach Exposes 13.5 Million Accounts via Salesforce Misconfiguration

Apr 17, 2026

Rockstar Games Data Breach: ShinyHunters Leak Stolen Analytics Data in Extortion Attack

Rockstar Games Data Breach: ShinyHunters Leak Stolen Analytics Data in Extortion Attack

Rockstar Games Data Breach: ShinyHunters Leak Stolen Analytics Data in Extortion Attack

Rockstar Games Data Breach: ShinyHunters Leak Stolen Analytics Data in Extortion Attack

Rockstar Games Data Breach: ShinyHunters Leak Stolen Analytics Data in Extortion Attack

Apr 14, 2026

Hackers Use Pixel-Sized SVG Trick to Hide Credit Card Stealers

Hackers Use Pixel-Sized SVG Trick to Hide Credit Card Stealers

Hackers Use Pixel-Sized SVG Trick to Hide Credit Card Stealers

Hackers Use Pixel-Sized SVG Trick to Hide Credit Card Stealers

Hackers Use Pixel-Sized SVG Trick to Hide Credit Card Stealers

Apr 10, 2026

VENOM Phishing Attacks Steal Microsoft Logins of Executives, Bypass MFA

VENOM Phishing Attacks Steal Microsoft Logins of Executives, Bypass MFA

VENOM Phishing Attacks Steal Microsoft Logins of Executives, Bypass MFA

VENOM Phishing Attacks Steal Microsoft Logins of Executives, Bypass MFA

VENOM Phishing Attacks Steal Microsoft Logins of Executives, Bypass MFA

Apr 10, 2026

Axios npm Hack: Fake Microsoft Teams Error Used to Hijack Maintainer Account

Axios npm Hack: Fake Microsoft Teams Error Used to Hijack Maintainer Account

Axios npm Hack: Fake Microsoft Teams Error Used to Hijack Maintainer Account

Axios npm Hack: Fake Microsoft Teams Error Used to Hijack Maintainer Account

Axios npm Hack: Fake Microsoft Teams Error Used to Hijack Maintainer Account

Apr 6, 2026

Hackers Exploit React2Shell in Automated Credential Theft Campaign

Hackers Exploit React2Shell in Automated Credential Theft Campaign

Hackers Exploit React2Shell in Automated Credential Theft Campaign

Hackers Exploit React2Shell in Automated Credential Theft Campaign

Hackers Exploit React2Shell in Automated Credential Theft Campaign

Apr 6, 2026

Get updates in your inbox directly

You are now subscribed.

Get updates in your inbox directly

You are now subscribed.

Get updates in your

inbox directly

You are now subscribed.

Get updates in your inbox directly

You are now subscribed.

Enable your employees as first line of defense and expand your digital footprints without any fear.

Enable your employees as first line of defense and expand your digital footprints without any fear.

Enable your employees as first line of defense and expand your digital footprints without any fear.

Enable your employees as first line of defense and expand your digital footprints without any fear.