Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

429+ Articles
114+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. News
  3. ShinyHunters Claims Mass Data Theft From 400 Firms via
ShinyHunters Claims Mass Data Theft From 400 Firms via
NEWS

ShinyHunters Claims Mass Data Theft From 400 Firms via

Cybercrime group ShinyHunters claims to have exploited misconfigured Salesforce Experience Cloud instances to steal CRM data from approximately 400...

Dylan H.

News Desk

March 9, 2026
6 min read

ShinyHunters Claims 400 Victims in New Salesforce Aura Campaign

ShinyHunters, one of the most prolific data extortion groups in the cybercrime ecosystem, has claimed responsibility for an ongoing large-scale campaign targeting organizations using Salesforce Experience Cloud. The group claims to have compromised approximately 400 companies — including 100 high-profile firms — by exploiting a misconfiguration in the Salesforce Aura framework that allows unauthenticated guest users to query CRM data without logging in.

Salesforce has acknowledged that customers are being targeted and is warning organizations to review their Experience Cloud configurations, but maintains that the issue stems from customer misconfiguration rather than a platform vulnerability.


Incident Details

AttributeValue
Threat ActorShinyHunters
Campaign Name"Salesforce Aura Campaign"
Claimed Victims~400 companies, 100 described as "high-profile"
Target PlatformSalesforce Experience Cloud (Community sites)
Attack MethodExploiting misconfigured guest user permissions on Aura API endpoint
Data StolenNames, phone numbers, CRM records
Tool UsedModified AuraInspector (open-source Salesforce audit tool)
Salesforce PositionPlatform is secure; issue is customer misconfiguration

Technical Details

The Vulnerable Endpoint

Attackers are targeting the /s/sfsites/aura API endpoint on publicly accessible Salesforce Experience Cloud (Community) sites. This endpoint is part of the Lightning Aura Components framework, which powers dynamic Experience Cloud pages.

How Misconfiguration Creates Risk

Salesforce Experience Cloud sites use a dedicated "guest user profile" that allows unauthenticated visitors to view public pages, submit forms, or access help content without logging in. This is an intentional feature for public-facing portals. However, when administrators grant the guest user profile excessive permissions — particularly access to Salesforce CRM objects — those objects become queryable via the Aura API without any authentication.

Normal behavior:
  Guest user → public FAQs and forms only
 
Misconfigured behavior:
  Guest user → direct API queries to CRM objects
             → names, phone numbers, account records, contacts
             → all exposed without login

ShinyHunters' Modified AuraInspector

When Mandiant released AuraInspector in January 2026 — an open-source tool designed to help Salesforce administrators identify access control misconfigurations — ShinyHunters claims they immediately weaponized it. The group says they modified the auditing tool to perform large-scale automated scanning of publicly accessible Salesforce instances, harvesting exposed CRM data at scale.


Data Stolen and Downstream Use

Data TypeDownstream Risk
Customer names and contact detailsTargeted phishing and vishing (voice phishing) campaigns
Phone numbersSMS phishing (smishing), SIM-swapping attacks
CRM account recordsBusiness email compromise, impersonation of business relationships
Internal org structureSocial engineering targeting employees

ShinyHunters has explicitly stated that harvested names and phone numbers are being used to fuel follow-on social engineering attacks, including voice phishing (vishing) campaigns against targeted individuals.


Impact Assessment

Impact AreaDescription
Data ExfiltrationCRM records including contacts, leads, and account data stolen at scale
Social Engineering EnablementStolen data feeds targeted phishing and vishing attacks against exposed organizations' customers
Regulatory ExposureGDPR, CCPA, and other privacy regulation breach notification obligations may be triggered
Customer TrustDownstream customers of affected companies now face increased social engineering risk
Reputational DamageOrganizations named as victims face public scrutiny

Recommendations

Immediate Actions for Salesforce Administrators

  1. Audit guest user profile permissions in all Experience Cloud sites immediately
  2. Review object access — ensure the guest user profile cannot access Contact, Lead, Account, or other CRM objects
  3. Run Salesforce's Health Check tool in Setup to identify misconfigured sharing settings
  4. Use the Salesforce Security Center to review all Experience Cloud site configurations

Identifying Misconfigured Sites

In Salesforce Setup:
1. Navigate to: Experience Workspaces > [Your Site] > Administration > Members
2. Check guest user profile permissions under Setup > Profiles > Guest User Profile
3. Review object-level security (OLS) and field-level security (FLS) for guest profile
4. Ensure "Guest Access to Apex Classes" is restricted
5. Check Sharing Settings — no CRM objects should use "Public Read Only" or higher

Detecting Exploitation Attempts

  • Monitor API logs for high-volume requests to /s/sfsites/aura endpoints
  • Alert on unusual guest user activity — large numbers of object queries from unauthenticated sessions
  • Review Salesforce Shield Event Monitoring for anomalous data access patterns
  • Check for AuraInspector signatures in user-agent strings in API request logs

If Your Organization Was Affected

  1. Revoke guest user object permissions immediately to stop ongoing data collection
  2. Inventory what data was exposed — review which CRM objects were accessible
  3. Assess notification obligations under applicable privacy regulations
  4. Notify affected customers if their personal data was exposed
  5. Report to Salesforce via their security reporting channel

Key Takeaways

  1. Misconfiguration, not vulnerabilities — this campaign exploits legitimate platform features that are incorrectly configured, highlighting why security hardening is as important as patching.
  2. ShinyHunters continues to evolve — the group rapidly weaponized a defensive audit tool within weeks of its release, demonstrating operational agility.
  3. Scale is staggering — 400 claimed victims across a single campaign reinforces the risk of misconfigured SaaS platforms as a systemic attack surface.
  4. Stolen CRM data powers future attacks — the real danger isn't just the initial data theft but the waves of targeted phishing and vishing that follow.
  5. Organizations using public-facing Salesforce Experience Cloud sites must urgently audit guest user profiles and object permissions.
  6. Defensive tools can be weaponized — the rapid adaptation of AuraInspector is a reminder that published security research and tools carry dual-use risk.

Sources

  • BleepingComputer — ShinyHunters Claims Ongoing Salesforce Aura Data Theft Attacks
  • The Register — ShinyHunters Claims Yet Another Salesforce Customers Breach
  • CyberInsider — ShinyHunters Claims Hundreds of Victims in New Salesforce Aura Campaign
  • Mitiga — ShinyHunters and UNC6395: Inside the Salesforce and Salesloft Breaches
#ShinyHunters#Salesforce#Cloud Security#Data Theft#Misconfiguration#CRM

Related Articles

Cloudflare-Themed ClickFix Attack Drops Infiniti Stealer on Macs

A newly observed ClickFix campaign impersonates Cloudflare's CAPTCHA verification pages to deliver the Python-based Infiniti Stealer to macOS users via a multi-stage chain involving a Bash script and a Nuitka-compiled loader.

4 min read

European Commission Investigating Breach After Amazon Cloud Account Hack

The European Commission is investigating a security breach after a threat actor gained unauthorized access to its Amazon Web Services cloud environment and claims to have stolen over 350 GB of data including databases, employee information, and email server data.

4 min read

Supply Chain Attack Hits Widely-Used AI Package, Risking Thousands of Companies

Malicious versions of LiteLLM — a Python package with 3 million daily downloads present in roughly 36% of cloud environments — were quietly pushed to PyPI...

5 min read
Back to all News