Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

735+ Articles
120+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. News
  3. McGraw-Hill Education Confirms Salesforce Misconfiguration Behind Data Breach
McGraw-Hill Education Confirms Salesforce Misconfiguration Behind Data Breach
NEWS

McGraw-Hill Education Confirms Salesforce Misconfiguration Behind Data Breach

Education publisher McGraw-Hill has disclosed that a Salesforce Experience Cloud guest user misconfiguration allowed ShinyHunters to exfiltrate data, part of a broad campaign targeting 300-400 organizations and claiming 45 million records.

Dylan H.

News Desk

April 16, 2026
4 min read

Education publishing giant McGraw-Hill has publicly confirmed that a Salesforce Experience Cloud misconfiguration in its environment led to unauthorized access to customer data. The disclosure follows an extortion demand by the ShinyHunters cybercriminal group, which threatened to publish 45 million stolen Salesforce records unless a ransom was paid.

What McGraw-Hill Disclosed

In a statement released April 15, 2026, McGraw-Hill confirmed that hackers accessed data through a misconfigured guest user profile in its Salesforce Experience Cloud deployment. The company characterized the accessed data as "limited and non-sensitive" and said its core customer databases and internal enterprise systems were not compromised.

The vulnerable Salesforce webpages were identified and secured after the breach was discovered. McGraw-Hill did not publicly disclose the volume of records affected or the categories of data exposed, beyond stating that the data was hosted on Salesforce Experience Cloud.

ShinyHunters set an extortion deadline of April 14, 2026 — the day before McGraw-Hill's disclosure — threatening to publish the data if a ransom was not received.

The Broader ShinyHunters Salesforce Campaign

McGraw-Hill is one of hundreds of organizations caught in an expansive ShinyHunters operation targeting Salesforce Experience Cloud deployments with overly permissive guest user configurations.

The campaign timeline:

  • September 2025 — ShinyHunters begins mass-scanning for exposed Salesforce Experience Cloud endpoints, targeting the /s/sfsites/aura API path
  • January 2026 — Group weaponizes a modified version of AuraInspector, an open-source Salesforce audit tool originally developed by Mandiant, converting it from a detection tool to an active data exfiltration framework
  • January–April 2026 — Active exfiltration from hundreds of organizations; ShinyHunters also discovers a sortBy parameter in Salesforce's GraphQL API that bypasses the 2,000-record-per-query limit, dramatically increasing extraction speed
  • March–April 2026 — Extortion demands sent to victims, with public disclosure threats as leverage

Security researchers estimate 300 to 400 organizations have been affected. ShinyHunters is the same group responsible for the 2024 Snowflake campaign that impacted Ticketmaster, AT&T, and over 160 other enterprises.

Why Salesforce Misconfigurations Are Dangerous

The Salesforce Experience Cloud platform itself has not been compromised. The vulnerability lies in how customers configure their deployments — a class of risk that Salesforce has consistently flagged but that organizations frequently overlook.

The core issue is the guest user profile: a special account that represents unauthenticated visitors to an Experience Cloud site. When administrators grant this profile excessive permissions — particularly the "API Enabled" system permission — external parties can query Salesforce CRM data directly via the Aura framework API, without ever logging in.

Common misconfigurations that enabled ShinyHunters' access:

MisconfigurationRisk
"API Enabled" on guest profileAllows direct REST/Aura API access without authentication
Broad object-level permissionsExposes CRM records (contacts, leads, accounts) to anonymous queries
"Portal User Visibility" enabledExpands data visibility beyond intended scope
Self-registration without restrictionsEnables mass account creation for further access

Remediation for Salesforce Administrators

Organizations using Salesforce Experience Cloud should audit their guest user profiles immediately:

  1. Remove "API Enabled" from the guest user system permissions
  2. Review all object permissions on the guest profile and apply least-privilege
  3. Disable guest access to public API endpoints unless explicitly required
  4. Uncheck "Portal User Visibility" and "Site User Visibility" in Sharing Settings
  5. Disable self-registration if not actively in use
  6. Run Salesforce Health Check to identify overprivileged configurations
Salesforce Setup → Users → Guest User → Edit Profile
→ System Permissions → Uncheck: API Enabled, View All Data
→ Object Settings → Review each object individually

Use the Salesforce Security Center and the community-contributed "Salesforce Misconfiguration Scanner" tool to assess exposure across Experience Cloud sites.

Context: McGraw-Hill and Education Sector Risk

McGraw-Hill is one of the largest educational content publishers in the world, serving K–12 schools, universities, and professional development markets across more than 130 countries. Its Salesforce deployment likely contains student and educator contact data, institutional customer records, and potentially data subject to educational privacy regulations such as FERPA (U.S.) and GDPR (EU).

The education sector has historically underinvested in cybersecurity relative to the sensitivity of data it handles. ShinyHunters' targeting of McGraw-Hill signals continued threat actor interest in education industry data, which commands value in credential and identity markets.

References

  • Educational company McGraw Hill says Salesforce misconfiguration led to data leak — The Record
  • McGraw-Hill confirms data breach following extortion threat — BleepingComputer
  • ShinyHunters breach 400 companies via Salesforce Experience Cloud — Help Net Security
#Data Breach#ShinyHunters#Salesforce#McGraw-Hill#Education#Misconfiguration

Related Articles

McGraw-Hill Attributes Data Leak to Salesforce Guest User Misconfiguration

McGraw-Hill confirms that a Salesforce Experience Cloud guest user misconfiguration — not a breach of core systems — was the source of the data leak claimed by ShinyHunters, who threatened to publish 45 million records unless a ransom was paid.

5 min read

McGraw-Hill Confirms Data Breach Following Salesforce Extortion Threat

Education giant McGraw-Hill has confirmed a data breach after hackers exploited a Salesforce Experience Cloud misconfiguration as part of the ongoing ShinyHunters campaign. The group set an extortion deadline, claiming access to millions of records.

4 min read

McGraw-Hill Confirms Data Breach After ShinyHunters Salesforce Exploit

Education giant McGraw-Hill has confirmed a data breach after hackers exploited a Salesforce Experience Cloud misconfiguration, part of a ShinyHunters campaign targeting 300–400 organizations and claiming 45 million stolen records.

4 min read
Back to all News