ForensicsS | Private Detective & Digital Forensics Investigation Experts
  • info@forensicss.com

    Send Email

  • 11400 West Olympic Blvd, Los Angeles, CA 90064

  • Home
  • About Us
  • Services
    • Domestic Investigation
      • Los Angeles Private Eye
      • Infidelity Investigations
      • Asset Investigations
      • Private Detective Orange County
      • Child Custody Investigations
      • Missing Person Locates
      • Wire Fraud
      • Corporate Security Investigations
      • Surveillance Operations
      • Financial Fraud Investigations
      • Asset and Hidden Finances Investigations
      • Bug Sweep TSCM Investigation
    • Cyber Security
      • Cyber Bullying Online Investigation
      • Penetration Testing Service
      • Social Media Monitoring
      • Romance Scam Investigator
      • Cyber Stalking Investigation
      • Crypto Scam Investigation
      • Cyber Security Assessment
      • Cyber Harassment Online Investigator
      • Ransomware Attack Investigation
      • Social Media Investigator
      • Extortion Investigation services
      • Background Screening
      • Insurance Fraud Detective
      • Forensic Accounting
      • Online Identity Theft
      • Online Blackmail
      • Cell Phone Forensics
      • Automotive Forensics
      • Audio Video Forensics
      • E-Discovery
      • Computer and Cell Phone Forensics
  • Closed Cases
    • Closed Cases
    • Case Details
  • News
  • Contact
310-270-0598

Confidentiality Guaranteed

310-270-0598

Confidentiality Guaranteed

Logo

Contact Info

  • 11400 West Olympic Blvd, Los Angeles, CA 90064
  • 310-270-0598
  • info@forensicss.com

    Blog Details

      ForensicsS | Private Detective & Digital Forensics Investigation Experts > News > Uncategorized > ShinyHunters in the support of Salesforce info theft attacks at Qantas, Allianz Life, and LVMH
    ShinyHunters in the support of Salesforce info theft attacks at Qantas, Allianz Life, and LVMH
    30
    Jul
    • ForensicsS
    • 0 Comments

    ShinyHunters in the support of Salesforce info theft attacks at Qantas, Allianz Life, and LVMH

    Scam detection

    scam detection Smiley face hacker

    A wave of information breaches impacting firms like Qantas, Allianz Life, LVMH, and Adidas has been linked to the ShinyHunters extortion community, which has been the usage of issue phishing attacks to snatch info from Salesforce CRM conditions.

    In June, Google’s Menace Intelligence Community (GTIG) warned that threat actors tracked as UNC6040 were focused on Salesforce customers in social engineering attacks.

    In these attacks, the threat actors impersonated IT toughen workers in cellphone calls to centered workers, making an try to persuade them into visiting Salesforce’s linked app setup internet page. On this internet page, they were advised to enter a “connection code”, which linked a malicious version of Salesforce’s Knowledge Loader OAuth app to the target’s Salesforce atmosphere.

    In some conditions, the Knowledge Loader recount used to be renamed to “My Ticket Portal,” to fabricate it extra convincing in the attacks.

    scam detection Prompt to enter connection code
    Counseled to enter connection code
    Offer: Google

    GTIG says that these attacks were in general completed through vishing (issue phishing), however credentials and MFA tokens were also stolen through phishing pages that impersonated Okta login pages.

    Around the time of this record, a pair of firms reported info breaches engrossing third-occasion customer provider or cloud-based mostly CRM systems.

    LVMH subsidiaries Louis Vuitton, Dior, and Tiffany & Co. each disclosed unauthorized assemble entry to to a customer records database, with Tiffany Korea notifying customers the attackers breached a “vendor platform used for managing customer data.”

    Adidas, Qantas, and Allianz Life also reported breaches engrossing third-occasion systems, with Allianz confirming it used to be a third-occasion customer relationship administration platform.

    “On July 16, 2025, a malicious threat actor gained access to a third-party, cloud-based CRM system used by Allianz Life Insurance Company of North America (Allianz Life),” an Allianz Life spokesperson advised BleepingComputer.

    While BleepingComputer has realized that the Qantas info breach also enthusiastic a third-occasion customer relationship administration platform, the corporate will now not ascertain it is Salesforce. Alternatively, previous reporting from local media claims the info used to be stolen from Qantas’ Salesforce instance.

    Moreover, courtroom documents issue that the threat actors centered “Accounts” and “Contacts” database tables, each of which are Salesforce objects.

    While none of these firms assemble publicly named Salesforce, BleepingComputer has since confirmed that every were centered in the identical advertising and marketing campaign detailed by Google.

    The attacks assemble no longer ended in public extortion or info leaks but, with BleepingComputer studying that the threat actors try to privately extort firms over email, the set they name themselves as ShinyHunters.

    It is believed that as soon as these extortion attempts fail, the threat actors will open stolen records in a lengthy wave of leaks, identical to ShinyHunter’s previous Snowflake attacks.

    Scam detection Who’s ShinyHunters

    The breaches assemble triggered confusion amongst the cybersecurity community and the media, including BleepingComputer, with the attacks attributed to Scattered Spider (tracked by Mandiant as UNC3944), as these threat actors were also focused on the aviation, retail, and insurance sectors around the identical time and demonstrated identical ways.

    Alternatively, threat actors associated with Scattered Spider have a tendency to price plump-blown network breaches, culminating with info theft and, generally, ransomware. ShinyHunters, tracked as UNC6040, on the varied hand, tends to point of interest extra on info-theft extortion attacks focused on a particular cloud platform or internet software program.

    It is BleepingComputer’s and some safety researchers’ perception that every UNC6040 and UNC3944 consist of overlapping members that keep in touch interior the identical on-line communities. The threat community will be believed to overlap with “The Com,” a network of experienced English-speaking cybercriminals.

    “According to Recorded Future intelligence, the overlapping TTPs between known Scattered Spider and ShinyHunters attacks indicate likely some crossover between the two groups,” Allan Liska, an Intelligence Analyst for Recorded Future, advised BleepingComputer.

    Other researchers assemble advised BleepingComputer that ShinyHunters and Scattered Spider seem like working in lockstep, focused on the identical industries at the identical time, making it more durable to attribute attacks.

    Some also deem that every groups assemble ties to threat actors from the now-defunct Lapsus$ hacking community, with experiences indicating that one among the no longer too lengthy ago arrested Scattered Spider hackers used to be also in Lapsus$.

    One more theory is that ShinyHunters is acting as an extortion-as-a-provider, the set they extort firms on behalf of quite a lot of threat actors in replace for a income half, identical to how ransomware-as-a-provider gangs operate.

    This theory is supported by previous conversations BleepingComputer has had with ShinyHunters, the set they claimed no longer to be in the support of a breach, however simply acting because the vendor of the stolen info.

    These breaches encompass PowerSchool, Oracle Cloud, the Snowflake info-theft attacks, AT&T, NitroPDF, Wattpad, MathWay, and many extra.

    scam detection ShinyHunters leaking attempting to sell AT&T data breach
    ShinyHunters leaking making an try to promote AT&T info breach
    Offer: BleepingComputer

    To muddy the waters additional, there were a huge form of arrests of folk linked to the name “ShinyHunters,” including these that were arrested for the Snowflake info-theft attacks, breaches at PowerSchool, and the operation of the Breached v2 hacking forum.

    Yet even after these arrests, unique attacks occur with firms receiving extortion emails stating, “We are ShinyHunters,” relating to themselves as a “collective.”

    Scam detection Retaining Salesforce conditions from attacks

    In a assertion to BleepingComputer, Salesforce emphasised that the platform itself used to be no longer compromised, however rather, customers’ accounts are being breached through social engineering.

    “Salesforce has not been compromised, and the issues described are not due to any known vulnerability in our platform. While Salesforce builds enterprise-grade security into everything we do, customers also play a critical role in keeping their data safe — especially amid a rise in sophisticated phishing and social engineering attacks,” Salesforce advised BleepingComputer.

    “We continue to encourage all customers to follow security best practices, including enabling multi-factor authentication (MFA), enforcing the principle of least privilege, and carefully managing connected applications. For more information, please visit: https://www.salesforce.com/blog/give protection to-in opposition to-social-engineering/.”

    Salesforce is urging customers to enhance their safety posture by:

    • Enforcing relied on IP ranges for logins
    • Following the theorem of least privilege for app permissions
    • Enabling multi-element authentication (MFA)
    • Limiting utilize of linked apps and managing assemble entry to policies
    • The usage of Salesforce Defend for superior threat detection, occasion monitoring, and transaction policies
    • Adding a designated Safety Contact for incident communication

    Further details on these mitigations will also be stumbled on in Salesforce’s guidance linked above.


    scam detection Wiz

    Scam detection The Board File Deck CISOs Essentially Exhaust

    CISOs know that getting board aquire-in starts with a transparent, strategic look of how cloud safety drives trade ticket.

    This free, editable board record deck helps safety leaders show conceal threat, impact, and priorities in positive trade terms. Turn safety updates into meaningful conversations and sooner decision-making in the boardroom.

    Be taught Extra

    • Tags

    • cybercrime email-fraud forensics|digital-forensics hacker Investigation malware malwarephishing-attack online-scam private-detective scam|fraud private-eye cyber|cybersecurity private-eye phishing|phishing-attack private-investigator private-investigator hacking|hacker Salesforce ShinyHunters

    Recent Posts

    • Lithuania Prime Minister Gintautas Paluckas Steps Down After Investigations And Protests
    • Edwin Hodge & Caitlin Bassett Join ‘The Terminal Checklist’ For Season 2
    • JWST sees beauty in the death of a well known individual, presents a preview of what’s in retailer for our solar
    • ShinyHunters in the support of Salesforce info theft attacks at Qantas, Allianz Life, and LVMH
    • Trump Torpedoes Kash Patel’s Strive and Distract From Epstein

    Recent Comments

    No comments to show.

    Categories

    • cybersecurity
    • Investigations
    • Uncategorized

    Recent Posts

    Lithuania Prime Minister Gintautas Paluckas Steps Down After Investigations And Protests
    July 31, 2025
    Lithuania Prime Minister Gintautas Paluckas Steps Down After Investigations And Protests
    Edwin Hodge & Caitlin Bassett Join ‘The Terminal Checklist’ For Season 2
    July 30, 2025
    Edwin Hodge & Caitlin Bassett Join ‘The Terminal Checklist’ For Season 2
    JWST sees beauty in the death of a well known individual, presents a preview of what’s in retailer for our solar

    Popular Tags

    administration Bongino calls Crypto Cyber cybercrime cybercrimefraud cybercrimehacker cybercrimephishing-attack cybersecurity Department digital-forensics email-fraud Epstein FBI’s forensics|digital-forensics Former fraud hacker hackers Investigation investigationcybersecurity Korean Launches Malik malware malwarefraud malwarephishing-attack Microsoft North online-scam online-scamphishing-attack orders Patel phishing-attack Police private-detective scam|fraud private-eye cyber|cybersecurity private-eye phishing|phishing-attack private-investigator private-investigator hacking|hacker probe suspect Trump warns

    Forensics – Trusted Experts in Surveillance, Cyber Security, Background Checks, and Digital Forensics across California.

    • 310-270-0598
    • info@forensicss.com
    • 11400 West Olympic Blvd, Los Angeles, CA 90064

    Explore

    • News
    • About
    • Our Services
    • Find A Person
    • Child Custody
    • Contact Us
    • Los Angeles
    • Orange County
    • San Diego

    Services

    • Cyber Security
    • Online Blackmail
    • Cell Phone Forensics
    • Domestic Investigation
    • Social Media Investigator
    • Crypto Scam Investigation

    Newsletter

    Sign up email to get our daily latest news & updates from us

    © Copyright 2021 by KRIGO