Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

OpenAI’s Promptfoo Deal Plugs Agentic AI Testing Gap

March 10, 2026

How to Protect Your SaaS from Bot Attacks with SafeLine WAF

March 10, 2026

Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials

March 10, 2026
Facebook X (Twitter) Instagram
Tuesday, March 10
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»ShinyHunters Targets Hundreds of Websites in New Salesforce Campaign
News

ShinyHunters Targets Hundreds of Websites in New Salesforce Campaign

Team-CWDBy Team-CWDMarch 10, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Salesforce has urged Experience Cloud customers to audit their website configurations after reports that a notorious threat group has already stolen data from hundreds of companies.

The SaaS giant said that it had been tracking an increase in threat actor activity targeting misconfigurations of publicly accessible sites built using its Experience Cloud platform.

“Specifically, we have identified a campaign in which malicious actors are exploiting customers’ overly permissive Experience Cloud guest user configurations to potentially access more data than targeted organizations intended,” it explained.

The group has been using a customized version of an open source tool originally developed by Mandiant (Aura Inspector) to perform mass scanning of the /s/sfsites/aura API endpoint. The tool apparently identifies vulnerable CRM objects and extracts data from misconfigured endpoints, Salesforce said.

“Data harvested in these scans, such as names and phone numbers, is often used to build follow-on targeted social engineering and vishing (voice phishing) campaigns,” it continued.

Read more on ShinyHunters campaigns: New Data Theft Campaign Targets Salesforce via Salesloft App.

Salesforce was at pains to point out that the threat actors are exploiting a “customer-configured guest user setting, not a platform security flaw.”

ShinyHunters Gives a Final Warning

The infamous ShinyHunters group has claimed responsibility for the campaign. In screenshots from its leak site published on X (formerly Twitter) it claimed to have breached “several hundreds” of companies.

It claims to have compromised around 400 websites and 100 “high-profile companies.”

That would suggest that it did indeed use the contact details cited by Salesforce and obtained via the website intrusions in order to perform follow-on social engineering, network intrusions and wider data theft.

Salesforce Urges Immediate Action

Salesforce claimed that any Experience Cloud customers that are using the guest user profile and have configured permissions “to allow public access to objects and fields not intended to be publicly available” could be affected.

It urged these customers to:

  • Audit guest user permissions and enforce a least privilege access model to ensure these profiles are restricted to the “absolute minimum” objects and fields needed for the site to function
  • Ensure the Default External Access for all objects is set to “private”
  • Uncheck “Allow guest users to access public APIs” in site settings and uncheck “API Enabled” in the guest user profile’s System Permissions
  • Uncheck “Portal User Visibility” and “Site User Visibility” in Sharing Settings to stop guest users from enumerating internal organization members
  • If the site does not require unauthenticated visitors to create their own accounts, disable self-registration
  • Review Aura Event Monitoring logs for unusual access patterns 

​ShinyHunters has a long track record of going after Salesforce customers, having targeted their instances on multiple occasions in connected campaigns last year.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleNorth Korean Hackers Publish 26 npm Packages Hiding Pastebin C2 for Cross-Platform RAT
Next Article APT28 Tied to CVE-2026-21513 MSHTML 0-Day Exploited Before Feb 2026 Patch Tuesday
Team-CWD
  • Website

Related Posts

News

OpenAI’s Promptfoo Deal Plugs Agentic AI Testing Gap

March 10, 2026
News

How to Protect Your SaaS from Bot Attacks with SafeLine WAF

March 10, 2026
News

Russian Hackers Target WhatsApp and Signal Accounts

March 10, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views

Near-ultrasonic attacks on voice assistants

September 11, 20256 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views
Our Picks

Is it OK to let your children post selfies online?

February 17, 2026

What it is and how to protect yourself

January 8, 2026

Children and chatbots: What parents should know

January 23, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.