Data ProtectionIndustry Insights & News

Google Salesforce Hack: Causes, Risks and Your Next Steps

Illustration highlighting the Google Salesforce hack by ShinyHunters, emphasizing risks for small and medium-sized business data
Profile_Photo_Square_296d6cc1ff_300x300.jpg
Deborah
12.08.2025

At a Glance

  • What happened: In June 2025, Google’s internal Salesforce system was compromised by the hacker group ShinyHunters (UNC6040)
  • Data affected: Only basic SMB contact info such as company names, emails, phone numbers and notes. No passwords or financial data
  • Attack method: Voice phishing (vishing), manipulated Salesforce Connected App, and custom Python tools
  • Risks: Targeted phishing campaigns, reputational damage, possible extortion via data leak sites
  • Key takeaway: Staff training, MFA, least privilege access and strict control of Connected Apps, ideally with professional compliance support

Background – What Happened?

In June 2025, an internal Salesforce CRM system at Google was hacked. Critically, this system is specifically used for managing customer and contact information of small and medium-sized businesses, making the breach particularly relevant for many companies. The attackers, known as ShinyHunters (UNC6040), gained access to contact information and sales notes.

Although the stolen information is considered basic and largely publicly accessible, it still carries significant potential for misuse. This incident is part of a larger, ongoing campaign targeting Salesforce databases. Other victims include Adidas, Qantas, Cisco, Allianz Life, Pandora, and several LVMH brands. The focus is on exploiting human weaknesses rather than technical vulnerabilities in the Salesforce platform.

Google acted quickly, cutting off unauthorized access within a short time. However, the company warned of possible follow-on risks, especially in connection with extortion tactics.

Table of Contents:

Attack Method: How Google’s Data Was Stolen

Social Engineering via Vishing

The hackers used voice phishing, calling employees and posing as internal IT support. Their goal was to get employees to authorize a manipulated version of the Salesforce Data Loader, often disguised as a legitimate app named “My Ticket Portal.”

Technical Execution

The attacks were carried out via Connected Apps using OAuth integration. In some cases, custom Python scripts were used to automate uploads and downloads and bypass security controls.

The operation was split between multiple clusters. UNC6040 handled the initial compromise, while UNC6240 may have been responsible for potential extortion and data release.

Extortion Risk via Data Leak Sites

Google believes ShinyHunters may be preparing to post the stolen data on a data leak site. These platforms are used to publish stolen data and pressure companies into paying ransom. Even seemingly harmless basic data can be leveraged for targeted follow-up attacks.

Who Are ShinyHunters and Who Else Have They Targeted?

ShinyHunters have been active in the cybercrime scene for years, known for breaching major brands and their cloud databases. Victims have included Ticketmaster, Santander, Dior, and Louis Vuitton.

Their strength lies in combining social engineering with deception, exploiting the cloud connectivity of tools like Salesforce. Platform vulnerabilities are rarely the target. The human factor is the main entry point.

Risks for Businesses: What Does This Mean for You?

  • Phishing wave: Even basic data is enough to craft convincing phishing emails or calls
  • Reputational damage: Public or misused data can erode trust with customers and partners
  • Compliance risks: Gaps in access controls can lead to fines under regulations like GDPR, even if sensitive data was not exposed
  • Financial loss: Incidents like this can cost millions in response measures, legal fees, and customer communications

Immediate Actions: What You Can Do Now

MeasureDescription
Employee AwarenessRegular training on social engineering, vishing and cloud security
MFA & Least PrivilegeMulti-factor authentication everywhere, grant only necessary permissions
Control Connected AppsAllow only vetted apps, perform regular app audits
Monitoring & LoggingAutomatically monitor suspicious activity, especially in cloud platforms
Incident Response PlanSimulate breach scenarios, define clear escalation paths and communication plans

Case Study: Pandora

Pandora, a global jewelry retailer, was also hit in this attack wave. Names and email addresses were stolen. Passwords and payment details were untouched. Still, Pandora warned customers about potential phishing attempts and urged caution with unexpected communications.

Investigations and Law Enforcement

In June 2025, four suspected members of ShinyHunters were arrested in France. Law enforcement agencies from multiple countries are working together to dismantle the group’s infrastructure.

Despite these arrests, the attackers remain highly adaptive, with separate cells operating independently and evolving their methods.

FAQ – Quick Answers

Q: Were sensitive data like passwords stolen from Google? 
A: No. Only basic company names, phone numbers, emails and notes were taken.

Q: Why target Salesforce?
A: Salesforce holds valuable customer data and is cloud-accessible. Attackers exploit human vulnerabilities like vishing rather than technical flaws.

Q: What is a data leak site?
A: A website where stolen data is published, often to pressure companies into paying ransom.

Q: How quickly should I respond to a suspected breach?
A: Immediately. Even a few hours’ delay can greatly increase the risk of further data theft or public release.

Conclusion: Where heyData Comes In

The Google Salesforce hack proves that even tech giants can fall victim to social engineering. Technical safeguards are only half the battle. The human factor remains the weakest link.

This is where heyData can help:

With heyData, you get not just tools, but expert guidance to make your organization resilient against attacks like this

Important: The content of this article is for informational purposes only and does not constitute legal advice. The information provided here is no substitute for personalized legal advice from a data protection officer or an attorney. We do not guarantee that the information provided is up to date, complete, or accurate. Any actions taken on the basis of the information contained in this article are at your own risk. We recommend that you always consult a data protection officer or an attorney with any legal questions or problems.