Salesforce Data Breach: How ShinyHunters Turned a Phone Call Into a Global Data Heist

In 2025, one of the most coordinated and devastating SaaS-targeted cyber campaigns in recent history struck—and its bull’s-eye was Salesforce customers.

From Google to Adidas, from LVMH to Coca-Cola, attackers drained customer data like a ruptured artery, all without exploiting a single Salesforce vulnerability. The weapon? A phone call and a fake app.

This isn’t just another “data breach report.” This is the blueprint of a global supply-chain style attack that’s already in motion – and if your organization uses Salesforce, you’re already on the target list.

The Campaign: One Playbook, Many Victims

The ShinyHunters hacking group, notorious for breaches at AT&T, Snowflake, Ticketmaster, and Santander, launched a vishing-driven attack that combined low-tech social engineering with Salesforce’s OAuth connected app feature.

The method was nearly identical across victims:

  1. Vishing Call — Attackers posed as IT or Salesforce support.
  2. Malicious Connected App — Disguised as “Salesforce Data Loader” or a CRM utility.
  3. OAuth Access Granted — Employees entered an 8-digit code, unknowingly giving attackers API-level permissions.
  4. Data Exfiltration — Customer records, sales pipelines, HR data — anything the victim could see, the attackers could steal.

Why it worked: Salesforce trusted OAuth tokens too much, and most companies had no live monitoring for new app authorizations.

High-Profile Breach Victims & What Was Stolen

CompanyAttack VectorData ExposedEstimated Impact
GoogleVishing + Fake Data Loader AppSMB contact info & sales notesUndisclosed
AdidasFake CRM utility with OAuth accessCustomer entriesTens of thousands
LVMH (Louis Vuitton, Dior, Tiffany & Co.)IT impersonation, OAuth hijackCustomer profilesHundreds of thousands
Allianz LifeFake Salesforce integration toolContact info + policy data1.4 million
Coca-Cola Europacific PartnersFake analytics app23 million records23M
PandoraThird-party CRM provider breachNames & emailsUndisclosed

Common thread: MFA bypass via OAuth and rapid bulk API data pulls.

Understand what are the Common Causes of Data Breaches

Why This Isn’t a Salesforce Bug — And Why That’s Scarier

Salesforce confirmed there was no zero-day exploit. This was human zero-day exploitation — tricking employees into willingly granting access.

Fact: If your Salesforce admin approves a connected app with full data access, the attacker doesn’t need passwords, MFA, or exploits.

The Supply Chain SaaS Risk

When you rely on a third-party SaaS like Salesforce:

  • You inherit their attack surface.
  • You lose direct visibility into some access logs.
  • One breach can cascade to hundreds of organizations.

In this case, ShinyHunters hit multiple global brands within weeks using the same tactics — a dangerous sign of platform monoculture risk.

CHeck this guide to Prevent Data Breaches

How to Protect Your Salesforce Environment (Now, Not Later)

If your company runs Salesforce, assume you are a target. Here’s a hardened checklist:

1. Lock Down Connected Apps

  • Disable installation of unverified apps.
  • Require admin review for all OAuth scopes.

2. Tighten Role-Based Access Control (RBAC)

  • Limit who can run bulk exports or API queries.

3. Monitor in Real-Time

  • Alert on new app authorizations instantly.

4. Restrict API Access

  • Whitelist IP ranges and watch for abnormal queries.

5. Revoke Stale Tokens

  • Clear unused OAuth permissions regularly.

6. Train Against Vishing

  • Simulate phishing calls to prepare staff.

Strategic Takeaways

  • Your vendor’s risks are your risks — treat SaaS like it’s in your own data center.
  • Social engineering will bypass tech controls — train your humans as aggressively as you patch your software.
  • When one platform dominates an industry, attackers scale fast – a single campaign can compromise dozens of enterprises.
 A Comprehensive Guide - Defending Against Identity-Based Attacks

Final Word: This was not a breach of technology – it was a breach of trust. And until organizations treat SaaS-connected apps with the same rigor as on-prem systems, the next ShinyHunters campaign is already writing itself.

Pro Tip: If your “IT department” calls and asks you to install or connect a new Salesforce app, hang up and verify internally. That one decision could save millions.

Leave a Comment