Close Menu
  • Home
  • Cybercrime and Ransomware
  • Emerging Tech
  • Threat Intelligence
  • Expert Insights
  • Careers and Learning
  • Compliance

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

WantToCry Ransomware Exploits SMB to Remotely Encrypt Files

May 21, 2026

Critical Breach: Internal Repositories Compromised via Malicious Nx Console Extension

May 21, 2026

Dark Web Brokers Resell Old Breaches as New Corporate Data Leaks

May 21, 2026
Facebook X (Twitter) Instagram
The CISO Brief
  • Home
  • Cybercrime and Ransomware
  • Emerging Tech
  • Threat Intelligence
  • Expert Insights
  • Careers and Learning
  • Compliance
Home » Extortion Group Leaks Millions of Salesforce Records
Cybercrime and Ransomware

Extortion Group Leaks Millions of Salesforce Records

Staff WriterBy Staff WriterOctober 13, 2025No Comments4 Mins Read3 Views
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest WhatsApp Email

Summary Points

  1. The Scattered LAPSUS$ Hunters hacking group leaked data from multiple organizations, including Salesforce, Qantas, Vietnam Airlines, and others, following a ransom demand.
  2. Despite claiming to have stolen data from 39 victims, only six organizations’ data was leaked, with the group stating further leaks are not imminent.
  3. Salesforce refused to pay the ransom, and the hackers publicly posted the stolen data on leak sites, but some claims of additional data theft, like Telstra’s, were debunked.
  4. Major organizations like Qantas have taken legal and cybersecurity measures to analyze and contain the breach, but the incident highlights ongoing risks of data exfiltration and extortion.

Key Challenge

The recent cyberattack orchestrated by the Scattered LAPSUS$ Hunters, a subgroup linked to the notorious hacking factions Lapsus$, Scattered Spider, and ShinyHunters, resulted in the leak of millions of sensitive records stolen from various organizations, notably Salesforce customers. The group claimed responsibility for hacking into Salesforce’s systems and stealing data from at least 39 clients, including prominent companies like Albertsons, Fujifilm, GAP, and Vietnam Airlines, although only six victims’ data has been publicly released so far. The hackers then sold access to the stolen data on surface-web forums before releasing it freely on the dark web, despite some victims reportedly paying ransom demands—although there is no conclusive proof of such payments. Salesforce refused to pay the ransom, deeming the extortion threats baseless, and is investigating the breach. Conversely, companies like Qantas and Vietnam Airlines are assessing the scope of the leak, with Qantas having to analyze the potential impact on approximately 6 million customers after attackers exploited a third-party contact center platform. In addition to the Salesforce breach, the hackers falsely claimed to have stolen data from Telstra, an Australian telecom company, which was later proven to be misinformation, illustrating their tendency to exaggerate or falsely claim stolen data for notoriety. This attack underscores ongoing vulnerabilities in corporate cybersecurity defenses and raises concerns over the integrity, privacy, and security of personal and corporate data in an increasingly digital world.

Risk Summary

The scattered LAPSUS$ Hunters extortion group has recently leaked millions of records stolen from various organizations, notably targeting Salesforce customers and publicly revealing data of over 7.3 million Vietnam Airlines accounts, including personal identifiers like names, emails, phone numbers, and loyalty details. This attack, part of a broader pattern of cyber extortion and data theft by groups linked to the notorious Lapsus$ and ShinyHunters, underscores the growing sophistication and persistence of cybercriminals exploiting vulnerabilities in cloud-based and third-party platforms. Despite claims of ransom payments and efforts to limit leaks, only a fraction of stolen data has been publicly disclosed, highlighting the persistent threat to organizational and consumer data integrity. These breaches expose sensitive personal information, risking identity theft, financial fraud, and erosion of trust, while emphasizing the critical need for robust cybersecurity measures, proactive threat detection, and legal enforcement to mitigate the profound economic and reputational impacts of cyber risks in an increasingly digital world.

Possible Remediation Steps

Timely remediation is crucial when a data breach like the "Extortion Group Leaks Millions of Records From Salesforce Hacks" occurs because swift action can significantly reduce potential damage, protect sensitive information, and prevent further exploitation by malicious actors. Acting promptly minimizes the risk of data misuse, preserves organizational reputation, and ensures compliance with data protection regulations.

Immediate Response

  • Isolate affected systems to prevent further infiltration
  • Initiate incident response protocols

Assessment and Analysis

  • Conduct a thorough forensic investigation
  • Identify the scope and nature of compromised data

Notification and Communication

  • Inform relevant stakeholders and authorities
  • Notify affected individuals in line with legal obligations

Security Enhancement

  • Patch vulnerabilities exploited during the attack
  • Change all compromised credentials and enable multi-factor authentication

Data Protection

  • Implement additional encryption on sensitive data
  • Review and update access controls and permissions

Long-term Prevention

  • Conduct regular security audits and vulnerability scans
  • Train staff on cybersecurity best practices
  • Establish continuous monitoring systems

Explore More Security Insights

Stay informed on the latest Threat Intelligence and Cyberattacks.

Understand foundational security frameworks via NIST CSF on Wikipedia.

Disclaimer: The information provided may not always be accurate or up to date. Please do your own research, as the cybersecurity landscape evolves rapidly. Intended for secondary references purposes only.

Cyberattacks-V1

CISO Update Cybersecurity data leak Featured MX1 Salesforce hack Scattered Spider ShinyHunters
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleUnlocking Security: The Hidden Superpower of Human Readiness Testing
Next Article Oracle EBS Patch Uncovers Vulnerability Risking Sensitive Data Access
Avatar photo
Staff Writer
  • Website

John Marcelli is a staff writer for the CISO Brief, with a passion for exploring and writing about the ever-evolving world of technology. From emerging trends to in-depth reviews of the latest gadgets, John stays at the forefront of innovation, delivering engaging content that informs and inspires readers. When he's not writing, he enjoys experimenting with new tech tools and diving into the digital landscape.

Related Posts

WantToCry Ransomware Exploits SMB to Remotely Encrypt Files

May 21, 2026

Dark Web Brokers Resell Old Breaches as New Corporate Data Leaks

May 21, 2026

Void Botnet Harnesses Ethereum Smart Contracts for Secure C2 Control

May 20, 2026

Comments are closed.

Latest Posts

WantToCry Ransomware Exploits SMB to Remotely Encrypt Files

May 21, 2026

Dark Web Brokers Resell Old Breaches as New Corporate Data Leaks

May 21, 2026

Void Botnet Harnesses Ethereum Smart Contracts for Secure C2 Control

May 20, 2026

GitHub: Internal Repositories Affected by Poisoned VS Code Extension Attack

May 20, 2026
Don't Miss

WantToCry Ransomware Exploits SMB to Remotely Encrypt Files

By Staff WriterMay 21, 2026

Quick Takeaways WantToCry ransomware targets organizations by exploiting exposed SMB ports rather than dropping malware…

Dark Web Brokers Resell Old Breaches as New Corporate Data Leaks

May 21, 2026

Void Botnet Harnesses Ethereum Smart Contracts for Secure C2 Control

May 20, 2026

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Recent Posts

  • WantToCry Ransomware Exploits SMB to Remotely Encrypt Files
  • Critical Breach: Internal Repositories Compromised via Malicious Nx Console Extension
  • Dark Web Brokers Resell Old Breaches as New Corporate Data Leaks
  • Chainguard and FINOS Lead the AI Supply Chain Security Revolution
  • Void Botnet Harnesses Ethereum Smart Contracts for Secure C2 Control
About Us
About Us

Welcome to The CISO Brief, your trusted source for the latest news, expert insights, and developments in the cybersecurity world.

In today’s rapidly evolving digital landscape, staying informed about cyber threats, innovations, and industry trends is critical for professionals and organizations alike. At The CISO Brief, we are committed to providing timely, accurate, and insightful content that helps security leaders navigate the complexities of cybersecurity.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

WantToCry Ransomware Exploits SMB to Remotely Encrypt Files

May 21, 2026

Critical Breach: Internal Repositories Compromised via Malicious Nx Console Extension

May 21, 2026

Dark Web Brokers Resell Old Breaches as New Corporate Data Leaks

May 21, 2026
Most Popular

Protecting MCP Security: Defeating Prompt Injection & Tool Poisoning

January 30, 202632 Views

Unlock the Power of Free WormGPT: Harnessing DeepSeek, Gemini, and Kimi-K2 AI Models

November 27, 202530 Views

The New Face of DDoS is Impacted by AI

August 4, 202527 Views

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025

Categories

  • Compliance
  • Cyber Updates
  • Cybercrime and Ransomware
  • Editor's pick
  • Emerging Tech
  • Events
  • Featured
  • Insights
  • Most Read
  • Threat Intelligence
  • Uncategorized
© 2026 thecisobrief. Designed by thecisobrief.
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions

Type above and press Enter to search. Press Esc to cancel.