Found 2 bookmarks
Newest
Scattered LAPSUS$ Hunters Ransomware Group Claims New Victims on New Website
Scattered LAPSUS$ Hunters Ransomware Group Claims New Victims on New Website
  • Daily Dark Web - dailydarkweb.net October 3, 2025 The newly formed cybercrime alliance, โ€œScattered LAPSUS$ Hunters,โ€ has launched a new website detailing its claims of a massive data breach affecting Salesforce and its extensive customer base. This development is the latest move by the group, a notorious collaboration between members of the established threat actor crews ShinyHunters, Scattered Spider, and LAPSUS$. On their new site, the group is extorting Salesforce directly, threatening to leak nearly one billion records with a ransom deadline of October 10, 2025. This situation stems from a widespread and coordinated campaign that targeted Salesforce customers throughout mid-2025. According to security researchers, the attacks did not exploit a vulnerability in Salesforceโ€™s core platform. Instead, the threat actors, particularly those from the Scattered Spider group, employed sophisticated social engineering tactics. The primary method involved voice phishing (vishing), where attackers impersonated corporate IT or help desk staff in phone calls to employees of target companies. These employees were then manipulated into authorizing malicious third-party applications within their companyโ€™s Salesforce environment. This action granted the attackers persistent access tokens (OAuth), allowing them to bypass multi-factor authentication and exfiltrate vast amounts of data. The alliance has now consolidated the data from these numerous breaches for this large-scale extortion attempt against Salesforce itself. The website lists dozens of high-profile Salesforce customers allegedly compromised in the campaign. The list of alleged victims posted by the group includes: Toyota Motor Corporations (๐Ÿ‡ฏ๐Ÿ‡ต): A multinational automotive manufacturer. FedEx (๐Ÿ‡บ๐Ÿ‡ธ): A global courier delivery services company. Disney/Hulu (๐Ÿ‡บ๐Ÿ‡ธ): A multinational mass media and entertainment conglomerate. Republic Services (๐Ÿ‡บ๐Ÿ‡ธ): An American waste disposal company. UPS (๐Ÿ‡บ๐Ÿ‡ธ): A multinational shipping, receiving, and supply chain management company. Aeromรฉxico (๐Ÿ‡ฒ๐Ÿ‡ฝ): The flag carrier airline of Mexico. Home Depot (๐Ÿ‡บ๐Ÿ‡ธ): The largest home improvement retailer in the United States. Marriott (๐Ÿ‡บ๐Ÿ‡ธ): A multinational company that operates, franchises, and licenses lodging. Vietnam Airlines (๐Ÿ‡ป๐Ÿ‡ณ): The flag carrier of Vietnam. Walgreens (๐Ÿ‡บ๐Ÿ‡ธ): An American company that operates the second-largest pharmacy store chain in the United States. Stellantis (๐Ÿ‡ณ๐Ÿ‡ฑ): A multinational automotive manufacturing corporation. McDonaldโ€™s (๐Ÿ‡บ๐Ÿ‡ธ): A multinational fast food chain. KFC (๐Ÿ‡บ๐Ÿ‡ธ): A fast food restaurant chain that specializes in fried chicken. ASICS (๐Ÿ‡ฏ๐Ÿ‡ต): A Japanese multinational corporation which produces sportswear. GAP, INC. (๐Ÿ‡บ๐Ÿ‡ธ): A worldwide clothing and accessories retailer. HMH (hmhco.com) (๐Ÿ‡บ๐Ÿ‡ธ): A publisher of textbooks, instructional technology materials, and assessments. Fujifilm (๐Ÿ‡ฏ๐Ÿ‡ต): A multinational photography and imaging company. Instructure.com โ€“ Canvas (๐Ÿ‡บ๐Ÿ‡ธ): An educational technology company. Albertsons (Jewel Osco, etc) (๐Ÿ‡บ๐Ÿ‡ธ): An American grocery company. Engie Resources (Plymouth) (๐Ÿ‡บ๐Ÿ‡ธ): A retail electricity provider. Kering (๐Ÿ‡ซ๐Ÿ‡ท): A global luxury group that manages brands like Gucci, Balenciaga, and Brioni. HBO Max (๐Ÿ‡บ๐Ÿ‡ธ): A subscription video on-demand service. Instacart (๐Ÿ‡บ๐Ÿ‡ธ): A grocery delivery and pick-up service. Petco (๐Ÿ‡บ๐Ÿ‡ธ): An American pet retailer. Puma (๐Ÿ‡ฉ๐Ÿ‡ช): A German multinational corporation that designs and manufactures athletic footwear and apparel. Cartier (๐Ÿ‡ซ๐Ÿ‡ท): A French luxury goods conglomerate. Adidas (๐Ÿ‡ฉ๐Ÿ‡ช): A multinational corporation that designs and manufactures shoes, clothing, and accessories. TripleA (aaa.com) (๐Ÿ‡บ๐Ÿ‡ธ): A federation of motor clubs throughout North America. Qantas Airways (๐Ÿ‡ฆ๐Ÿ‡บ): The flag carrier of Australia. CarMax (๐Ÿ‡บ๐Ÿ‡ธ): A used vehicle retailer. Saks Fifth (๐Ÿ‡บ๐Ÿ‡ธ): An American luxury department store chain. 1-800Accountant (๐Ÿ‡บ๐Ÿ‡ธ): A nationwide accounting firm. Air France & KLM (๐Ÿ‡ซ๐Ÿ‡ท/๐Ÿ‡ณ๐Ÿ‡ฑ): A major European airline partnership. Google Adsense (๐Ÿ‡บ๐Ÿ‡ธ): A program run by Google through which website publishers serve advertisements. Cisco (๐Ÿ‡บ๐Ÿ‡ธ): A multinational digital communications technology conglomerate. Pandora.net (๐Ÿ‡ฉ๐Ÿ‡ฐ): A Danish jewelry manufacturer and retailer. TransUnion (๐Ÿ‡บ๐Ÿ‡ธ): An American consumer credit reporting agency. Chanel (๐Ÿ‡ซ๐Ÿ‡ท): A French luxury fashion house. IKEA (๐Ÿ‡ธ๐Ÿ‡ช): A Swedish-founded multinational group that designs and sells ready-to-assemble furniture. According to the actor, the breach involves nearly 1 billion records from Salesforce and its clients. The allegedly compromised data includes: Sensitive Personally Identifiable Information (PII) Strategic business records that could impact market position Data from over 100 other demand instances hosted on Salesforce infrastructure
ยทdailydarkweb.netยท
Scattered LAPSUS$ Hunters Ransomware Group Claims New Victims on New Website
Cloudflare hit by data breach in Salesloft Drift supply chain attack
Cloudflare hit by data breach in Salesloft Drift supply chain attack
bleepingcomputer.com By Sergiu Gatlan September 2, 2025 Cloudflare is the latest company impacted in a recent string of Salesloft Drift breaches, part of a supply-chain attack disclosed last week. The internet giant revealed on Tuesday that the attackers gained access to a Salesforce instance it uses for internal customer case management and customer support, which contained 104 Cloudflare API tokens. Cloudflare was notified of the breach on August 23, and it alerted impacted customers of the incident on September 2. Before informing customers of the attack, it also rotated all 104 Cloudflare platform-issued tokens exfiltrated during the breach, even though it has yet to discover any suspicious activity linked to these tokens. "Most of this information is customer contact information and basic support case data, but some customer support interactions may reveal information about a customer's configuration and could contain sensitive information like access tokens," Cloudflare said. "Given that Salesforce support case data contains the contents of support tickets with Cloudflare, any information that a customer may have shared with Cloudflare in our support systemโ€”including logs, tokens or passwordsโ€”should be considered compromised, and we strongly urge you to rotate any credentials that you may have shared with us through this channel." The company's investigation found that the threat actors stole only the text contained within the Salesforce case objects (including customer support tickets and their associated data, but no attachments) between August 12 and August 17, after an initial reconnaissance stage on August 9. These exfiltrated case objects contained only text-based data, including: The subject line of the Salesforce case The body of the case (which may include keys, secrets, etc., if provided by the customer to Cloudflare) Customer contact information (for example, company name, requester's email address and phone number, company domain name, and company country) "We believe this incident was not an isolated event but that the threat actor intended to harvest credentials and customer information for future attacks," Cloudflare added. "Given that hundreds of organizations were affected through this Drift compromise, we suspect the threat actor will use this information to launch targeted attacks against customers across the affected organizations." Wave of Salesforce data breaches Since the start of the year, the ShinyHunters extortion group has been targeting Salesforce customers in data theft attacks, using voice phishing (vishing) to trick employees into linking malicious OAuth apps with their company's Salesforce instances. This tactic enabled the attackers to steal databases, which were later used to extort victims. Since Google first wrote about these attacks in June, numerous data breaches have been linked to ShinyHunters' social engineering tactics, including those targeting Google itself, Cisco, Qantas, Allianz Life, Farmers Insurance, Workday, Adidas, as well as LVMH subsidiaries Louis Vuitton, Dior, and Tiffany & Co. While some security researchers have told BleepingComputer that the Salesloft supply chain attacks involve the same threat actors, Google has found no conclusive evidence linking them. Palo Alto Networks also confirmed over the weekend that the threat actors behind the Salesloft Drift breaches stole some support data submitted by customers, including contact info and text comments. The Palo Alto Networks incident was also limited to its Salesforce CRM and, as the company told BleepingComputer, it did not affect any of its products, systems, or services. The cybersecurity company observed the attackers searching for secrets, including AWS access keys (AKIA), VPN and SSO login strings, Snowflake tokens, as well as generic keywords such as "secret," "password," or "key," which could be used to breach more cloud platforms to steal data in other extortion attacks.
ยทbleepingcomputer.comยท
Cloudflare hit by data breach in Salesloft Drift supply chain attack