The Scattered LAPSUS$ Hunters hacking group claims to have accessed data from around 40 customers of Salesforce, the cloud-based customer relationship management service, stealing almost one billion records.
On its dark web leak site, the hackers list numerous organisations whose Salesforce instances it claims to have breached via social engineering:
1-800Accountant, Adidas, AeroMexico, AirFrance-KLM, Albertsons, Alexander McQueen, ASICS, Balenciaga, Brioni, CarMax, Cartier, Chanel, Cisco, Disney/Hulu, Engie Resources, FedEx, Fujifilm, GAP, Google Adsense, HBO Max, Home Depot, IKEA, Instacart, Instructure.com – Canvas, Kering (Gucci, KFC, Marriott, McDonald’s, MHM, Pandora, Petco, Puma, Qantas Airways, Republic Services, Saks Fifth (Avenue), Stellantis, Toyota, TransUnion, TripleA, UPS, Vietnam Airlines, and Walgreens.
Each entry contains details of when the breach occurred, how much data has been exfiltrated, and a deadline for when a ransom has to be paid before the data is leaked.
For instance, in the case of FedEx the hackers claim to have compromised its data on 31 August 2025, stealing 1.1TB of information - of which over 166 million records are claimed to contain personally identifiable information, including full names, email addresses, phone numbers, residence address, employee information, support chat transcripts and more.
The hacker are demanding payment by this Friday, 10 October 2025.
In May, Adidas said that it was aware that some of its consumer data had been accessed "through a third-party customer service provider." In June, Google security researchers warned of the hacking campaign, only to find - in a cruel irony - that it had fallen foul of an attack that targeted one of its corporate databases run on Salesforce.
As more companies reported data breaches, Salesforce published a security advisory encouraging customers to enforce multi-factor authentication and other security measures, as well as warnings of social engineering and phishing attacks.
It appears that the hackers used the old-fashioned (but often highly effective) social engineering technique of making a phone call. By posing as IT support personnel, the hackers trick unwary employees into granting them access to sensitive systems or sharing sensitive credentials during the call.
Pretty much. During the phone call, the attackers trick the targeted user into downloading a modified version of Salesforce's own Data Loader app. If the app is authorised to connect to the organisation's Salesforce portal, vast amounts of data can be stolen by hackers.
In August, Google researchers warned that some attacks were exfiltrating data via Salesforce's integration with the third-party app, Salesloft Drift. In response, SalesLoft advised customers to refresh the access tokens used to connect Drift and Salesforce apps, and Salesforce has since disabled Drift's connection to its systems.
Salesforce has emphasised that its platform has not itself been compromised and that "this issue is not due to any known vulnerability in our technology." It has advised concerned customers to review their security settings and contact Salesforce's support team if they need assistance.
Bloomberg reports that a security notification has been sent to customers explaining that Salesforce will not pay the ransom demand:
"Allen Tsai, a Salesforce spokesperson, said the company won’t engage, negotiate with or pay any extortion demand. The company is aware of recent extortion attempts, and it remains in contact with affected customers to provide support, the spokesperson said."
Recommended steps to take immediately include:
I don't think so. Although all the headlines mention Salesforce, this clearly isn't a threat to their platform. Security needs to be hardened wherever you store your data to ensure that a similar technique cannot be used across other Software-as-a-Service ecosystems.
Editor’s Note: The opinions expressed in this and other guest author articles are solely those of the contributor and do not necessarily reflect those of Fortra.