Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Incidents

Pandora Confirms Data Breach

August 6, 2025
Reading Time: 3 mins read
in Incidents
Georgia SNAP Call Center Cyberattack

Danish jewelry giant Pandora has become the latest victim in a series of widespread data theft attacks targeting companies that use the Salesforce customer relationship management platform. In a notification sent to customers, the company confirmed that “contact information was accessed by an unauthorized party through a third-party platform we use.” While Pandora did not name the specific platform, it has since been confirmed that the stolen data was exfiltrated from the company’s Salesforce database. This incident places Pandora, one of the world’s largest jewelry brands, among a growing list of high-profile companies impacted by the ongoing security campaign.

Attackers Utilize Social Engineering and Phishing

The ongoing data theft campaign is attributed to the threat actor group known as ShinyHunters, and its tactics are a departure from traditional malware-based attacks. Instead, the attackers employ sophisticated social engineering and phishing campaigns. They target company employees and help desks, using deceptive phone calls, a method known as “vishing,” to trick them into revealing Salesforce login credentials or authorizing a malicious OAuth application to their Salesforce accounts. This method allows the threat actors to gain access to the company’s customer database without exploiting any vulnerability in the Salesforce platform itself.

According to Pandora’s disclosure, the information stolen was limited to customers’ names, birthdates, and email addresses. The company has emphasized that no more sensitive data, such as passwords, IDs, or financial information, was compromised in the attack. While this may seem like a minor breach to some, cybersecurity experts warn that even this limited data can be used to launch highly targeted phishing scams, making the affected customers vulnerable to further attacks. Pandora has advised its customers to be extra vigilant and to be cautious of unusual emails or online activities.

The ShinyHunters group has publicly confirmed that they are behind the recent wave of Salesforce attacks. The group is using the stolen data to privately extort the victim companies, demanding a ransom to prevent the data from being publicly leaked or sold. This strategy mirrors the group’s past activities, such as the widely publicized Snowflake data-theft attacks. The threat actors have stated that the attacks are ongoing, making it crucial for all companies using Salesforce to take proactive steps to secure their accounts and protect their customer data.

In response to the series of attacks, Salesforce has issued a statement clarifying that its platform has not been compromised and that the breaches are not due to any inherent vulnerabilities. The company stresses that security is a shared responsibility and that customers must play a critical role in safeguarding their data. Salesforce has provided a list of recommendations for companies to harden their accounts, including enabling multi-factor authentication (MFA), enforcing the principle of least privilege, and carefully managing connected applications. These measures are essential to mitigate the risk of falling victim to these social engineering-based attacks.

Reference:

  • Pandora Confirms Data Breach During Ongoing Salesforce Data Theft Attacks
Tags: August 2025cyber incidentsCyber Incidents 2025Cyber threats
ADVERTISEMENT

Related Posts

Russian Hackers Hit Polish Hospitals

Russian Hackers Hit Polish Hospitals

September 19, 2025
Russian Hackers Hit Polish Hospitals

New York Blood Center Data Breach

September 19, 2025
Russian Hackers Hit Polish Hospitals

Tiffany Data Breach Hits Thousands

September 19, 2025
AI Forged Military IDs Used In Phishing

AI Forged Military IDs Used In Phishing

September 18, 2025
AI Forged Military IDs Used In Phishing

ShinyHunters Claims Salesforce Data Theft

September 18, 2025
AI Forged Military IDs Used In Phishing

Insight Partners Warns After Data Breach

September 18, 2025

Latest Alerts

Steganography Cloud C2 In Modular Chain

Fake Empire Targets Crypto With AMOS

SEO Poisoning Hits Chinese Users

FileFix Uses Steganography To Drop StealC

Apple Backports Fix For Exploited Bug

Google Removes 224 Android Malware Apps

Subscribe to our newsletter

    Latest Incidents

    Russian Hackers Hit Polish Hospitals

    New York Blood Center Data Breach

    Tiffany Data Breach Hits Thousands

    AI Forged Military IDs Used In Phishing

    Insight Partners Warns After Data Breach

    ShinyHunters Claims Salesforce Data Theft

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial