Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Incidents

Pandora Confirms Data Breach

August 6, 2025
Reading Time: 3 mins read
in Incidents
Georgia SNAP Call Center Cyberattack

Danish jewelry giant Pandora has become the latest victim in a series of widespread data theft attacks targeting companies that use the Salesforce customer relationship management platform. In a notification sent to customers, the company confirmed that “contact information was accessed by an unauthorized party through a third-party platform we use.” While Pandora did not name the specific platform, it has since been confirmed that the stolen data was exfiltrated from the company’s Salesforce database. This incident places Pandora, one of the world’s largest jewelry brands, among a growing list of high-profile companies impacted by the ongoing security campaign.

Attackers Utilize Social Engineering and Phishing

The ongoing data theft campaign is attributed to the threat actor group known as ShinyHunters, and its tactics are a departure from traditional malware-based attacks. Instead, the attackers employ sophisticated social engineering and phishing campaigns. They target company employees and help desks, using deceptive phone calls, a method known as “vishing,” to trick them into revealing Salesforce login credentials or authorizing a malicious OAuth application to their Salesforce accounts. This method allows the threat actors to gain access to the company’s customer database without exploiting any vulnerability in the Salesforce platform itself.

According to Pandora’s disclosure, the information stolen was limited to customers’ names, birthdates, and email addresses. The company has emphasized that no more sensitive data, such as passwords, IDs, or financial information, was compromised in the attack. While this may seem like a minor breach to some, cybersecurity experts warn that even this limited data can be used to launch highly targeted phishing scams, making the affected customers vulnerable to further attacks. Pandora has advised its customers to be extra vigilant and to be cautious of unusual emails or online activities.

The ShinyHunters group has publicly confirmed that they are behind the recent wave of Salesforce attacks. The group is using the stolen data to privately extort the victim companies, demanding a ransom to prevent the data from being publicly leaked or sold. This strategy mirrors the group’s past activities, such as the widely publicized Snowflake data-theft attacks. The threat actors have stated that the attacks are ongoing, making it crucial for all companies using Salesforce to take proactive steps to secure their accounts and protect their customer data.

In response to the series of attacks, Salesforce has issued a statement clarifying that its platform has not been compromised and that the breaches are not due to any inherent vulnerabilities. The company stresses that security is a shared responsibility and that customers must play a critical role in safeguarding their data. Salesforce has provided a list of recommendations for companies to harden their accounts, including enabling multi-factor authentication (MFA), enforcing the principle of least privilege, and carefully managing connected applications. These measures are essential to mitigate the risk of falling victim to these social engineering-based attacks.

Reference:

  • Pandora Confirms Data Breach During Ongoing Salesforce Data Theft Attacks
Tags: August 2025cyber incidentsCyber Incidents 2025Cyber threats
ADVERTISEMENT

Related Posts

Cox Confirms Oracle Hack As Victims Named

Delta Dental Virginia Breach Hits 146000

November 24, 2025
Cox Confirms Oracle Hack As Victims Named

Iberia Alerts Customers To Data Breach

November 24, 2025
Cox Confirms Oracle Hack As Victims Named

Cox Confirms Oracle Hack As Victims Named

November 24, 2025
Salesforce Breach Hits Over 200 Victims

Over 50000 Asus Routers Compromised

November 21, 2025
Salesforce Breach Hits Over 200 Victims

Salesforce Breach Hits Over 200 Victims

November 21, 2025
Almaviva Leak Exposes FS Group Data

Almaviva Leak Exposes FS Group Data

November 21, 2025

Latest Alerts

Windows 11 24H2 Explorer And Start Crash

Matrix Push C2 Uses Browser Alerts To Phish

ShadowPad Exploits WSUS Flaw For Access

Sturnus Trojan Steals Android Chats

Tsundere Botnet Grows via Game Lures

APT24 Uses BADAUDIO in Taiwan Spying

Subscribe to our newsletter

    Latest Incidents

    Delta Dental Virginia Breach Hits 146000

    Iberia Alerts Customers To Data Breach

    Cox Confirms Oracle Hack As Victims Named

    Over 50000 Asus Routers Compromised

    Salesforce Breach Hits Over 200 Victims

    Almaviva Leak Exposes FS Group Data

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial