Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home News

Extortion Group Leaks Salesforce Data

October 13, 2025
Reading Time: 3 mins read
in News
Extortion Group Leaks Salesforce Data

Lapsus$, Scattered Spider, and ShinyHunters, an extortion group calling itself Scattered LAPSUS$ Hunters recently leaked millions of records from a campaign targeting Salesforce customers. The leak followed a ransom demand to Salesforce, where the hackers claimed to have stolen data from 39 customers and threatened to publish it unless the company paid. Salesforce refused the demand, stating the extortion was related to “past or unsubstantiated incidents.” In response, the hackers published data on their Tor-based leak site, allegedly belonging to several companies, including Albertsons, Engie Resources, Fujifilm, GAP, Qantas, and Vietnam Airlines.

After publishing the data on their private site, the threat actors provided links to paying users on a clear-net forum and then released the data for free on another public website. One of the alleged victims, Qantas, obtained a court injunction to block access to the information and is analyzing the leak with cybersecurity experts. Back in July, the Australian airline had stated that roughly 6 million customers may have been affected in an incident where attackers hit a third-party platform and exfiltrated names, email addresses, phone numbers, dates of birth, and frequent flyer numbers. Qantas confirmed in a statement that it had already proactively advised all impacted customers in July about the data that was exposed, and this has not changed.

According to the data breach notification service Have I Been Pwned, the hackers also leaked data associated with approximately 7.3 million Vietnam Airlines accounts. This information was reportedly stolen from the company’s Salesforce instance in June and includes names, email addresses, phone numbers, dates of birth, and loyalty program details. Although the hackers had initially named 39 victims and claimed to have stolen data from many more, they only ended up leaking data from six organizations. When asked by followers on their Telegram channel about the missing data, Scattered LAPSUS$ Hunters said it “can’t leak” any more data.

The hackers told DataBreaches.net that some of the victim organizations had paid a ransom but asked to remain on the leak site “so they can protect themselves.” However, there’s no proof of this claim. It remains unclear why the data of only six victims was leaked, but in the past, hackers have been known to make false claims about possessing stolen data. Last week, Scattered LAPSUS$ Hunters also claimed to have stolen 19 million personal records from Australian telecommunications company Telstra, but the company quickly refuted the claim, stating the data was scraped from public sources, not its systems.

Telstra’s investigation found that no passwords, banking details, or personal identification data like driver’s license or Medicare numbers were included in the leaked data. The incident with Telstra highlights a common tactic where hackers inflate the scale of a breach or make up claims entirely to gain attention or pressure companies. The limited number of leaks compared to the hackers’ initial claims and the alleged requests from companies to remain on the leak site suggest the situation is more complicated than the hackers portray. This lack of transparency underscores the difficulty in verifying claims made by cybercriminals.

Reference:

  • Spanish Authorities Dismantle GXC Team Cybercrime Ring, Arrest 25 Year Old Leader
Tags: Cyber NewsCyber News 2025Cyber threatsOctober 2025
ADVERTISEMENT

Related Posts

Niobium Raises 23 Million For FHE Tech

Niobium Raises 23 Million For FHE Tech

December 4, 2025
Defender Outage Disrupts Threat Alerting

Arizona AG Sues Temu Over Data Theft

December 4, 2025
Niobium Raises 23 Million For FHE Tech

Google Expands Android Scam Protection

December 4, 2025
Illuminate Must Delete Student Data

Australian Jailed For WiFi Attacks

December 3, 2025
Illuminate Must Delete Student Data

Illuminate Must Delete Student Data

December 3, 2025
Police Shut Down Cryptomixer Service

India Orders Phones To Preinstall App

December 2, 2025

Latest Alerts

Record DDoS Linked To Massive Botnet

RSC Bugs Let Hackers Run Remote Code Now

WordPress Elementor Addon Flaw Exploited

Lazarus APT Remote Worker Scheme Caught

Google Fixes 107 Android Flaws In Use

Npm Package Evades AI Security Tools

Subscribe to our newsletter

    Latest Incidents

    Freedom Mobile Customer Data Breach Exposed

    Penn Phoenix Data Breach Oracle Hack Now

    Defender Outage Disrupts Threat Alerting

    Indian Airports Hit By Cyber Attack

    ChatGPT Down Worldwide Users Affected

    Sorbonne Staff Data Found On Dark Web

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial