Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Incidents

Pandora Confirms Data Breach

August 6, 2025
Reading Time: 3 mins read
in Incidents
Georgia SNAP Call Center Cyberattack

Danish jewelry giant Pandora has become the latest victim in a series of widespread data theft attacks targeting companies that use the Salesforce customer relationship management platform. In a notification sent to customers, the company confirmed that “contact information was accessed by an unauthorized party through a third-party platform we use.” While Pandora did not name the specific platform, it has since been confirmed that the stolen data was exfiltrated from the company’s Salesforce database. This incident places Pandora, one of the world’s largest jewelry brands, among a growing list of high-profile companies impacted by the ongoing security campaign.

Attackers Utilize Social Engineering and Phishing

The ongoing data theft campaign is attributed to the threat actor group known as ShinyHunters, and its tactics are a departure from traditional malware-based attacks. Instead, the attackers employ sophisticated social engineering and phishing campaigns. They target company employees and help desks, using deceptive phone calls, a method known as “vishing,” to trick them into revealing Salesforce login credentials or authorizing a malicious OAuth application to their Salesforce accounts. This method allows the threat actors to gain access to the company’s customer database without exploiting any vulnerability in the Salesforce platform itself.

According to Pandora’s disclosure, the information stolen was limited to customers’ names, birthdates, and email addresses. The company has emphasized that no more sensitive data, such as passwords, IDs, or financial information, was compromised in the attack. While this may seem like a minor breach to some, cybersecurity experts warn that even this limited data can be used to launch highly targeted phishing scams, making the affected customers vulnerable to further attacks. Pandora has advised its customers to be extra vigilant and to be cautious of unusual emails or online activities.

The ShinyHunters group has publicly confirmed that they are behind the recent wave of Salesforce attacks. The group is using the stolen data to privately extort the victim companies, demanding a ransom to prevent the data from being publicly leaked or sold. This strategy mirrors the group’s past activities, such as the widely publicized Snowflake data-theft attacks. The threat actors have stated that the attacks are ongoing, making it crucial for all companies using Salesforce to take proactive steps to secure their accounts and protect their customer data.

In response to the series of attacks, Salesforce has issued a statement clarifying that its platform has not been compromised and that the breaches are not due to any inherent vulnerabilities. The company stresses that security is a shared responsibility and that customers must play a critical role in safeguarding their data. Salesforce has provided a list of recommendations for companies to harden their accounts, including enabling multi-factor authentication (MFA), enforcing the principle of least privilege, and carefully managing connected applications. These measures are essential to mitigate the risk of falling victim to these social engineering-based attacks.

Reference:

  • Pandora Confirms Data Breach During Ongoing Salesforce Data Theft Attacks
Tags: August 2025cyber incidentsCyber Incidents 2025Cyber threats
ADVERTISEMENT

Related Posts

Microsoft 365 Outage Hits Services

GitHub Copilot Chat Flaw Leaks Repo Data

October 10, 2025
Microsoft 365 Outage Hits Services

Crimson Collective Hits AWS Instances

October 10, 2025
Microsoft 365 Outage Hits Services

Microsoft 365 Outage Hits Services

October 10, 2025
BK Technologies Admits Cyber Breach

BK Technologies Admits Cyber Breach

October 10, 2025
BK Technologies Admits Cyber Breach

Dozens Hit in Oracle-Linked Hacks

October 10, 2025
BK Technologies Admits Cyber Breach

Chinese Hackers Hit Williams Connolly

October 10, 2025

Latest Alerts

BatShadow Unleashes Go Vampire Bot

Hackers Exploit Service Finder Flaw

FileFix Attack Evades Security Tools

Hackers Abuse WordPress for Phishing

Severe Framelink Figma MCP Code Flaw

Android Spyware ClayRat Imitates Apps

Subscribe to our newsletter

    Latest Incidents

    Crimson Collective Hits AWS Instances

    GitHub Copilot Chat Flaw Leaks Repo Data

    Microsoft 365 Outage Hits Services

    Dozens Hit in Oracle-Linked Hacks

    BK Technologies Admits Cyber Breach

    Chinese Hackers Hit Williams Connolly

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial