Ptechhub
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
PtechHub
No Result
View All Result

Salesforce tracks possible ShinyHunters campaign targeting its users | Computer Weekly

By Computer Weekly by By Computer Weekly
March 11, 2026
Home Uncategorized
Share on FacebookShare on Twitter


Salesforce has warned users of an uptick in threat actor activity targeting Experience Cloud customers’ who have accidentally enabling overly permissive guest user configurations.

Salesforce stressed that the attacks were not the result of any known flaws in its product but rather the result of misconfigurations during the setup process.

Exploitation of these misconfigurations appears to be the work of the ShinyHunters operation which, along with a loosely affiliated network of hackers, caused chaos during the summer of 2025 in a social engineering campaign. Its prior activity targeted Salesforce clients’ Data Loader application used for bulk movement of data records via voice phishing calls.

In a statement posted at the weekend, Salesforce said: “Our Cyber Security Operations Center [CSOC] has been monitoring a campaign by a known threat actor group. Evidence indicates the threat actor is leveraging a modified version of the open source tool Aura Inspector – originally developed by Mandiant – to perform mass scanning of public-facing Experience Cloud sites.

“While the original Aura Inspector is limited to identifying vulnerable objects by probing API endpoints that these sites expose, specifically the /s/sfsites/aura endpoint, the actor has developed a custom version of the tool capable of going beyond identification to actually extract data – exploiting overly permissive guest user settings.”

The Salesforce team explained that in a publicly accessible Experience Cloud site, a visitor will share a guest user profile that typically enables them to view data that might be reasonably made public as an unauthenticated user.

The issue arises if these profiles are configured with enhanced privileges enabling a visitor – or cyber criminal – to directly query Salesforce CRM objects without having logged in. This setup is ill-advised and runs contrary to Salesforce’s suggested configuration guidance.

Mandiant confirmed it was aware of the issue and has said it is actively working with Salesforce.

Salesforce did not directly point to ShinyHunters itself, rather the group itself claimed – via The Register  – that it had hit almost 400 websites and 100 tech companies, including the likes of AMD, LastPass, Okta, Snowflake and Sony, over a period of several months.

KnowBe4 lead CISO adviser Javvad Malik commented: “This is another case of simple misconfigurations wrecking havoc across organisations. We’ve seen many minor misconfigurations in cloud environments which cause data to be exposed.

“It is why a strong security culture across organisations is important, so that everyone plays their part in keeping data secure, especially when it comes to cloud services which many people often assume to be secure. All settings need to be regularly reviewed, ensuring principle of least-privilege is adhered to, and robust monitoring and alerting is put in place.”

Next steps

In its guidance, Salesforce said Experience Cloud guest users should be restricted to the absolute minimum of objects and fields needed for the public-facing site to function.

It recommended an immediate audit of guest user permissions and rigorously enforce a “least privilege” access model. Security teams should question every object permission listed and remove anything that is not obviously needed – a good place to start is to cut off everything and build permissions back from there.

Then, default external access to all objects should then be set to private across the organisation, and this should be verified and confirmed.

Following that, guest users will need to be blocked from accessing public application programming interfaces (APIs) to close off the Aura endpoint to unauthenticated queries. Security teams should also lock down portal and site user visibility settings to stop guests from enumerating insiders. Finally, should your site not require unauthenticated visitors to create their own accounts, disable self-registration.

Salesforce also recommends security teams review event monitoring logs related to Aura, looking for strange access patterns, queries targeting private objects, traffic from unusual IP ranges and so on. Salesforce Support is on hand to advise should you suspect compromise, and more detailed guidance is available via the linked advisory notice.



Source link

By Computer Weekly

By Computer Weekly

Next Post
What Boards Must Demand in the Age of AI-Automated Exploitation

What Boards Must Demand in the Age of AI-Automated Exploitation

Recommended.

Securing the Future: The Rise of Post-Quantum Cryptography

Securing the Future: The Rise of Post-Quantum Cryptography

August 29, 2024
Trojanized ESET Installers Drop Kalambur Backdoor in Phishing Attacks on Ukraine

Trojanized ESET Installers Drop Kalambur Backdoor in Phishing Attacks on Ukraine

November 6, 2025

Trending.

HeyGears Launches Reflex 2 Series 3D Printers – Enabling Users to Go Beyond Prototypes and Start Production

HeyGears Launches Reflex 2 Series 3D Printers – Enabling Users to Go Beyond Prototypes and Start Production

October 24, 2025
BuzzRx® Kicks Off Basketball Ticket Giveaway with “Pronounce that Prescription” Social Game

BuzzRx® Kicks Off Basketball Ticket Giveaway with “Pronounce that Prescription” Social Game

February 4, 2025
Huawei en Marokkaanse overheid stimuleren nationale onderwijstransformatie met DigiSchool-project

Huawei en Marokkaanse overheid stimuleren nationale onderwijstransformatie met DigiSchool-project

December 31, 2024
AI enters its ‘grassroots backlash’ era | Computer Weekly

AI enters its ‘grassroots backlash’ era | Computer Weekly

February 11, 2026
NetEase Announces Fourth Quarter and Fiscal Year 2025 Unaudited Financial Results

NetEase Announces Fourth Quarter and Fiscal Year 2025 Unaudited Financial Results

February 11, 2026

PTechHub

A tech news platform delivering fresh perspectives, critical insights, and in-depth reporting — beyond the buzz. We cover innovation, policy, and digital culture with clarity, independence, and a sharp editorial edge.

Follow Us

Industries

  • AI & ML
  • Cybersecurity
  • Enterprise IT
  • Finance
  • Telco

Navigation

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Subscribe to Our Newsletter

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Copyright © 2025 | Powered By Porpholio

No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs

Copyright © 2025 | Powered By Porpholio