ShinyHunters claims Cisco breach with Salesforce, GitHub, and AWS data, but key details remain unverified


ShinyHunters has allegedly listed Cisco on its leak site and claims it stole more than 3 million Salesforce records along with GitHub repositories and AWS-related data. Multiple security researchers and cyber outlets reported the listing on April 1 and April 2, 2026, but Cisco had not published a public statement specifically addressing this new extortion claim when I checked.

That distinction matters. Right now, the most solid fact is that a public extortion claim exists and names Cisco. The larger claims about the exact volume of data, the number of breach paths, and the scope of exposed internal assets still need independent confirmation from Cisco or a formal incident disclosure.

What gives the claim more context is the threat pattern around Salesforce over the past year. Google Threat Intelligence Group said attackers tied to UNC6040 used voice phishing and malicious connected apps to steal Salesforce data, and later extortion activity sometimes claimed affiliation with ShinyHunters to pressure victims.

Why this Cisco claim is getting attention

Cisco is not new to Salesforce-related incident response. In a Cisco advisory about a July 2025 vishing incident, the company said a bad actor targeted a Cisco representative, gained access to a third-party CRM system, and extracted basic profile information from Cisco customer records. Cisco said the incident affected contact and business data, not passwords, Social Security numbers, tax IDs, payment card data, or other sensitive identifiers.

That earlier disclosure does not prove the new ShinyHunters leak claim. It does show that Cisco already faced a real CRM compromise tied to voice phishing and cloud-based data access, which makes any new Salesforce-related extortion allegation more plausible than it would be in a vacuum.

There is also broader context around Cisco and exposed internal assets. In October 2024, Cisco acknowledged that files in a public-facing DevHub resource were unintentionally exposed because of a configuration issue, while saying there was no breach of its products or core systems. That older event is separate from the current claim, but it helps explain why any fresh allegation involving code, cloud storage, or internal repositories gets immediate scrutiny.

What the threat reporting says so far

Google says UNC6040 specializes in voice phishing against Salesforce customers and tricks employees into authorizing malicious connected apps, often modified versions of Data Loader. GTIG also said the follow-on extortion activity it tracks as UNC6240 has repeatedly used the ShinyHunters name in ransom or pressure messages.

Cisco Breach claim by ShinyHunters

Salesforce, for its part, warned in March 2026 about a separate but related campaign involving misconfigured public Experience Cloud guest-user settings. The company said this activity stemmed from customer misconfiguration, not a flaw in the Salesforce platform itself, and said attackers used a modified Aura Inspector tool to scan and extract data from overly permissive public sites.

Taken together, those official statements point to two realistic ways a company like Cisco could end up in a ShinyHunters-style extortion narrative: identity-based compromise through vishing and malicious OAuth-connected apps, or data exposure through poorly locked-down Experience Cloud guest access. What they do not prove is which route, if any, explains the specific Cisco listing now circulating.

What remains confirmed, likely, and unconfirmed

StatusDetail
ConfirmedA leak-site claim naming Cisco has been publicly reported
ConfirmedCisco disclosed a real vishing-related third-party CRM incident in July 2025
ConfirmedGoogle tied Salesforce-focused extortion activity to actors who sometimes used the ShinyHunters name
ConfirmedSalesforce warned in March 2026 about data exposure via misconfigured Experience Cloud guest access
UnconfirmedThe exact “3 million records” figure in the new Cisco claim
UnconfirmedThe claim that GitHub repositories and AWS buckets were stolen in the same operation
UnconfirmedWhether the latest Cisco listing reflects a new intrusion, recycled data, or a mix of incidents

What organizations should learn from this

Even if the Cisco claim turns out to be inflated, the attack pattern is real. Google’s reporting shows that social engineering around Salesforce can bypass normal expectations about passwords and MFA when a victim authorizes a malicious connected app themselves.

Salesforce says customers should audit guest user permissions, keep external access private by default, disable public APIs for guest users where possible, and follow least-privilege access rules. Those steps directly reduce the risk from the large-scale scanning and data theft campaigns now hitting public-facing Salesforce environments.

For companies worried about ShinyHunters-style extortion, the practical priority is not the branding used by the actor. The priority is whether anyone recently approved a suspicious connected app, whether public Experience Cloud pages expose more data than intended, and whether event logs show unusual export activity or mass queries.

Immediate checks for defenders

  • Review all Salesforce connected apps and remove anything unrecognized.
  • Restrict who can use Data Loader and who can manage connected apps.
  • Enforce trusted IP ranges and stronger access controls for administrative users.
  • Audit Experience Cloud guest-user permissions and disable public APIs unless they are truly required.
  • Review Salesforce event logs for large exports, unusual API activity, and access from unexpected networks.

FAQ

Did Cisco confirm this April 2026 ShinyHunters claim?

Not publicly, based on the sources I checked. Cisco has a public advisory for a July 2025 CRM vishing incident, but I did not find a Cisco statement that confirms this new April 2026 leak-site claim.

Does this mean Salesforce itself was hacked?

Not necessarily. Salesforce said its March 2026 warning involved customer-configured guest-user settings, not an inherent platform flaw. Google also said the vishing campaign it tracked relied on social engineering and malicious connected apps, not a core Salesforce vulnerability.

Is ShinyHunters definitely behind the Cisco incident?

That remains unclear. Google said extortion actors following Salesforce intrusions sometimes claimed to be ShinyHunters, likely to increase pressure on victims. That means the branding on a leak site or in an extortion email does not settle attribution by itself.

What is the biggest risk if a claim like this is real?

The main risk is not only exposure of customer and employee data. Stolen CRM records, cloud secrets, OAuth tokens, and repository access can support follow-on phishing, lateral movement, account compromise, and supply-chain abuse. That risk grows if the same actor also reaches GitHub or AWS environments.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages