We review vendors based on rigorous testing and research but also take into account your feedback and our affiliate commission with providers. Some providers are owned by our parent company.
Learn more
vpnMentor was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: Holiday.com, ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on vpnMentor are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.
Advertising Disclosure

vpnMentor was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: Holiday.com, ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on vpnMentor are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.

Google Becomes Latest Victim in ShinyHunters Salesforce Scam

Google Becomes Latest Victim in ShinyHunters Salesforce Scam
Hendrik Human Published on August 09, 2025 Cybersecurity Researcher

Google revealed that it’s the latest major company victim in a series of data breaches involving the exploitation of Salesforce CRM users. ShinyHunter, the threat actor, used social engineering tactics to impersonate IT support staff in phone calls to employees of target businesses.

As of now, Google is referring to the perpetrators as “UNC6040” or “UNC6240.” However, BleepingComputer’s own investigation revealed the identity of the attackers to be ShinyHunters, which has also targeted Qantas, Allianz Life, LVMH, and Adidas with the same Salesforce vulnerability.

ShinyHunters themselves claimed to have successfully breached a “trillion dollar” company, but would not confirm if it was Google. The true scale of the breach is not yet known, as it is an ongoing and dynamic situation. However, ShinyHunters is well-known for typically extorting businesses to pay a ransom for their stolen data or auctioning it off on the dark web.

Attackers used vishing and phishing to trick Salesforce users into granting OAuth access to a maliciously cloned version of Salesforce’s Data Loader app. By impersonating IT staff, they directed victims to Salesforce’s connected app setup page and had them enter a “connection code,” linking the rogue app to the company’s CRM instance.

In some cases, the tool was renamed (e.g., “My Ticket Portal”) to appear legitimate. Once connected, the attackers could query and export Salesforce data objects like “Accounts” and “Contacts,” bypassing normal login controls and MFA, and then use the stolen data for extortion.

Google stated that the affected instance was used to “store contact information and related notes for small and medium businesses.” However, it provided some assurance, stating that its analysis revealed the data was only "retrieved by the threat actor during a small window of time before the access was cut off” and that it was “confined to basic and largely publicly available business information, such as business names and contact details.”

ShinyHunters is a notorious hacking group that has been one of the most active in recent years. They were implicated in a 2024 Ticketmaster hack involving 1.3TB of data of over 560 million customers — one of the largest leaks in history. Earlier in the same year, they were found trying to sell 70 million customer records stolen from AT&T.

About the Author

Hendrik is a writer at vpnMentor, specializing in VPN comparisons and user guides. With 5+ years of experience as a tech and cybersecurity writer, plus a background in corporate IT, he brings a variety of perspectives to test VPN services and analyze how they address the needs of different users.

Please, comment on how to improve this article. Your feedback matters!

Leave a comment

This field must contain more than 50 characters

The field content should not exceed 1000 letters

Sorry, links are not allowed in this field!

Name should contain at least 3 letters

The field content should not exceed 80 letters

Sorry, links are not allowed in this field!

Special characters are not allowed in the Name field

Please enter a valid email address