ShinyHunters claims 3M Cisco Salesforce breach with FBI/NASA/IRS/Indian PII. Vishing grants OAuth bypassing MFA; AWS keys stolen. Repeat attack post-2024 DevHub leak demands contact by April 3 or full exposure.

3 Million Cisco Records Leaked: FBI, IRS, NASA from Salesforce Hack Exposed

The420.in Staff
3 Min Read

Notorious cyber extortion group ShinyHunters demands Cisco contact them before April 3, 2026, or face public dump of over 3 million Salesforce records containing PII from FBI, DHS, IRS, NASA, Australian Defense Ministry, and Indian government agencies tied to Cisco procurement.

Triple Breach Vector: Salesforce CRM, Aura, AWS

Security researcher Dominic Alvieri detailed ShinyHunters’ leak site listing three Cisco compromises—Salesforce CRM/Aura Experience Cloud guest access flaws plus AWS S3 buckets/GitHub repositories. Resecurity confirms data authenticity with customer/employee references confirming corporate origin.

UNC6040 (ShinyHunters alias) specializes in voice phishing customer support staff to authorize malicious Salesforce OAuth apps, natively bypassing MFA/password controls. UNC6395 then weaponizes stolen tokens for AWS keys, Snowflake credentials, cloud lateral movement extracting secrets at scale.

FCRF Launches Premier CISO Certification Amid Rising Demand for Cybersecurity Leadership

March 2026 AuraInspector Mass Exploitation

ShinyHunters weaponized open-source AuraInspector tool scanning thousands of Salesforce Experience Cloud instances for guest user misconfigurations. 300-400 organizations reportedly hit in automated vulnerability campaign targeting enterprise CRM deployments globally.

October 2024 DevHub breach leaked 4.5 TB source code/API tokens via configuration error. August 2025 CRM vishing confirmed ShinyHunters-linked. Current 3M-record extortion continues pattern exploiting Cisco’s extensive government procurement ecosystem.

High-Value Government PII Windfall

Compromised dataset uniquely valuable for targeted phishing, supply chain attacks against US federal agencies (FBI/DHS/DISA/IRS/NASA), Australian MoD, Indian entities configuring Cisco infrastructure. Procurement-linked PII enables precise spear-phishing against defense/critical infrastructure sectors.

Formed ~2019, group escalated from data theft to sophisticated extortion hitting Snowflake, Okta, LastPass, Google, AMD, Sony, Crunchbase. Salesforce specialization reflects enterprise CRM ubiquity and rich PII harvesting potential.

Immediate Enterprise Defense Roadmap

Researchers urge:

  • Audit Salesforce OAuth apps for unauthorized integrations
  • Enforce strict API Access Control revoking unrecognized tokens
  • Monitor Salesforce Data Loader activity anomalies
  • Implement guest user restrictions in Experience Cloud (Aura)

No official Cisco statement addresses March 31, 2026 extortion claim despite pattern of prior breaches. Enterprises worldwide must assume similar Salesforce exposures exist across vendor ecosystems pending confirmation.

ShinyHunters’ government PII harvest signals intelligence value escalation beyond corporate espionage. Defenders face automated mass-vulnerability scanning era demanding proactive CRM/cloud token hygiene as zero-day exploit markets commoditize enterprise flaws.

About the author – Rehan Khan is a law student and legal journalist with a keen interest in cybercrime, digital fraud, and emerging technology laws. He writes on the intersection of law, cybersecurity, and online safety, focusing on developments that impact individuals and institutions in India.

Stay Connected