BreachesHIGH

Cisco Source Code and Data Leak Allegedly Claimed by ShinyHunters

Featured image for Cisco Source Code and Data Leak Allegedly Claimed by ShinyHunters
CSCyber Security News
CiscoShinyHuntersSalesforceAWSdata breach
🎯

Basically, hackers stole a lot of sensitive data from Cisco, including personal information.

Quick Summary

ShinyHunters claims responsibility for a major breach at Cisco, exposing over 3 million records. This incident raises serious concerns about data security. Organizations must act quickly to safeguard their information.

What Happened

The notorious cybercriminal group ShinyHunters has allegedly claimed responsibility for three significant data breaches targeting Cisco Systems, Inc.. They assert that over 3 million Salesforce records have been compromised, including sensitive personal identifiable information (PII), GitHub repositories, and AWS S3 buckets. Security researcher Dominic Alvieri reported that ShinyHunters issued a 'FINAL WARNING' to Cisco, demanding a response by April 3, 2026, or they would publicly expose the stolen data.

The breaches reportedly stem from three distinct vectors: the Salesforce CRM, Salesforce Aura (Experience Cloud), and AWS account environments. ShinyHunters, which has been active since around 2019, is known for its aggressive data theft and extortion tactics, previously breaching numerous organizations by exploiting misconfigured Salesforce access controls.

Who's Affected

The compromised data includes records of Cisco customers and employees, with alarming ties to personnel from high-profile organizations such as the FBI, DHS, DISA, IRS, and NASA. Additionally, records linked to the Australian Ministry of Defense and several Indian government agencies were also reportedly affected. This data is particularly valuable for adversaries planning targeted phishing or social engineering attacks, as it provides insights into Cisco's operational and client relationships.

ShinyHunters has a history of executing vishing campaigns, tricking employees into granting OAuth token access to malicious Salesforce applications. This method allows attackers to bypass traditional security measures like MFA and password resets, posing a significant risk to organizations.

What Data Was Exposed

The dataset allegedly stolen from Cisco is believed to originate from its Salesforce environment. It contains sensitive information that could be weaponized for various malicious purposes, including supply chain attacks. ShinyHunters is known for its systematic approach to exploiting Salesforce vulnerabilities, having previously breached organizations like Snowflake, Okta, and Google.

The implications of this breach extend beyond just Cisco. The exposed data can facilitate targeted attacks against individuals and organizations, making it crucial for affected entities to take immediate action to mitigate risks.

What You Should Do

Organizations should take proactive measures to protect themselves from similar breaches. Key recommendations include:

  • Audit Salesforce OAuth-connected apps to identify any unauthorized access.
  • Enforce Salesforce API Access Control to limit exposure.
  • Revoke unrecognized tokens and monitor for unauthorized Salesforce Data Loader activity.

Cisco has yet to release an official statement regarding the ShinyHunters extortion claim. As the situation develops, organizations must remain vigilant and prepared for potential fallout from this significant data breach.

🔒 Pro insight: The scale and sensitivity of the data involved suggest a heightened risk of targeted attacks against Cisco and its clients in the coming weeks.

Original article from

CSCyber Security News· Guru Baran
Read Full Article

Related Pings

HIGHBreaches

Iranwire Hack - Major Data Breach Reported by Iranian Justice

A significant data breach has hit the Iranian exile portal Iranwire, with hackers stealing sensitive information. Employees and informants may be at risk. This incident underscores the dangers of online data security in politically sensitive environments.

CSO Online·
HIGHBreaches

Mercor AI Confirms Data Breach After Lapsus$ Claims Theft of 4TB Data

Mercor AI confirms a significant data breach linked to Lapsus$, exposing 4TB of sensitive data, including proprietary source code and user verification information.

Cyber Security News·
HIGHBreaches

Mercor Hit by Cyberattack Linked to LiteLLM Compromise

Mercor has confirmed a cyberattack linked to the LiteLLM project. The extortion group Lapsus$ claims to have stolen sensitive data. This breach raises serious security concerns for many companies involved.

TechCrunch Security·
HIGHBreaches

Anthropic Exposes Claude Code Source via NPM Leak

Anthropic has leaked its Claude Code source online due to a packaging error. This incident exposes critical internal architecture and could impact user trust. Anthropic is taking steps to prevent future leaks.

Security Affairs·
HIGHBreaches

Lockheed Martin Data Breach - Stolen Data Offered for $600M

Lockheed Martin is in hot water after a massive data breach. Allegedly, hackers have stolen 375 TB of sensitive data and are trying to sell it for nearly $600 million. This breach could have serious implications for national security. Stay tuned for updates as the situation develops.

SC Media·
HIGHBreaches

CareCloud Confirms Breach of EHR Environment Affecting Patients

CareCloud has confirmed a breach affecting its EHR environment, potentially compromising sensitive patient health records. The company is assessing the extent of the data accessed. This incident highlights ongoing vulnerabilities in healthcare data security.

SC Media·