Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Salesforce tracks possible ShinyHunters campaign targeting its users

    Tree Search Distillation for Language Models Using PPO

    How Verizon Handles Customers Who Misuse 5G Home Internet Service

    Facebook X (Twitter) Instagram
    • Artificial Intelligence
    • Business Technology
    • Cryptocurrency
    • Gadgets
    • Gaming
    • Health
    • Software and Apps
    • Technology
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Tech AI Verse
    • Home
    • Artificial Intelligence

      What the polls say about how Americans are using AI

      February 27, 2026

      Tensions between the Pentagon and AI giant Anthropic reach a boiling point

      February 21, 2026

      Read the extended transcript: President Donald Trump interviewed by ‘NBC Nightly News’ anchor Tom Llamas

      February 6, 2026

      Stocks and bitcoin sink as investors dump software company shares

      February 4, 2026

      AI, crypto and Trump super PACs stash millions to spend on the midterms

      February 2, 2026
    • Business

      Salesforce tracks possible ShinyHunters campaign targeting its users

      March 15, 2026

      The team behind continuous batching says your idle GPUs should be running inference, not sitting dark

      March 13, 2026

      Met Office ‘supercomputing as a service’ one year old

      March 12, 2026

      Tech hiring evolves as candidates ask for AI compute alongside pay and perks

      March 11, 2026

      Oracle is spending billions on AI data centers as cash flow turns negative

      March 11, 2026
    • Crypto

      Banks Respond to Kraken’s Federal Reserve Access as Trump Sides with Crypto

      March 4, 2026

      Hyperliquid and DEXs Break the Top 10 — Is the CEX Era Ending?

      March 4, 2026

      Consensus Hong Kong 2026: The Institutional Turn 

      March 4, 2026

      New Crypto Mutuum Finance (MUTM) Reports V1 Protocol Progress as Roadmap Enters Phase 3

      March 4, 2026

      Bitcoin Short Sellers Caught Off Guard in New White House Move

      March 4, 2026
    • Technology

      Tree Search Distillation for Language Models Using PPO

      March 15, 2026

      How Verizon Handles Customers Who Misuse 5G Home Internet Service

      March 15, 2026

      I tested the tiny Russell Hobbs coffee maker that uses grounds or Nespresso pods — but I discovered one infuriating drawback

      March 15, 2026

      Trump administration is allegedly collecting $10 billion on the TikTok deal

      March 15, 2026

      Microsoft releases Windows 11 OOB hotpatch to fix RRAS RCE flaw

      March 15, 2026
    • Others
      • Gadgets
      • Gaming
      • Health
      • Software and Apps
    Check BMI
    Tech AI Verse
    You are at:Home»Business Technology»Salesforce tracks possible ShinyHunters campaign targeting its users
    Business Technology

    Salesforce tracks possible ShinyHunters campaign targeting its users

    TechAiVerseBy TechAiVerseMarch 15, 2026No Comments4 Mins Read4 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    Salesforce tracks possible ShinyHunters campaign targeting its users
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    Salesforce tracks possible ShinyHunters campaign targeting its users

    Salesforce warns users of an uptick in malicious activity targeting Experience Cloud customers with misconfigured user settings via an open source tool

    By

    • Alex Scroxton,
      Security Editor

    Published: 11 Mar 2026 15:15

    Salesforce has warned users of an uptick in threat actor activity targeting Experience Cloud customers’ who have accidentally enabling overly permissive guest user configurations.

    Salesforce stressed that the attacks were not the result of any known flaws in its product but rather the result of misconfigurations during the setup process.

    Exploitation of these misconfigurations appears to be the work of the ShinyHunters operation which, along with a loosely affiliated network of hackers, caused chaos during the summer of 2025 in a social engineering campaign. Its prior activity targeted Salesforce clients’ Data Loader application used for bulk movement of data records via voice phishing calls.

    In a statement posted at the weekend, Salesforce said: “Our Cyber Security Operations Center [CSOC] has been monitoring a campaign by a known threat actor group. Evidence indicates the threat actor is leveraging a modified version of the open source tool Aura Inspector – originally developed by Mandiant – to perform mass scanning of public-facing Experience Cloud sites.

    “While the original Aura Inspector is limited to identifying vulnerable objects by probing API endpoints that these sites expose, specifically the /s/sfsites/aura endpoint, the actor has developed a custom version of the tool capable of going beyond identification to actually extract data – exploiting overly permissive guest user settings.”

    The Salesforce team explained that in a publicly accessible Experience Cloud site, a visitor will share a guest user profile that typically enables them to view data that might be reasonably made public as an unauthenticated user.

    The issue arises if these profiles are configured with enhanced privileges enabling a visitor – or cyber criminal – to directly query Salesforce CRM objects without having logged in. This setup is ill-advised and runs contrary to Salesforce’s suggested configuration guidance.

    Mandiant confirmed it was aware of the issue and has said it is actively working with Salesforce.

    Salesforce did not directly point to ShinyHunters itself, rather the group itself claimed – via The Register  – that it had hit almost 400 websites and 100 tech companies, including the likes of AMD, LastPass, Okta, Snowflake and Sony, over a period of several months.

    KnowBe4 lead CISO adviser Javvad Malik commented: “This is another case of simple misconfigurations wrecking havoc across organisations. We’ve seen many minor misconfigurations in cloud environments which cause data to be exposed.

    “It is why a strong security culture across organisations is important, so that everyone plays their part in keeping data secure, especially when it comes to cloud services which many people often assume to be secure. All settings need to be regularly reviewed, ensuring principle of least-privilege is adhered to, and robust monitoring and alerting is put in place.”

    Next steps

    In its guidance, Salesforce said Experience Cloud guest users should be restricted to the absolute minimum of objects and fields needed for the public-facing site to function.

    It recommended an immediate audit of guest user permissions and rigorously enforce a “least privilege” access model. Security teams should question every object permission listed and remove anything that is not obviously needed – a good place to start is to cut off everything and build permissions back from there.

    Then, default external access to all objects should then be set to private across the organisation, and this should be verified and confirmed.

    Following that, guest users will need to be blocked from accessing public application programming interfaces (APIs) to close off the Aura endpoint to unauthenticated queries. Security teams should also lock down portal and site user visibility settings to stop guests from enumerating insiders. Finally, should your site not require unauthenticated visitors to create their own accounts, disable self-registration.

    Salesforce also recommends security teams review event monitoring logs related to Aura, looking for strange access patterns, queries targeting private objects, traffic from unusual IP ranges and so on. Salesforce Support is on hand to advise should you suspect compromise, and more detailed guidance is available via the linked advisory notice.

    Read more on Cloud security


    • 9 top unified communications providers for 2026

      By: Andrew Froehlich


    • How not to spill the Tea: A real-world app security lesson

      By: Walker Aldridge


    • Black Hat USA: Startup breaks secrets management tools

      By: Alex Scroxton


    • Platform Engineering – xtype: Beyond the pipelines, look at the governance

      By: Adrian Bridgwater

    Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
    Previous ArticleTree Search Distillation for Language Models Using PPO
    TechAiVerse
    • Website

    Jonathan is a tech enthusiast and the mind behind Tech AI Verse. With a passion for artificial intelligence, consumer tech, and emerging innovations, he deliver clear, insightful content to keep readers informed. From cutting-edge gadgets to AI advancements and cryptocurrency trends, Jonathan breaks down complex topics to make technology accessible to all.

    Related Posts

    The team behind continuous batching says your idle GPUs should be running inference, not sitting dark

    March 13, 2026

    Met Office ‘supercomputing as a service’ one year old

    March 12, 2026

    Tech hiring evolves as candidates ask for AI compute alongside pay and perks

    March 11, 2026
    Leave A Reply Cancel Reply

    Top Posts

    Ping, You’ve Got Whale: AI detection system alerts ships of whales in their path

    April 22, 2025718 Views

    Lumo vs. Duck AI: Which AI is Better for Your Privacy?

    July 31, 2025303 Views

    Wired Headphones Are Making A Comeback, And We Have Gen Z To Thank

    July 22, 2025213 Views

    6.7 Cummins Lifter Failure: What Years Are Affected (And Possible Fixes)

    April 14, 2025175 Views
    Don't Miss
    Business Technology March 15, 2026

    Salesforce tracks possible ShinyHunters campaign targeting its users

    Salesforce tracks possible ShinyHunters campaign targeting its users Salesforce warns users of an uptick in…

    Tree Search Distillation for Language Models Using PPO

    How Verizon Handles Customers Who Misuse 5G Home Internet Service

    I tested the tiny Russell Hobbs coffee maker that uses grounds or Nespresso pods — but I discovered one infuriating drawback

    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    About Us
    About Us

    Welcome to Tech AI Verse, your go-to destination for everything technology! We bring you the latest news, trends, and insights from the ever-evolving world of tech. Our coverage spans across global technology industry updates, artificial intelligence advancements, machine learning ethics, and automation innovations. Stay connected with us as we explore the limitless possibilities of technology!

    Facebook X (Twitter) Pinterest YouTube WhatsApp
    Our Picks

    Salesforce tracks possible ShinyHunters campaign targeting its users

    March 15, 20264 Views

    Tree Search Distillation for Language Models Using PPO

    March 15, 20265 Views

    How Verizon Handles Customers Who Misuse 5G Home Internet Service

    March 15, 20265 Views
    Most Popular

    Outbreak turns 30

    March 14, 20250 Views

    New SuperBlack ransomware exploits Fortinet auth bypass flaws

    March 14, 20250 Views

    CDs Offer Guaranteed Returns in an Uncertain Market. Today’s CD Rates, March 14, 2025

    March 14, 20250 Views
    © 2026 TechAiVerse. Designed by Divya Tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions

    Type above and press Enter to search. Press Esc to cancel.