Google has confirmed that recently revealed data includes the potential Google advertising customers’ information from one of its salesforce CRM examples.
“We are writing to tell you about an event that impressed a limited set of data in one of Google’s corporate salesforce institutions, used to communicate with customers of potential advertisements,” is written in a data breach notification shared with bleepingcomputer.
“Our records indicate that basic business contact information and related notes were influenced by this phenomenon.”
Google says that exposed information includes commercial names, phone numbers and “related notes” for Google sales agents, so that they re -contact.
The company says that the information about the payment was not revealed and there is no impact on Ads data in Google Ads Accounts, Merchant Center, Google Analytics and other ADS products.
Breach was operated by the danger actors known as Shinoreslers, who have been behind the ongoing wave of data theft attacks targeting salesforce customers.
While Google has not shared how many individuals were affected, Shinoors say that the stolen information includes about 2.55 million data records. It is not clear whether these records have duplicate or not.
Shinyhunters further told Bleepingcomputer that they are also working with “scattered spider -related danger actors, who were responsible for early access to the first targeted systems.
“As we have already said repeatedly, shiny and scattered spiders are one and the same,” Shinhetors told BlappingCopper.
“They provide us an initial access and we conduct dump and exfIs of salesforce CRM examples. Like we did with Snowflake.”
The danger actors are now referring to themselves as “sp1d3rhunters” to portray the overlapping groups of people involved in these attacks.
As part of these attacks, the danger actor conducts social engineering attacks against employees so that they can get access to credentials or trick them to connect the malicious version of the data loader OATH app of the salesfors to the target cellsforce environment.
The danger actors then download the entire salesforce database and remove companies via email, threatening to release stolen data if ransom is not paid.
These salesforce attacks were first reported by the Google Threat Intelligence Group (GTIG) in June, in which the company was suffering from the same luck a month later.
Databreaches.net said that the danger actors are already Send a demand for a forced recovery to GoogleHowever, if the payment is not made, it would not be surprising for the danger actors to leak data for free as a way to taunt the company.
Shinyhunters say they have switched to a new custom tool that makes it easier and faster to steal data from compromised salesforce examples.
In an update, Google recently accepted New tooling, saying that they have seen the python script used in attacks instead of salesforce data loaders.