Salesforce stated it’s participating with prospects who’re being extorted by cybercriminals by means of a recently-created knowledge leak website.
The Scattered Spider cybercriminal group printed a brand new leak website on Thursday night with dozens of huge corporations listed, claiming to have stolen knowledge from the organizations by means of Salesforce. The group hooked up a prolonged extortion word threatening Salesforce and providing to rescind the extortion calls for if Salesforce itself paid a ransom.
When reached for remark, a Salesforce spokesperson instructed Recorded Future Information that they’re conscious of the positioning and are investigating it with regulation enforcement and cybersecurity specialists.
“Our findings point out these makes an attempt relate to previous or unsubstantiated incidents, and we stay engaged with affected prospects to offer assist. Right now, there isn’t any indication that the Salesforce platform has been compromised, neither is this exercise associated to any recognized vulnerability in our expertise,” the spokesperson stated.
“We perceive how regarding these conditions might be. Defending buyer environments and knowledge stays our prime precedence, and our safety groups are absolutely engaged to offer steering and assist. As we proceed to observe the scenario, we encourage prospects to stay vigilant towards phishing and social engineering makes an attempt, which stay widespread techniques for risk actors.”
The corporate offered the same message on a standing web page and directed prospects to a weblog launched in March about defending towards social engineering assaults.
The spokesperson additionally directed Recorded Future Information to a weblog from incident responders at Google that covers a long-running voice phishing marketing campaign launched by cybercriminals hooked up to the Scattered Spider group. The risk actors have compromised organizations’ Salesforce situations “for large-scale knowledge theft and subsequent extortion” by impersonating IT assist personnel in telephone calls.
The Salesforce spokesperson highlighted a bit of the weblog that stated the marketing campaign “has confirmed notably efficient in tricking workers, typically inside English-speaking branches of multinational companies, into actions that grant the attackers entry or result in the sharing of delicate credentials, finally facilitating the theft of group’s Salesforce knowledge.”
“In all noticed instances, attackers relied on manipulating finish customers, not exploiting any vulnerability inherent to Salesforce,” Google specialists wrote in August.
Not one of the victims listed on the brand new Scattered Spider leak website responded to requests for remark apart from Google, which beforehand confirmed that in June, one among their company Salesforce situations was accessed by members of the group.
“The occasion was used to retailer contact data and associated notes for small and medium companies. Evaluation revealed that knowledge was retrieved by the risk actor throughout a small window of time earlier than the entry was minimize off,” Google defined.
“The info retrieved by the risk actor was confined to primary and largely publicly obtainable enterprise data, similar to enterprise names and phone particulars.”
The info leak website created by Scattered Spider comes after a summer season of headline-grabbing assaults on among the largest corporations on the earth. The group’s members launched a number of successive campaigns focusing on among the largest names within the airline, insurance coverage and retail industries. A number of of the victims listed on the positioning had been beforehand recognized as victims of Scattered Spider.
In whole, the group says it now has greater than 1 billion data on account of their assaults and gave Salesforce a deadline of October 10 to pay a ransom. Salesforce declined to reply questions on whether or not it could pay.
Two alleged members of the group appeared in Westminster Magistrates Court docket final week underneath accusations that they had been answerable for a cyberattack on the Transport for London company final 12 months.
A Justice Division grievance unsealed final week stated victims paid at the least $115 million in ransom funds to members of the group on account of at the least 120 cyberattacks launched between 2022 and 2025.
The grievance lists a number of victims who paid exorbitant ransoms — together with two incidents the place organizations paid him $25 million and $36.2 million respectively.
Recorded Future
Intelligence Cloud.
Be taught extra.




















