...

Google Hacked: Inside the ShinyHunters Salesforce Data Breach

Join Our Telegram Group
Join Now
Join Our WhatsApp Group
Join Now

At the beginning of August 2025, a widespread rumor emerged that Google was the newest (but not the last) victim of a data theft attack from Salesforce. Referred to as “Google hacked,” this event creates implications for data security, corporate risk mitigation and the ongoing, greater need for strong cybersecurity. Here, we will take an initial look at how Google got hacked, what type of implications the breach has and what organizations should learn as result of this scary event.

How Google Was Hacked

In June 2020, a well-planned social engineering campaign occurred against Google with the use of voice phishing (vishing). The exploiting actors, known as threat actor group UNC6040 (also referenced as ShinyHunters), were able to exploit human vulnerabilities to acquire credentials that would lead them to Google’s Salesforce CRM instance. Once accessed, the attackers would gain access to the contact information and associated notes for small and medium business customers as the internal security teams were able to identify the intrusion and disrupt the process.

Lessons learned from this attack against Google:

  • Vishing Attack Vector: The exploiting actors impersonated known trusted personnel to obtain Google employee login credentials.
  • Salesforce Compromise: The attacker was able to access Google’s corporate Salesforce environment unauthorized which allowed the actors to exfiltrate data.
  • Limited Exposure: The compromised data would only be publicly available contact information along with notes about the companies themselves.

This incident highlights that social engineering attacks can still penetrate a corporation, regardless of their standing within an industry. For a time, the phrase “google hacked” trended around the world while cybersecurity practitioners identified steps of the attack and what for foreboding implications this would have on the business community at large.

The Role of ShinyHunters and UNC6040

Shinyhunters has a history of extortion and selling stolen data from various prominent organizations. Earlier are breaches of PowerSchool, Oracle Cloud, Snowflake, AT&T, NitroPDF, Wattpad, and MathWay. In fact, after Google was hacked the group made it clear to victims they would either leak or sell the data unless they received payments. It was reported that one victim actually paid the group 4 Bitcoin (about $400,000) so their data was not made public.

GPT-OSS official logo and branding on gradient background representing open-source generative AI revolution
Breakthrough GPT-OSS: 4 Key Benefits of Open Source AI in 2025

Shinyhunters repeated “google hacked” purposefully in forums, dark web marketplaces, social media etc., to create the maximum influence over their victims. This method of cyber extortion demonstrates the psychological aspect of cyber extortion: the communication of “google hacked” creates higher levels of fear and urgency.

Illustration of a masked thief emerging from a laptop with “Google hacked Data Breach Salesforce Breach Exposed!” text