{"id":953669,"date":"2025-08-08T11:02:04","date_gmt":"2025-08-08T05:32:04","guid":{"rendered":"https:\/\/telecomlive.in\/web\/?p=953669"},"modified":"2025-08-08T11:02:04","modified_gmt":"2025-08-08T05:32:04","slug":"google-admits-shinyhunters-steal-data-in-salesforce-hack-the-data-retrieved-by-the-threat-actor-was","status":"publish","type":"post","link":"https:\/\/telecomlive.in\/web\/2025\/08\/08\/google-admits-shinyhunters-steal-data-in-salesforce-hack-the-data-retrieved-by-the-threat-actor-was\/","title":{"rendered":"Google admits ShinyHunters steal data in Salesforce hack: &#8216;The data retrieved by the threat actor was&#8230;&#8217;"},"content":{"rendered":"<p>Google has confirmed that a cyber criminal group broke into its Salesforce database. The tech giant said that hacking group popularly known as ShinyHunters, formally designated as UNC6040 is behind the breach. The company\u2019s Threat Intelligence Group published a blog post saying \u201cIn June, one of Google\u2019s corporate Salesforce instances was impacted by similar UNC6040 activity\u201d. However, it did not reveal the number of customers affected by the hack.<\/p>\n<p>\u201cAnalysis revealed that data was retrieved by the threat actor during a small window of time before the access was cut off. The data retrieved by the threat actor was confined to basic and largely publicly available business information, such as business names and contact details,\u201d the company said.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Google has confirmed that a cyber criminal group broke into its Salesforce database. The tech giant said that hacking group popularly known as ShinyHunters, formally designated as UNC6040 is behind the breach. The company\u2019s Threat Intelligence Group published a blog post saying \u201cIn June, one of Google\u2019s corporate Salesforce instances was impacted by similar UNC6040 activity\u201d. However, it did not reveal the number of customers affected by the hack. \u201cAnalysis revealed that data was retrieved by the threat actor during a small window of time before the access was cut off. The data retrieved by the threat actor was confined [&hellip;]<\/p>\n","protected":false},"author":11,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[87,4,11],"tags":[],"class_list":["post-953669","post","type-post","status-publish","format-standard","hentry","category-it-2-the-times-of-india","category-newspapers","category-the-times-of-india"],"acf":[],"_links":{"self":[{"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/posts\/953669","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/comments?post=953669"}],"version-history":[{"count":0,"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/posts\/953669\/revisions"}],"wp:attachment":[{"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/media?parent=953669"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/categories?post=953669"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/tags?post=953669"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}