McGraw Hill Data Breach Exposes 13.5 Million Accounts After Salesforce Misconfiguration

McGraw Hill Confirms Breach of 13.5 Million Accounts; ShinyHunters Claims Attack via Salesforce Misconfiguration

HIGH
April 17, 2026
4m read
Data BreachCloud SecurityThreat Actor

Impact Scope

People Affected

13.5 million

Affected Companies

McGraw Hill

Industries Affected

Education

Related Entities

Threat Actors

Organizations

Products & Tech

Other

McGraw Hill

Full Report

Executive Summary

Education technology company McGraw Hill has suffered a major data breach affecting 13.5 million individuals. The incident was caused by a misconfiguration in a webpage hosted by its third-party CRM provider, Salesforce. The notorious data breach broker and threat actor group, ShinyHunters, claimed the attack and subsequently leaked over 100GB of data after a ransom was not paid. The leaked information includes names, phone numbers, physical addresses, and unique email addresses. This breach underscores the significant security risks associated with cloud service misconfigurations and the broader supply chain, as the point of failure was external to McGraw Hill's core infrastructure.


Threat Overview

Threat Actor: ShinyHunters is a well-known cybercriminal group that specializes in large-scale data breaches, often targeting misconfigured cloud services. They typically exfiltrate data and attempt to extort victims, leaking the data on dark web forums if the ransom is not paid.

Attack Vector: The breach was not the result of a direct intrusion into McGraw Hill's internal networks. Instead, it stemmed from a misconfigured webpage on the Salesforce cloud platform, which allowed unauthorized public access to the underlying data. This is a classic example of a Cloud Security failure.

Timeline:

  • ShinyHunters gains access to the data via the misconfigured Salesforce instance.
  • The group posts a threat on a dark web portal, claiming to have 45 million records and demanding a ransom.
  • After the demand is not met, ShinyHunters leaks a dataset of over 100GB.
  • The Have I Been Pwned service ingests the data, identifying 13.5 million unique email addresses.

Technical Analysis

The core of this incident is a failure in cloud security posture management. The attack likely exploited an improperly configured public-facing Salesforce site or community page. This could involve:

  • Guest User Permissions: Overly permissive access rights granted to unauthenticated guest user profiles on a Salesforce Experience Cloud site.
  • Insecure API Endpoints: Publicly exposed API endpoints that did not enforce proper authentication or authorization checks.
  • Misconfigured Storage: Data stored in a related cloud bucket (e.g., Amazon S3) that was linked from the Salesforce page and had public read access enabled.

ShinyHunters likely used scanning tools to discover these misconfigured assets as part of a broader campaign. This aligns with the MITRE ATT&CK technique T1595.002 - Cloud Service Probing. Once the exposed data was found, they exfiltrated it using T1530 - Data from Cloud Storage Object.

Impact Assessment

The breach has exposed the personal information of 13.5 million people, primarily students and educators. While McGraw Hill stated the data was 'non-sensitive,' the leaked dataset includes a combination of names, email addresses, physical addresses, and phone numbers. This information is highly valuable for follow-on attacks, such as:

  • Targeted Phishing: Crafting convincing phishing emails using the leaked personal details.
  • Identity Theft: Combining the leaked data with information from other breaches to commit fraud.
  • Spam and Robocalls: Using the email addresses and phone numbers for mass marketing campaigns.

The reputational damage to McGraw Hill is significant, and the incident may attract regulatory scrutiny under data protection laws like GDPR or CCPA, depending on the residency of the affected individuals.


Detection & Response

Detecting this type of breach requires a focus on external and cloud-based assets.

Detection:

  • Cloud Security Posture Management (CSPM): Implement CSPM tools to continuously scan cloud environments (including Salesforce) for misconfigurations, such as public access to data or overly permissive roles. This is a form of D3-ACH: Application Configuration Hardening.
  • Data Loss Prevention (DLP): Monitor for large, anomalous data egress from cloud platforms. A sudden download of 100GB from a Salesforce environment should trigger an immediate alert.
  • Threat Intelligence: Monitor dark web forums and threat intelligence feeds for mentions of your organization or keywords related to your data, which can provide an early warning of a breach.

Response: McGraw Hill responded by securing the affected webpages, engaging external cybersecurity experts, and launching an investigation. This is a standard and appropriate incident response procedure.

Mitigation

Preventing similar breaches requires a robust cloud security program.

  1. Third-Party Risk Management: Conduct thorough security assessments of all third-party vendors and cloud service providers. Understand the shared responsibility model for each platform.
  2. Regular Cloud Audits: Perform regular, automated audits of all cloud configurations. This should be a continuous process, not a point-in-time check.
  3. Least Privilege Access: Apply the principle of least privilege to all cloud service configurations, especially for guest or public-facing user profiles. Ensure that only the absolute minimum necessary data is exposed.
  4. Data Minimization: Do not store sensitive data in publicly accessible environments unless absolutely necessary and properly secured.
  5. Employee Training: Train developers and administrators on secure configuration best practices for platforms like Salesforce.

Timeline of Events

1
April 17, 2026
This article was published

MITRE ATT&CK Mitigations

Routinely audit and enforce secure configurations for all cloud platforms, including Salesforce, to prevent public exposure of sensitive data.

Mapped D3FEND Techniques:

Apply the principle of least privilege to cloud service accounts, especially guest and unauthenticated user profiles, to limit their access to data.

Mapped D3FEND Techniques:

Audit

M1047enterprise

Continuously monitor cloud audit logs for signs of anomalous access or large-scale data exfiltration events.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

To prevent breaches like the one at McGraw Hill, organizations must prioritize Application Configuration Hardening, specifically for their Salesforce environment. This requires a dedicated effort beyond default settings. Security teams should use a Cloud Security Posture Management (CSPM) tool to continuously scan their Salesforce instance for misconfigurations. Key areas of focus include: auditing the permissions of the 'Guest User Profile' on all public-facing Experience Cloud sites to ensure it has no read/write access to sensitive objects; verifying that sharing rules are not inadvertently exposing records to public access; and ensuring that any Apex code or API endpoints accessible by guest users enforce strict authorization checks. This should be an automated, ongoing process, not a one-time audit. Alerts should be configured to immediately notify the security team of any high-risk configuration drift, such as a change that makes a sensitive data object publicly visible. This proactive hardening directly addresses the root cause of the breach.

Detecting data exfiltration from a cloud platform like Salesforce requires User Data Transfer Analysis. Organizations should leverage Salesforce Shield or integrate its Event Monitoring logs with a SIEM to analyze data access patterns. The goal is to establish a baseline for normal data transfer volumes and patterns. For the McGraw Hill incident, a key detection opportunity would have been an alert for an unusually large data export, such as 100GB of data being accessed or downloaded over a short period. This is highly anomalous and indicative of bulk exfiltration. The analysis should focus on events like 'API Event' (for API-based queries) and 'Report Export Event'. Alerts should be triggered when the volume of data transferred by a single user or from a single source IP exceeds a defined threshold, or when data is accessed outside of normal business hours or from an unfamiliar geographic location. This technique acts as a critical backstop, allowing for detection even if a misconfiguration has already exposed the data.

Sources & References

Data breach at edtech giant McGraw Hill affects 13.5 million accounts
BleepingComputer (bleepingcomputer.com) April 16, 2026
13.5 Million Accounts Affected in Latest ShinyHunters Campaign
National CIO Review (nationalcioreview.com) April 16, 2026
McGraw Hill Data Breach
Have I Been Pwned (haveibeenpwned.com) April 16, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

Data BreachSalesforceMisconfigurationShinyHuntersEducationCloud Security

📢 Share This Article

Help others stay informed about cybersecurity threats