13.5 million
Education technology company McGraw Hill has suffered a major data breach affecting 13.5 million individuals. The incident was caused by a misconfiguration in a webpage hosted by its third-party CRM provider, Salesforce. The notorious data breach broker and threat actor group, ShinyHunters, claimed the attack and subsequently leaked over 100GB of data after a ransom was not paid. The leaked information includes names, phone numbers, physical addresses, and unique email addresses. This breach underscores the significant security risks associated with cloud service misconfigurations and the broader supply chain, as the point of failure was external to McGraw Hill's core infrastructure.
Threat Actor: ShinyHunters is a well-known cybercriminal group that specializes in large-scale data breaches, often targeting misconfigured cloud services. They typically exfiltrate data and attempt to extort victims, leaking the data on dark web forums if the ransom is not paid.
Attack Vector: The breach was not the result of a direct intrusion into McGraw Hill's internal networks. Instead, it stemmed from a misconfigured webpage on the Salesforce cloud platform, which allowed unauthorized public access to the underlying data. This is a classic example of a Cloud Security failure.
Timeline:
The core of this incident is a failure in cloud security posture management. The attack likely exploited an improperly configured public-facing Salesforce site or community page. This could involve:
ShinyHunters likely used scanning tools to discover these misconfigured assets as part of a broader campaign. This aligns with the MITRE ATT&CK technique T1595.002 - Cloud Service Probing. Once the exposed data was found, they exfiltrated it using T1530 - Data from Cloud Storage Object.
The breach has exposed the personal information of 13.5 million people, primarily students and educators. While McGraw Hill stated the data was 'non-sensitive,' the leaked dataset includes a combination of names, email addresses, physical addresses, and phone numbers. This information is highly valuable for follow-on attacks, such as:
The reputational damage to McGraw Hill is significant, and the incident may attract regulatory scrutiny under data protection laws like GDPR or CCPA, depending on the residency of the affected individuals.
Detecting this type of breach requires a focus on external and cloud-based assets.
Detection:
Response: McGraw Hill responded by securing the affected webpages, engaging external cybersecurity experts, and launching an investigation. This is a standard and appropriate incident response procedure.
Preventing similar breaches requires a robust cloud security program.
Routinely audit and enforce secure configurations for all cloud platforms, including Salesforce, to prevent public exposure of sensitive data.
Mapped D3FEND Techniques:
Apply the principle of least privilege to cloud service accounts, especially guest and unauthenticated user profiles, to limit their access to data.
Mapped D3FEND Techniques:
To prevent breaches like the one at McGraw Hill, organizations must prioritize Application Configuration Hardening, specifically for their Salesforce environment. This requires a dedicated effort beyond default settings. Security teams should use a Cloud Security Posture Management (CSPM) tool to continuously scan their Salesforce instance for misconfigurations. Key areas of focus include: auditing the permissions of the 'Guest User Profile' on all public-facing Experience Cloud sites to ensure it has no read/write access to sensitive objects; verifying that sharing rules are not inadvertently exposing records to public access; and ensuring that any Apex code or API endpoints accessible by guest users enforce strict authorization checks. This should be an automated, ongoing process, not a one-time audit. Alerts should be configured to immediately notify the security team of any high-risk configuration drift, such as a change that makes a sensitive data object publicly visible. This proactive hardening directly addresses the root cause of the breach.
Detecting data exfiltration from a cloud platform like Salesforce requires User Data Transfer Analysis. Organizations should leverage Salesforce Shield or integrate its Event Monitoring logs with a SIEM to analyze data access patterns. The goal is to establish a baseline for normal data transfer volumes and patterns. For the McGraw Hill incident, a key detection opportunity would have been an alert for an unusually large data export, such as 100GB of data being accessed or downloaded over a short period. This is highly anomalous and indicative of bulk exfiltration. The analysis should focus on events like 'API Event' (for API-based queries) and 'Report Export Event'. Alerts should be triggered when the volume of data transferred by a single user or from a single source IP exceeds a defined threshold, or when data is accessed outside of normal business hours or from an unfamiliar geographic location. This technique acts as a critical backstop, allowing for detection even if a misconfiguration has already exposed the data.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats