A new threat group, Scattered Lapsus$ Hunters, has publicly surfaced, claiming an affiliation with notorious groups like Scattered Spider, Lapsus$, and ShinyHunters. On the weekend of October 4-5, 2025, the group launched a dark web data leak site listing 39 high-profile organizations as victims of a large-scale data breach. The targeted data allegedly originates from the victims' Salesforce environments. The list of victims includes major brands like Cisco, Toyota, and Marriott. The group claims to have stolen nearly one billion records containing sensitive PII and has set an October 10, 2025, deadline for ransom negotiations. In a novel extortion tactic, the group has also demanded payment from Salesforce itself to prevent the data of the 39 victims from being leaked. The initial vector is believed to be social engineering, specifically vishing attacks targeting IT support staff to gain access to user credentials.
Scattered Lapsus$ Hunters represents a potential evolution of social engineering-focused threat actors, combining the tactics of several infamous groups. Their primary objective is data theft for financial extortion. The current campaign targets organizations that rely on Salesforce for customer relationship management and other business functions. The group's decision to create a public leak site and engage in multi-pronged extortion (targeting both the victims and their software vendor) indicates a high degree of confidence and a desire for maximum psychological impact.
Based on reports and the known TTPs of the alleged affiliate groups, the attack likely follows this pattern:
T1592 - Gather Victim Host Information)T1566.004 - Spearphishing Voice)T1078 - Valid Accounts)T1530 - Data from Cloud Storage Object)T1657 - Financial Extortion)While Salesforce denies any vulnerability in its platform, the attack highlights the persistent threat of identity-based attacks. The success of this campaign hinges on the exploitation of the human element rather than software flaws. The TTPs are consistent with Scattered Spider and Lapsus$, who are known for their expertise in social engineering and bypassing MFA.
This incident underscores that even secure cloud platforms like Salesforce can be compromised if the identities and credentials used to access them are stolen. The perimeter has shifted from the network to the user's identity.
The potential impact is massive, affecting 39 major global corporations and their customers. The alleged theft of one billion records containing sensitive PII could lead to widespread identity theft and fraud. For the affected companies, the consequences include:
Detection of this activity focuses on identity and access management logs and user behavior analytics.
| Type | Value | Description |
|---|---|---|
log_source |
Salesforce Event Monitoring Logs | Look for logins from unfamiliar IP addresses, locations, or user agents, especially for privileged accounts. |
log_source |
VPN & IdP Logs | Correlate logins with help desk ticket activity. A flurry of password resets or MFA changes for a user followed by a successful login from an anomalous location is a major red flag. |
command_line_pattern |
helpdesk, support, IT |
Monitor internal communications (e.g., Slack, Teams) for employees reporting suspicious calls from individuals claiming to be from IT support. |
api_endpoint |
Salesforce API endpoints | Monitor for unusually large data export API calls, which could indicate mass data exfiltration. |
Defending against this requires a focus on identity security and employee awareness.
User Geolocation Logon Pattern Analysis.Salesforce refuses ransom; new details reveal attacks used malicious Data Loader app via vishing and compromised OAuth tokens from Salesloft's Drift integration.
Salesforce has officially refused the ransom demand from 'Scattered LAPSUS$ Hunters'. New technical details reveal the attackers employed two primary methods: tricking employees via vishing into authorizing a malicious Salesforce Data Loader application, and abusing compromised OAuth tokens from the third-party Salesloft Drift integration. Salesforce has disabled the problematic Drift integration, and Salesloft has advised customers to refresh access tokens. The group continues to list over 40 high-profile victims, including Adidas and Disney/Hulu, with an October 10 deadline for data release.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats