ShinyHunters Claims Massive Data Theft from Telus Digital, Demands $65 Million

Telus Digital Investigates Breach After "ShinyHunters" Claims Petabyte-Scale Data Theft

CRITICAL
March 14, 2026
5m read
Data BreachThreat ActorSupply Chain Attack

Impact Scope

Affected Companies

Telus Digital

Industries Affected

TelecommunicationsTechnologyFinanceGovernment

Related Entities

Threat Actors

Products & Tech

Other

Telus DigitalTelus Salesloft Drift

Full Report

Executive Summary

Telus Digital, the business process outsourcing (BPO) arm of Canadian telecom giant Telus, is currently investigating a massive data breach claimed by the notorious hacking group ShinyHunters. The threat actors allege they have exfiltrated nearly a petabyte (1,000 TB) of data over several months and are demanding a $65 million ransom. The stolen data reportedly includes sensitive information from Telus Digital's clients—which span banking, technology, and government—as well as customer data and call records from Telus's consumer division. The initial access vector is believed to be a supply chain attack, where attackers leveraged stolen Google Cloud Platform credentials obtained from a prior breach at Salesloft Drift. This incident underscores the cascading risk of supply chain security failures and the immense scale of modern data breaches.

Threat Overview

The threat actor, ShinyHunters, is a well-known and financially motivated group famous for large-scale data breaches and selling stolen data on dark web forums. In this case, they targeted Telus Digital, a BPO provider with access to sensitive data from a wide array of prominent companies. The attackers claim to have maintained access to the network for an extended period, possibly since August 2025, allowing for the slow exfiltration of an enormous volume of data. The compromised data is said to affect 28 named companies that are clients of Telus Digital, posing a significant third-party risk to those organizations. The attackers are attempting to extort Telus Digital with a $65 million demand, fitting the pattern of a data theft and extortion campaign rather than a traditional ransomware attack.

Technical Analysis

Based on reports, the attack chain involved a sophisticated supply chain compromise:

  1. Initial Access: The attackers did not breach Telus Digital directly. Instead, they leveraged credentials stolen from a third-party vendor, Salesloft Drift. These were reportedly Google Cloud Platform (GCP) credentials, which provided an initial foothold into Telus Digital's cloud environment. This is a classic example of T1195.002 - Compromise Software Supply Chain: Compromise Software Dependency or T1078.004 - Valid Accounts: Cloud Accounts obtained from a third party.
  2. Persistence and Discovery: After gaining access, ShinyHunters likely moved laterally within the cloud environment, discovered data repositories, and escalated privileges to gain broader access to storage buckets and databases.
  3. Data Exfiltration: The core of the attack was the massive data theft. Exfiltrating a petabyte of data is a non-trivial task and would require sustained, high-bandwidth connections over a long period. Attackers likely used techniques to blend the traffic with legitimate cloud operations to avoid detection, mapping to T1537 - Transfer Data to Cloud Account and T1048 - Exfiltration Over Alternative Protocol.

The use of a cybersecurity tool, trufflehog, by the hackers is ironic. This open-source tool is designed to find leaked secrets and credentials in code repositories, suggesting the attackers may have used it to find further credentials within Telus Digital's environment to expand their access.

Impact Assessment

The potential impact of this breach is colossal. For Telus Digital, it represents a catastrophic security failure that could lead to immense financial loss from the ransom demand, incident response costs, regulatory fines, and loss of business. For the 28+ client companies, this is a severe supply chain breach that has exposed their customer data and internal information, leading to their own incident response efforts and reputational damage. For individuals whose data was compromised—including customers of Telus and its clients—the breach poses a high risk of identity theft, fraud, and targeted phishing attacks. The sheer volume of data (1 petabyte) suggests that the stolen information is likely comprehensive and highly sensitive.

Cyber Observables for Detection

To detect similar large-scale data exfiltration from a cloud environment:

Type Value Description
log_source GCP Audit Logs Monitor for anomalous API calls, especially from service accounts, related to storage access (storage.objects.get, storage.objects.list).
network_traffic_pattern Sustained high-volume egress traffic Use VPC Flow Logs or network monitoring tools to detect unusually large and sustained data transfers from internal storage to external IP addresses or other cloud accounts.
command_line_pattern trufflehog EDR or command-line logging may detect the execution of security scanning tools like trufflehog by unauthorized users or processes.
log_source Cloud IAM Logs Alert on any changes to IAM policies, especially the creation of new service accounts or the addition of broad permissions like storage.admin.

Detection & Response

  1. Cloud Security Posture Management (CSPM): Deploy CSPM tools to continuously monitor for misconfigurations, public-facing storage buckets, and overly permissive IAM roles in your cloud environment.
  2. Egress Traffic Analysis: Implement robust monitoring of all egress network traffic from your cloud environment. Baseline normal traffic patterns and set up alerts for high-volume transfers, especially to unknown destinations. This is a key D3FEND technique: Network Traffic Analysis (D3-NTA).
  3. Credential Leakage Monitoring: Use services that monitor public code repositories (like GitHub) and data breach dumps for leaked corporate credentials and API keys.
  4. Supply Chain Auditing: Regularly audit the security posture of critical third-party vendors who have access to your environment or data.

Mitigation

  1. Secure Cloud Credentials: Enforce strict controls over cloud credentials and API keys. Use short-lived tokens instead of static keys wherever possible. Implement MFA for all human access to cloud consoles. Use tools to scan code repositories for inadvertently committed secrets before they are pushed.
  2. Data Loss Prevention (DLP): Deploy cloud-native DLP solutions that can scan and classify data in storage buckets and databases. Configure policies to block or alert on the unauthorized movement of sensitive data.
  3. Least Privilege in the Cloud: Apply the principle of least privilege to all IAM roles and service accounts. A service account for one application should not have read access to data from another application or client.
  4. Network Egress Controls: Configure firewall rules and network controls to deny all outbound traffic by default, only allowing connections to known, trusted locations. This can prevent or at least complicate large-scale data exfiltration.

Timeline of Events

1
March 14, 2026
This article was published

MITRE ATT&CK Mitigations

In a cloud context, this translates to strict IAM policies. Enforcing least privilege on GCP service accounts would have limited the attacker's ability to access data beyond their intended scope.

Implementing strict egress filtering rules in the cloud VPC could have blocked or at least detected the massive data exfiltration.

Audit

M1047enterprise

Comprehensive logging and auditing of cloud API calls and network flows are essential for detecting anomalous activity like large-scale data exfiltration.

Using secret scanning tools like trufflehog proactively (by the defender) can find and remediate leaked credentials before attackers do.

D3FEND Defensive Countermeasures

To prevent a petabyte-scale exfiltration like the one claimed against Telus, strict outbound traffic filtering is essential. In the GCP environment, configure firewall rules to deny all egress traffic from storage and compute resources by default. Create explicit 'allow' rules only for necessary business traffic to known-good IP addresses and domains (e.g., patch repositories, trusted partner APIs). For data transfers, use private interconnects or VPNs instead of the public internet. Furthermore, leverage VPC Service Controls to create a service perimeter around sensitive projects and storage buckets, preventing data from being moved outside the trusted boundary, even by a compromised account with valid credentials. This would have made a slow, large-scale exfiltration over the public internet significantly more difficult and easier to detect.

The initial access via stolen third-party credentials highlights the need for rigorous third-party risk management and least-privilege access for all non-human identities. Any service account or credentials shared with a third party like Salesloft Drift must be scoped with the absolute minimum permissions required for its function. The compromised credentials should not have had broad access to Telus Digital's environment. Implement regular audits of third-party permissions and use IAM conditions in GCP to restrict access by time of day, source IP, or resource type. By tightly scoping third-party access, the 'blast radius' of a compromise in the supply chain is dramatically reduced, preventing a single stolen credential from leading to a catastrophic breach.

Detecting a slow-burn exfiltration requires advanced behavioral analysis. Implement tools that can baseline normal data access patterns within your cloud environment. For Telus Digital, this would mean establishing what a normal day/week of data access looks like for their applications and service accounts. A system like the one compromised by ShinyHunters, which began accessing and transferring massive volumes of data over several months, would create a significant deviation from this baseline. Security teams should configure alerts for when an identity (user or service account) accesses an anomalously high number of objects in a storage bucket or transfers an unusually large volume of data. This behavioral approach is critical for catching sophisticated attackers who are attempting to blend in with normal activity.

Sources & References

Hackers reportedly stole nearly 1,000TB of data from Telus Digital
MobileSyrup (mobilesyrup.com) March 12, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

ShinyHuntersData BreachExtortionSupply Chain AttackCloud SecurityGCP

📢 Share This Article

Help others stay informed about cybersecurity threats