On March 7, 2026, Salesforce issued a critical security advisory regarding an ongoing data theft campaign targeting its Experience Cloud product. The campaign is orchestrated by the notorious cybercrime group ShinyHunters and affects an estimated 300-400 organizations. It is crucial to understand that this is not a vulnerability in the Salesforce platform itself, but rather the exploitation of a common and severe customer-side misconfiguration. Attackers are abusing overly permissive security settings for guest user profiles on public-facing Experience Cloud sites. By leveraging these misconfigurations, ShinyHunters can query and exfiltrate sensitive CRM data directly via public APIs without needing to bypass authentication or steal credentials. The incident highlights the critical importance of proper cloud configuration and the shared responsibility model in securing SaaS platforms.
The threat actor, ShinyHunters, is a well-known group famous for large-scale data breaches and selling stolen data on dark web forums. Their current campaign, dubbed the "Salesforce Aura Campaign," systematically targets misconfigured Salesforce Experience Cloud instances. The attack does not require sophisticated exploits; instead, it relies on a fundamental failure in access control configuration by Salesforce customers.
Guest user accounts in Experience Cloud are intended to provide unauthenticated access to public content. However, if administrators grant these guest profiles excessive permissions—such as read access to sensitive objects and fields—that data becomes publicly accessible to anyone who knows how to query the API. ShinyHunters automated this process to harvest data at scale.
The attack methodology is straightforward and effective:
/s/sfsites/aura API endpoint, a key component of the Lightning Aura framework.This entire process is unauthenticated. The attackers are simply interacting with the platform as any anonymous public user would, but they are programmatically accessing data that was never intended to be public.
The impact is severe and widespread. ShinyHunters claims to have compromised data from 300-400 organizations. The exfiltrated data includes sensitive CRM information, which can encompass customer PII, sales pipelines, internal communications, and other business-critical data. The Financial Industry Regulatory Authority (FINRA) has issued a specific alert, indicating that firms in the financial sector are among the victims. The stolen data is being actively used for secondary attacks, including:
Detecting this activity requires monitoring API traffic and logs for anomalous guest user behavior.
| Type | Value | Description |
|---|---|---|
| URL Pattern | */s/sfsites/aura* |
Traffic to this endpoint from a single source IP making numerous, rapid queries can indicate scanning or exfiltration. |
| User Agent | *AuraInspector* |
The user-agent string may contain 'AuraInspector', indicating the use of the scanning tool. |
| API Endpoint | */graphql/v1 |
High-volume queries to the GraphQL endpoint from unauthenticated guest users are highly suspicious. |
| Log Source | Salesforce Event Monitoring |
Analyze 'API Event' and 'URI Event' logs for guest user sessions accessing an unusually high number of records or object types. |
| Network Traffic Pattern | High volume of data returned to a single IP from a guest user session. | A guest user session that results in megabytes or gigabytes of data transfer is a major red flag for exfiltration. |
UserType = Guest) that perform an unusually high number of API calls or access a wide variety of objects. This is a key application of D3FEND's Resource Access Pattern Analysis./s/sfsites/aura or /graphql/v1 endpoints in a short period.This incident is entirely preventable with proper configuration. Follow Salesforce's published best practices immediately:
View All, Modify All, Edit, and Delete permissions on all objects. Grant Read access only to the specific objects and fields that are intended to be public. This aligns with D3FEND's User Account Permissions hardening.Sharing Settings. This is a critical control that sets the default organization-wide sharing for guest users to Private.Properly configure guest user permissions in Salesforce Experience Cloud to enforce the principle of least privilege.
Regularly audit cloud configurations and user permissions to identify and remediate overly permissive settings.
Restrict public access to sensitive data objects and APIs by correctly configuring sharing rules and profiles.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats