9.4 million customer and employee records
The prolific hacking group ShinyHunters has claimed a significant data breach against the National Railroad Passenger Corporation, widely known as Amtrak. In a post on a dark web forum, the group alleges it has exfiltrated 9.4 million records and has threatened to leak the data if a ransom is not paid. The attackers claim the initial access vector was Amtrak's Salesforce environment, which aligns with ShinyHunters' recent pattern of targeting companies through social engineering attacks aimed at employees of third-party service providers. While the claim is not yet verified with data samples, ShinyHunters' track record of successful, high-profile breaches lends it significant credibility.
ShinyHunters, a group known for large-scale data breaches and selling stolen data, has listed Amtrak as its latest victim. The group's claim specifies the theft of 9.4 million records, which purportedly include a mix of customer Personally Identifiable Information (PII) and internal company data. The group set a deadline of April 14, 2026, for ransom payment before they would release the data.
The alleged point of entry is Amtrak's Salesforce instance. This is consistent with a broader campaign by ShinyHunters, which has been linked to social engineering attacks targeting Salesforce employees to gain access to their customers' environments. This highlights a critical third-party risk, where the security of a major corporation can be undermined by compromising an employee at one of its vendors.
Based on the claims and ShinyHunters' known modus operandi, the attack likely followed these steps:
T1566): The attackers conducted a social engineering or phishing campaign targeting Salesforce employees to steal their corporate credentials.T1078.004): Using the stolen Salesforce employee credentials, the attackers accessed the administrative backend of their customers' environments, including Amtrak's.T1530): Once inside the Salesforce environment, the attackers used built-in data export functionalities to exfiltrate the 9.4 million records.This TTP (Tactics, Techniques, and Procedures) bypasses many of the target's direct perimeter defenses by leveraging trusted access from a third-party vendor.
If the claim is accurate, the breach of 9.4 million records from a national transportation provider like Amtrak would have severe consequences:
No Indicators of Compromise (IOCs) have been released at this time.
Detecting this type of third-party compromise is challenging. However, organizations can take steps:
Enforcing MFA for all accounts, especially privileged third-party support accounts, is the most effective defense against this type of compromise.
Mapped D3FEND Techniques:
Continuously auditing SaaS access logs for anomalous behavior, such as large data exports or unusual login patterns, can help detect a compromised third-party account.
Mapped D3FEND Techniques:
Applying principles of least privilege to vendor accounts, ensuring they only have the access they need, for the time they need it, can limit the 'blast radius' of a compromise.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats