500,000+ customer records
The ransomware group Shinyhunters has claimed responsibility for significant data breaches at two prominent international companies: luxury hotel operator Aman Resorts and fashion giant Zara. In posts made on April 19, 2026, the group asserted it had exfiltrated sensitive data from both organizations and issued a public ultimatum. For Aman Resorts, Shinyhunters claims to possess 500,000 customer records from a compromised Salesforce instance. For Zara, the group alleges access to the company's Google BigQuery data, reportedly gained via a vulnerability in the Anodot.com business intelligence platform. The threat actor has set a deadline of April 21, 2026, for both companies to negotiate, threatening to leak the stolen data and cause further digital disruption if their demands are not met. These incidents highlight the continued threat of data extortion attacks against high-profile consumer brands.
Shinyhunters is a known threat actor with a history of data breaches and extortion, although their recent activity has been less frequent. These new claims suggest a resurgence of the group or an actor using their name. The attacks appear to be financially motivated, following the double extortion model where data is exfiltrated before any potential encryption.
The group's TTPs in this case are centered on data theft (T1530 - Data from Cloud Storage Object) and public extortion via a leak site, a hallmark of many ransomware and data extortion gangs.
While specific technical details of the intrusions are not available, the claims allow for some analysis based on the targeted platforms.
T1566 - Phishing).T1539 - Steal Web Session Cookie).T1078.004 - Valid Accounts: Cloud Accounts).The overall strategy is Data from Information Repositories (T1213) followed by Data Exfiltration over C2 Channel (T1041).
If the claims are substantiated, the impact on both companies would be severe.
No specific IOCs were provided in the source articles.
Detection Strategies:
Response Actions:
Enforce MFA on all cloud and SaaS platforms, especially for administrative accounts and those with access to sensitive data repositories like Salesforce and GCP.
Mapped D3FEND Techniques:
Restrict access to sensitive data stores like BigQuery datasets to a limited set of internal IP addresses or through a VPN, reducing exposure from compromised third-party services.
Mapped D3FEND Techniques:
Implement continuous auditing of cloud and SaaS logs to detect anomalous activities such as mass data exports or unusual API access patterns.
Mapped D3FEND Techniques:
Regularly review the permissions of third-party applications integrated with platforms like Salesforce and GCP, ensuring they adhere to the principle of least privilege.
Mapped D3FEND Techniques:
To defend against attacks targeting cloud data stores like Salesforce and BigQuery, organizations must implement robust Cloud Activity and Security Analysis. This involves centralizing and analyzing logs from all SaaS and IaaS platforms. For the Zara incident, this would mean ingesting Google Cloud Audit Logs into a SIEM and creating alerts for anomalous BigQuery activity. For example, an alert should trigger if a service account associated with a third-party like Anodot suddenly queries an unusually large number of tables or exfiltrates data at a high rate. Similarly, for the Aman Resorts breach, Salesforce Event Monitoring logs should be analyzed for indicators like a single user account exporting an abnormally high number of reports or accessing records outside of normal business hours. By establishing a baseline of normal cloud activity, security teams can detect the subtle indicators of a data theft operation in progress and respond before millions of records are lost.
The most fundamental defense against the account takeover that likely preceded these data thefts is the universal enforcement of Multi-factor Authentication (MFA). Both Aman Resorts and Zara should ensure that every single user and service account with access to their Salesforce and Google Cloud environments is protected by MFA. This is not just for human users; modern identity platforms allow for MFA enforcement on service-to-service communication where applicable. Relying on just a username and password for systems containing millions of sensitive records is negligent. Implementing phishing-resistant MFA, such as FIDO2 security keys, provides the strongest protection against credential theft. Even if an attacker manages to steal a user's password, they would be unable to access the cloud platforms without the physical second factor, effectively stopping the attack chain at the initial access stage.
User Data Transfer Analysis is a specific detection technique crucial for catching data exfiltration in progress. Security teams at companies like Zara and Aman Resorts should deploy tools that monitor the volume and flow of data leaving their cloud environments. For the Salesforce breach, this would involve setting thresholds for the number of records exported by a single user in a given timeframe. An alert would be generated if a user who normally exports 100 records per day suddenly exports 500,000. For the BigQuery breach, this would involve monitoring the egress data volume from the project. A sudden spike in data transfer from BigQuery to an external IP, especially one not on an allowlist, would be a strong indicator of theft. This technique moves beyond simple access logging to quantify data movement, providing a high-fidelity signal that a data breach is actively occurring.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats