SELECT LANGUAGE BELOW

ShinyHunters hack Google through voice phishing scheme

ShinyHunters hack Google through voice phishing scheme

Accounting for the safety of hospitals and nonprofits during cyber attacks can be tricky. These institutions often lack the resources for robust cybersecurity measures, unlike larger corporations. When a major player like Google faces a data breach, questions arise. Has data security taken a backseat in company priorities? Or are today’s cybercriminals so advanced that even top talent struggles to keep up?

Recently, Google disclosed that customer data had been stolen due to a breach within one of its internal databases. Specifically, the attack targeted systems using Salesforce, which many companies rely on. This incident is linked to recognized hacker groups.

Understanding the Google Data Breach

Google reported that the hacking group Shinyhunters accessed customer data from its internal Salesforce database, used for managing client relations. In a blog post, the company mentioned that stolen information included “basic, public business information” like names and contact details.

Shinyhunters, a noted cybercriminal organization tracked as UNC6040, has recently been involved in high-profile breaches affecting firms like AT&T and Ticketmaster. In this case, the hackers focused on Google’s Salesforce system, which contains contact information and internal notes about businesses.

According to insights from Google’s Threat Intelligence Group, voice phishing—or “Vishing”—has been a key tactic used by these attackers impersonating company employees over the phone to reset passwords. This method has been notably successful lately.

No Company is Immune to Cyber Threats

Google has not disclosed how many customers were impacted by this breach. When contacted for further details, the company directed inquiries back to the blog post without additional commentary. It remains uncertain whether any ransom was demanded by the hackers.

Similar breaches have also been reported by companies like Cisco and Qantas, indicating a wider trend targeting cloud-based customer management tools.

In its blog, Google noted that Shinyhunters might soon launch a site to leak the stolen data, a tactic frequently employed by ransomware groups to coerce companies into compliance. This group reportedly collaborates with other cybercriminal organizations, some of which have engaged in threatening behavior.

Tips for Avoiding Phishing and Social Engineering Attacks

Organizations like Google might be prime targets, but it’s often individuals who become the weak link. There are several practical measures you can take to lessen the risk.

1. Don’t Share Login Info Over the Phone

One way the Google breach occurred was through an employee revealing sensitive information over a call. A legitimate IT team would never ask for passwords or two-factor authentication codes like that—if someone does, that’s a clear warning sign.

2. Confirm Caller Identity

If someone claims to be from your company’s IT or a service provider, it’s wise to hang up and call back using an official number. Don’t trust the caller ID as it can be spoofed.

3. Enable Two-Factor Authentication (2FA)

Even if your credentials are compromised, two-factor authentication can act as a barrier against unauthorized access by requiring additional verification.

4. Be Wary of Phishing Links

Phishing messages often contain links to fake websites designed to steal personal data. These messages usually create urgency, prompting you to confirm accounts or reset passwords. Instead of clicking the link, scrutinize the message closely.

5. Use Data Deletion Services

Many online attackers exploit publicly available personal data. While no service can remove all personal data from the internet, using a deletion service can help manage and minimize your digital footprint.

6. Keep Software Updated

Cybercriminals often target outdated software with known vulnerabilities. Ensure that your operating system, browser, and applications are up to date and enable automatic updates when feasible.

7. Use a Phishing Detection Password Manager

A quality password manager should do more than store passwords securely; it can warn you if you visit suspicious websites. If your manager doesn’t autofill your login, that’s a potential red flag.

8. Monitor Accounts for Unusual Activity

If you suspect your account has been compromised, keep an eye out for unauthorized logins or password reset requests. Setting up alerts may help in quickly identifying suspicious actions.

9. Report Phishing Attempts

Should you encounter potential phishing attempts, notify your organization’s IT or appropriate authority. Reporting these incidents can help in preventing them from affecting others.

Key Takeaways

While the data compromised in the Google breach was limited, such violations spotlight the ongoing vulnerabilities in corporate systems. Shinyhunters has shown an alarming ability to exploit these weaknesses, particularly through voice phishing—highlighting how human errors can jeopardize even well-secured environments.

How confident are you in your company’s cybersecurity training? Feel free to share your thoughts.

Facebook
Twitter
LinkedIn
Reddit
Telegram
WhatsApp

Related News