Google Confirms It Has Been Hacked; What User Data Was Stolen?

3 Min Read

Google confirmed a significant data breach involving unauthorized access to one of its corporate Salesforce CRM instances. This CRM system stored contact details and related notes for small and medium-sized businesses interested in Google Ads services. The breach is part of a broader wave of sophisticated cyberattacks conducted by a threat group identified as UNC6040, also known as ShinyHunters, who use voice phishing (vishing) and advanced social engineering techniques to target cloud systems like Salesforce.

Incident Overview: The Google Ads CRM Data Breach

  • Date of Incident: June 2025
  • Affected System: Google corporate Salesforce CRM used for potential Google Ads customers
  • Data Exposed: Business names, phone numbers, and sales-related notes recorded by Google sales agents
  • Non-Impacted Data: No payment or financial information, and no data from Google Ads accounts, Merchant Center, or Google Analytics was affected
  • Number of Records: Approximately 2.55 million records (may include duplicates)
  • Threat Actor: ShinyHunters (UNC6040), known for targeting Salesforce cloud environments
  • Response: Google promptly cut off unauthorized access, performed impact analysis, and implemented ongoing monitoring
  • Notification: Affected customers and businesses were notified by early August 2025

Technical Background: Voice Phishing and Attack Methods (From Google Cloud Threat Intelligence)

  • The attackers used voice phishing (vishing) to socially engineer employees with access to Salesforce environments.
  • Victims were tricked into authorizing malicious connected applications, such as modified versions of Salesforce Data Loader, granting attackers extensive access to data.
  • The attack infrastructure included VPNs and TOR to evade detection and attribution.
  • Extortion attempts often follow the data breach months later, with ransom demands via calls or emails using the ShinyHunters brand.
  • Google emphasizes layered security defenses: strict access controls, monitoring connected apps, IP restrictions, Salesforce Shield, and universal multi-factor authentication (MFA).
  • The campaign targets IT support personnel and administrators through sophisticated social engineering techniques.

Summary Table: Google Data Breach and Attack Campaign

AspectDetails
Breach DateJune 2025
Affected SystemGoogle corporate Salesforce CRM
Data ExposedBusiness names, phone numbers, sales notes
Payment/Ads Data ImpactNone
Records CompromisedApproximately 2.55 million
Threat ActorShinyHunters (UNC6040)
Attack MethodVoice phishing (vishing), malicious Salesforce connected apps
Infrastructure UsedVPNs, TOR for anonymity
Extortion AttemptsRansom demands months after initial breach
Security RecommendationsAccess controls, app management, IP restrictions, MFA, monitoring
Notification CompletedEarly August 2025

What This Means for Customers and Businesses

  • The breach involved publicly available business information, reducing risks of privacy or financial theft but increasing chances of targeted phishing or fraud using exposed contacts.
  • Businesses should remain vigilant against suspicious calls, emails, or messages that could leverage the compromised contact data.
  • This incident highlights the critical need for strong security awareness, especially for IT and support teams who can be targeted by voice phishing.
  • Companies using cloud CRM platforms like Salesforce must enforce layered security controls, including monitoring for unauthorized connected apps and applying universal multi-factor authentication.

Official Google Source

For the most authoritative and technical insights, Google’s Threat Intelligence Group detailed this incident and the attacker methods in their official blog post:

https://cloud.google.com/blog/topics/threat-intelligence/voice-phishing-data-extortion?rev=7194ef805fa2d04b0f7e8c9521f97343


Leave a review

Leave a Review

Your email address will not be published. Required fields are marked *