For months now, journalists and cybersecurity experts, including UpGuard, have been following the movements of the hacker collective “Scattered Lapsus$ Hunters,” a sort of supergroup of the already well-known cybercriminal entities ShinyHunters, Scattered Spider and Lapsus$. Now, this collective has launched a website where they can extort payment from entities in return for delisting and deleting their data. The collective has specifically been targeting Salesforce data as valuable extortion leverage.
The scope and organization of this operation represents the next step in cybercrime, hinting at the potential ramifications of the group’s previously stated aim of offering ransomware-as-a-service. But if we trace it back to the beginning, we can see that even sophisticated attacks like this begin with simple and typical digital inroads.
Late 2024
March 2025 - June 2025
June 2025
August 8-18 2025
August 20th 2025
August 26th 2025
September 7th 2025
September 17th 2025
October 3rd 2025
Most news organizations are, understandably, not linking directly to the attackers’ website, though links can be found on social media. The site operates on the TOR Onion network, although claims of an additional clear web version have been made. The website lists affected Salesforce customers, along with how much of their data the group claims to have exfiltrated during the attacks.

This incident can seem overwhelming, but the root causes are both known and preventable. User risk, especially that of social engineering, continues to be the most common cause of data exposures. Accounting for and addressing user risk is crucial to operational security. We don’t know for sure how attackers compromised Salesloft’s Github account, but we do know that in doing so, they gained access to a vast amount of data, including further credentials that let them into other systems. Github sanitation has long been known as a key factor in preventing data exposure. Usually such breaches happen when a repository is made public, but even in a private repository, care should be taken to limit or completely remove embedded credentials that could be used for further access.
Salesforce data is valuable leverage for a malicious actor because it contains the crucial business components that generate revenue, such as customer and lead data, deal details, and other confidential information that can financially and reputationally damage a company and their customers if it becomes public. One of Salesforce’s greatest functional strengths is the ability to integrate with almost anything, a flexibility that allows companies in different industries and of different scales to tailor it to their specific needs. However, acting as a platform into which many third-parties can be integrated also creates a large attack surface and a substantial increase in risk.
In the first method of obtaining data, the attackers used social engineering to trick people into allowing malicious Salesforce integrations. In the second method, they were able to compromise a large legitimate Salesforce integration itself and use that integration’s OAuth keys to exfiltrate Salesforce data from its users. In both cases, the ability for integrations to read the full Salesforce dataset led to the compromise of that data.
In an official response, Salesforce has stated that “At this time, there is no indication that the Salesforce platform has been compromised, nor is this activity related to any known vulnerability in our technology.” This is technically true. It is also true that the Salesforce platform has been the single largest source of stolen data this year.