{"id":13358,"date":"2026-04-02T20:40:51","date_gmt":"2026-04-02T20:40:51","guid":{"rendered":"https:\/\/techtrendfeed.com\/?p=13358"},"modified":"2026-04-02T20:40:51","modified_gmt":"2026-04-02T20:40:51","slug":"shinyhunters-hackers-declare-theft-of-3m-cisco-data-threaten-public-leak","status":"publish","type":"post","link":"https:\/\/techtrendfeed.com\/?p=13358","title":{"rendered":"ShinyHunters Hackers Declare Theft of 3M+ Cisco Data, Threaten Public Leak"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p>The risk group generally known as <a rel=\"nofollow\" target=\"_blank\" target=\"_blank\" rel=\"noopener\" href=\"https:\/\/hackread.com\/tag\/ShinyHunters\/\" data-type=\"post_tag\" data-id=\"26126\">ShinyHunters<\/a> has issued what it calls a ultimate warning to Cisco (Cisco Methods, Inc.), setting a deadline of April 3, 2026, earlier than it begins leaking information it claims to have stolen. The message appeared on the group\u2019s darkish net leak website, the place it has already been publishing information linked to earlier Salesforce-related incidents affecting corporations worldwide.<\/p>\n<p>Based on the publish, the group claims entry to information from three separate breach paths, recognized as UNC6040, Salesforce Aura, and compromised AWS accounts. In whole, it alleges greater than three million Salesforce information have been taken, together with personally identifiable info, GitHub repositories, AWS storage buckets, and inside company information.<\/p>\n<p>The group has described the warning as ultimate and warns Cisco to make contact earlier than the said deadline, including that failure to take action will lead not solely to information leaks but in addition unspecified \u201cdigital issues.\u201d<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><a rel=\"nofollow\" target=\"_blank\" target=\"_blank\" rel=\"noopener\" href=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/shinyhunters-hackers-cisco-data-breach-records-data-leak.png\"><img loading=\"lazy\" decoding=\"async\" width=\"906\" height=\"893\" src=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/shinyhunters-hackers-cisco-data-breach-records-data-leak.png\" alt=\"ShinyHunters Hackers Claim Theft of 3M+ Cisco Records, Threaten Public Leak\" class=\"wp-image-143387\" style=\"aspect-ratio:1.0145645496879026;width:506px;height:auto\" srcset=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/shinyhunters-hackers-cisco-data-breach-records-data-leak.png 906w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/shinyhunters-hackers-cisco-data-breach-records-data-leak-300x296.png 300w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/shinyhunters-hackers-cisco-data-breach-records-data-leak-768x757.png 768w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/shinyhunters-hackers-cisco-data-breach-records-data-leak-80x80.png 80w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/shinyhunters-hackers-cisco-data-breach-records-data-leak-380x375.png 380w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/shinyhunters-hackers-cisco-data-breach-records-data-leak-800x789.png 800w\" sizes=\"auto, (max-width: 906px) 100vw, 906px\"\/><\/a><figcaption class=\"wp-element-caption\">ShinyHunters hackers claiming the Cisco information breach on their darkish net leak website (Picture credit score: Hackread.com)<\/figcaption><\/figure>\n<\/div>\n<p>It&#8217;s price noting that the newest risk comes simply days after the identical group leaked <a rel=\"nofollow\" target=\"_blank\" target=\"_blank\" rel=\"noopener\" href=\"https:\/\/hackread.com\/shinyhunters-350gb-data-breach-european-commission\/\">350GB of European Fee information<\/a> described as a mixture of mail server dumps, database exports, inside paperwork, and contracts.<\/p>\n<h3 id=\"unc6040-reference\" class=\"wp-block-heading\"><strong>UNC6040 Reference<\/strong><\/h3>\n<p>Google Menace Intelligence Group (GTIG) <a rel=\"nofollow\" target=\"_blank\" target=\"_blank\" rel=\"noopener\" href=\"https:\/\/hackread.com\/google-salesforce-data-breach-shinyhunters-vishing-scam\/\">designated<\/a> the ShinyHunters group as UNC6040 in August 2025. The reference to UNC6040 can be significantly related right here as a result of Cisco additionally printed <a rel=\"nofollow\" target=\"_blank\" target=\"_blank\" rel=\"noopener\" href=\"https:\/\/sec.cloudapps.cisco.com\/security\/center\/resources\/CRM-vishing\">particulars<\/a> a few marketing campaign involving voice phishing, or vishing, that focused workers to achieve entry to inside methods and buyer information. <\/p>\n<p>By linking its claims to that marketing campaign, the ShinyHunters group has not solely acknowledged its involvement but in addition steered that a minimum of a part of the alleged Cisco information might have originated from social engineering assaults fairly than solely <a rel=\"nofollow\" target=\"_blank\" target=\"_blank\" rel=\"noopener\" href=\"https:\/\/hackread.com\/tag\/Salesforce\/\" data-type=\"post_tag\" data-id=\"27882\">Salesforce<\/a>-related assaults.<\/p>\n<h3 id=\"leaked-samples-suggest-access-to-aws-environment\" class=\"wp-block-heading\"><strong>Leaked Samples Recommend Entry to AWS Setting<\/strong><\/h3>\n<p>The group has shared three photos to point out the legitimacy of their claims. As seen by Hackread.com, these photos seem to point out entry to components of an AWS atmosphere allegedly related to Cisco, together with an organizational dashboard, storage volumes, and bucket listings. <\/p>\n<p>Whereas these screenshots don&#8217;t comprise delicate information, they level to visibility throughout cloud infrastructure fairly than a single remoted system. The presence of an organization-level view is notable, because it normally signifies entry to a number of linked accounts and providers beneath centralized management.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><a rel=\"nofollow\" target=\"_blank\" target=\"_blank\" rel=\"noopener\" href=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/shinyhunters-hackers-cisco-records-data-leak.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"398\" src=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/shinyhunters-hackers-cisco-records-data-leak-1024x398.png\" alt=\"ShinyHunters Hackers Claim Theft of 3M+ Cisco Records, Threaten Public Leak\" class=\"wp-image-143385\" srcset=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/shinyhunters-hackers-cisco-records-data-leak-1024x398.png 1024w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/shinyhunters-hackers-cisco-records-data-leak-300x117.png 300w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/shinyhunters-hackers-cisco-records-data-leak-768x299.png 768w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/shinyhunters-hackers-cisco-records-data-leak-1536x597.png 1536w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/shinyhunters-hackers-cisco-records-data-leak-380x148.png 380w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/shinyhunters-hackers-cisco-records-data-leak-800x311.png 800w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/shinyhunters-hackers-cisco-records-data-leak-1160x451.png 1160w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/shinyhunters-hackers-cisco-records-data-leak.png 1587w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\"\/><\/a><figcaption class=\"wp-element-caption\">One of many screenshots printed by ShinyHunters Hackers \u2013 The picture has been redacted by Hackread.com for safety and privateness causes<\/figcaption><\/figure>\n<\/div>\n<h3 id=\"shinyhunters-and-salesforce-breach\" class=\"wp-block-heading\"><strong>ShinyHunters and Salesforce Breach<\/strong><\/h3>\n<p>Over the previous yr, ShinyHunters has <a rel=\"nofollow\" target=\"_blank\" target=\"_blank\" rel=\"noopener\" href=\"https:\/\/hackread.com\/shinyhunters-hackers-threat-stolen-salesforce-data\/\">repeatedly claimed<\/a> entry to Salesforce-related information <a rel=\"nofollow\" target=\"_blank\" target=\"_blank\" rel=\"noopener\" href=\"https:\/\/hackread.com\/shinyhunters-breach-gainsight-salesforce-1000-firms\/\">throughout a number of organizations<\/a>, typically publishing samples to help its claims. In a number of instances, the group pointed to misconfigurations, compromised credentials, or third-party integrations as entry factors, fairly than flaws inside Salesforce itself.<\/p>\n<p>Earlier incidents linked to the group adopted the same sample through which Information was first listed on leak websites with restricted element, then printed full dumps when corporations didn&#8217;t interact. These leaks included buyer information, inside communications, and operational information pulled from linked methods.<\/p>\n<p>Among the corporations named in Salesforce-related information breaches included <\/p>\n<p><em>and lots of extra\u2026<\/em><\/p>\n<p>With the April 3 deadline approaching, the accuracy of those claims can solely be verified by Cisco. Hackread.com has reached out to the corporate for remark, and this text will likely be up to date as quickly as a response is acquired.<\/p>\n<p>\n\t\t\t<\/div>\n<p><template id="uhslQsNPbb7wuSxOZSym"></template><\/script><br \/>\n<br \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The risk group generally known as ShinyHunters has issued what it calls a ultimate warning to Cisco (Cisco Methods, Inc.), setting a deadline of April 3, 2026, earlier than it begins leaking information it claims to have stolen. The message appeared on the group\u2019s darkish net leak website, the place it has already been publishing [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":13360,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[131,5675,554,1054,3280,2561,5450,780,2831],"class_list":["post-13358","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-cisco","tag-claim","tag-hackers","tag-leak","tag-public","tag-records","tag-shinyhunters","tag-theft","tag-threaten"],"_links":{"self":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/13358","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=13358"}],"version-history":[{"count":1,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/13358\/revisions"}],"predecessor-version":[{"id":13359,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/13358\/revisions\/13359"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/media\/13360"}],"wp:attachment":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=13358"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=13358"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=13358"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- This website is optimized by Airlift. Learn more: https://airlift.net. Template:. Learn more: https://airlift.net. Template: 69c6f7b5190636d50e9f6768. Config Timestamp: 2026-03-27 21:33:41 UTC, Cached Timestamp: 2026-04-03 20:39:01 UTC -->