Cybersecurity News in Asia

RECENT STORIES:

SEGA moves faster with flow-based network monitoring
Recent breach exposes supply chain risks via OAuth and secrets misclas...
DESILO Launches World’s First Fully Homomorphic Encryption Libra...
North Korean hackers steal more than US$12m from Web3 developers using...
Tencent Cloud Cube Sandbox Goes Fully Open-Source, with Five Major Bre...
We buckle seatbelts instinctively: why not authentication standards?
LOGIN REGISTER
CybersecAsia
  • Features
    • Featured

      How AI is supercharging insider threats

      How AI is supercharging insider threats

      Wednesday, April 15, 2026, 12:29 PM Asia/Singapore | Features
    • Featured

      Q-Day is coming. Are you ready?

      Q-Day is coming. Are you ready?

      Tuesday, April 14, 2026, 12:40 PM Asia/Singapore | Features
    • Featured

      How lean defence teams turn endpoint insights into measurable risk reduction

      How lean defence teams turn endpoint insights into measurable risk reduction

      Monday, April 13, 2026, 3:15 PM Asia/Singapore | Features
  • Opinions
  • Tips
  • Whitepapers
  • Awards 2026
  • Directory
  • E-Learning

Select Page

News

Global data theft campaign exploits misconfigured cloud portals to harvest massive troves of corporate records

By CybersecAsia editors | Thursday, March 12, 2026, 5:33 PM Asia/Singapore

Global data theft campaign exploits misconfigured cloud portals to harvest massive troves of corporate records

Attackers abuse guest access on CRM portals, chaining server actions and bypassing query limits to extract sensitive organizational data worldwide.

In what security experts say may be one of the largest data theft campaigns to date, hacking crew ShinyHunters has been implicated in exploiting weakly secured customer-relationship management (CRM) platform cloud portals to siphon vast troves of corporate data.

The attackers are said to be abusing public‑facing “guest” access on Salesforce Experience Cloud sites to run queries against back‑end Salesforce data without logging in, turning misconfigurations into a powerful entry point for mass data harvesting.

Investigators say the operation targets the /s/sfsites/aura API endpoint used by the CRM firm, which powers many customer and partner portals. ShinyHunters is reportedly using a modified version of an auditing utility, originally released to help administrators find access‑control flaws, to automatically scan the internet for exposed Experience Cloud implementations that grant guest users overly broad permissions. Then:

  • Once a vulnerable site is found, the group chains together large numbers of server‑side actions in single requests and manipulates query parameters to bypass record‑count limits, allowing them to pull tens or hundreds of thousands of records at a time.
  • The campaign builds on earlier hacking activity against Salesforce customers through compromised integrations and OAuth tokens, where attackers used stolen access to methodically export CRM data and mine it for credentials, cloud keys and other secrets.
  • Security researchers and industry information‑sharing groups say the latest wave has affected hundreds of organizations worldwide since late 2025, including scores of technology and cybersecurity companies that rely heavily on Salesforce for sales and support operations.

Salesforce, for its part, has insisted the incidents stem from customer configuration mistakes rather than a flaw in its core platform, framing the issue as one of access governance rather than software vulnerability. The firm has issued emergency guidance urging customers to:

  • lock down guest profiles
  • remove API access from unauthenticated users
  • set organization‑wide defaults to private
  • disable self‑registration on portals
  • closely monitor logs for unusually large or automated queries hitting Experience Cloud sites.

Researchers warn that any public portal exposing excessive data to guest users remains at risk until organizations complete thorough permission reviews and secret‑rotation efforts.

Share:

PreviousWhen AI adoption outpaces security, organizations struggle for collective safety
NextTXOne Networks Showcases TXOne Complete at S4x26, Advancing the Full OT Security Journey for Channel Partners

Related Posts

Trend Micro revealed 265% growth in fileless events evading traditional defenses

Trend Micro revealed 265% growth in fileless events evading traditional defenses

Monday, September 23, 2019

Not all multi-factor authentication systems are equal: here is why

Not all multi-factor authentication systems are equal: here is why

Tuesday, August 30, 2022

What happens when developers and SecOps teams fail to click?

What happens when developers and SecOps teams fail to click?

Friday, September 20, 2024

Dutch spy agencies warn of Russian hackers hijacking encrypted messaging accounts

Dutch spy agencies warn of Russian hackers hijacking encrypted messaging accounts

Thursday, March 12, 2026

Leave a reply Cancel reply

You must be logged in to post a comment.

Voters-draw/RCA-Sponsors

Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
previous arrow
next arrow

CybersecAsia Voting Placement

Gamification listing or Participate Now

PARTICIPATE NOW

Vote Now -Placement(Google Ads)

Top-Sidebar-banner

Whitepapers

  • Closing the Gap in Email Security:How To Stop The 7 Most SinisterAI-Powered Phishing Threats

    Closing the Gap in Email Security:How To Stop The 7 Most SinisterAI-Powered Phishing Threats

    Insider threats continue to be a major cybersecurity risk in 2024. Explore more insights on …Download Whitepaper
  • 2024 Insider Threat Report: Trends, Challenges, and Solutions

    2024 Insider Threat Report: Trends, Challenges, and Solutions

    Insider threats continue to be a major cybersecurity risk in 2024. Explore more insights on …Download Whitepaper
  • AI-Powered Cyber Ops: Redefining Cloud Security for 2025

    AI-Powered Cyber Ops: Redefining Cloud Security for 2025

    The future of cybersecurity is a perfect storm: AI-driven attacks, cloud expansion, and the convergence …Download Whitepaper
  • Data Management in the Age of Cloud and AI

    Data Management in the Age of Cloud and AI

    In today’s Asia Pacific business environment, organizations are leaning on hybrid multi-cloud infrastructures and advanced …Download Whitepaper

Middle-sidebar-banner

Case Studies

  • Cyber protection for medical clinics in Singapore

    Cyber protection for medical clinics in Singapore

    As Singapore’s healthcare sector becomes increasingly digital and interconnected, clinics are facing heightened cyber risks, …Read more
  • India’s WazirX strengthens governance and digital asset security

    India’s WazirX strengthens governance and digital asset security

    Revamping its custody infrastructure using multi‑party computation tools has improved operational resilience and institutional‑grade safeguardsRead more
  • Bangladesh LGED modernizes communication while addressing data security concerns

    Bangladesh LGED modernizes communication while addressing data security concerns

    To meet emerging data localization/privacy regulations, the government engineering agency deploys a secure, unified digital …Read more
  • What AI worries keep members of the Association of Certified Fraud Examiners sleepless?

    What AI worries keep members of the Association of Certified Fraud Examiners sleepless?

    This case study examines how many anti-fraud professionals reported feeling underprepared to counter rising AI-driven …Read more

Bottom sidebar

Other News

  • DESILO Launches World’s First Fully Homomorphic Encryption Library Integrating 5th-Generation FHE Scheme ‘GL’, Accelerating the Era of Private AI

    Tuesday, April 28, 2026
    SEOUL, South Korea, April 28, …Read More »
  • Tencent Cloud Cube Sandbox Goes Fully Open-Source, with Five Major Breakthroughs Enabling Large-Scale Agent Deployment

    Thursday, April 23, 2026
    Tencent Cloud’s Cube Sandbox goes …Read More »
  • Sparrow to Demonstrate AI-Driven Security and SBOM Management at Black Hat Asia 2026

    Wednesday, April 22, 2026
    SINGAPORE, April 21, 2026 /PRNewswire/ …Read More »
  • Relativity to Establish Singapore Entity, Expanding APAC Footprint

    Wednesday, April 22, 2026
    News Summary:  Relativity plans to …Read More »
  • Cohesity Appoints Nigel Lee as Technical Sales Leader, Asia Pacific and Japan (APJ)

    Wednesday, April 22, 2026
    SINGAPORE, April 21, 2026 /PRNewswire/ …Read More »
  • Our Brands
  • DigiconAsia
  • MartechAsia
  • Home
  • About Us
  • Contact Us
  • Sitemap
  • Privacy & Cookies
  • Terms of Use
  • Advertising & Reprint Policy
  • Media Kit
  • Subscribe
  • Manage Subscriptions
  • Newsletter

Copyright © 2026 CybersecAsia All Rights Reserved.