Cybersecurity News in Asia

RECENT STORIES:

SEGA moves faster with flow-based network monitoring
US$72 billion leakage at checkout
SU Group Announces Pricing of $6 Million Public Offering
Fraudulent Android apps offers illegal data retrieval service to milli...
Taiwan high-speed rail spoofing case exposes OT governance gaps, not i...
Linux kernel zero day enables root privilege escalation across most di...
LOGIN REGISTER
CybersecAsia
  • Features
    • Featured

      Are AI-powered cyber threats evolving faster than courts and police can adapt?

      Are AI-powered cyber threats evolving faster than courts and police can adapt?

      Monday, May 11, 2026, 8:30 AM Asia/Singapore | Features
    • Featured

      The problem with CAPTCHAs – and the password perception gap

      The problem with CAPTCHAs - and the password perception gap

      Thursday, May 7, 2026, 11:14 AM Asia/Singapore | Features
    • Featured

      How AI is supercharging insider threats

      How AI is supercharging insider threats

      Wednesday, April 15, 2026, 12:29 PM Asia/Singapore | Features
  • Opinions
  • Tips
  • Whitepapers
  • Directory
  • E-Learning

Select Page

News

Global data theft campaign exploits misconfigured cloud portals to harvest massive troves of corporate records

By CybersecAsia editors | Thursday, March 12, 2026, 5:33 PM Asia/Singapore

Global data theft campaign exploits misconfigured cloud portals to harvest massive troves of corporate records

Attackers abuse guest access on CRM portals, chaining server actions and bypassing query limits to extract sensitive organizational data worldwide.

In what security experts say may be one of the largest data theft campaigns to date, hacking crew ShinyHunters has been implicated in exploiting weakly secured customer-relationship management (CRM) platform cloud portals to siphon vast troves of corporate data.

The attackers are said to be abusing public‑facing “guest” access on Salesforce Experience Cloud sites to run queries against back‑end Salesforce data without logging in, turning misconfigurations into a powerful entry point for mass data harvesting.

Investigators say the operation targets the /s/sfsites/aura API endpoint used by the CRM firm, which powers many customer and partner portals. ShinyHunters is reportedly using a modified version of an auditing utility, originally released to help administrators find access‑control flaws, to automatically scan the internet for exposed Experience Cloud implementations that grant guest users overly broad permissions. Then:

  • Once a vulnerable site is found, the group chains together large numbers of server‑side actions in single requests and manipulates query parameters to bypass record‑count limits, allowing them to pull tens or hundreds of thousands of records at a time.
  • The campaign builds on earlier hacking activity against Salesforce customers through compromised integrations and OAuth tokens, where attackers used stolen access to methodically export CRM data and mine it for credentials, cloud keys and other secrets.
  • Security researchers and industry information‑sharing groups say the latest wave has affected hundreds of organizations worldwide since late 2025, including scores of technology and cybersecurity companies that rely heavily on Salesforce for sales and support operations.

Salesforce, for its part, has insisted the incidents stem from customer configuration mistakes rather than a flaw in its core platform, framing the issue as one of access governance rather than software vulnerability. The firm has issued emergency guidance urging customers to:

  • lock down guest profiles
  • remove API access from unauthenticated users
  • set organization‑wide defaults to private
  • disable self‑registration on portals
  • closely monitor logs for unusually large or automated queries hitting Experience Cloud sites.

Researchers warn that any public portal exposing excessive data to guest users remains at risk until organizations complete thorough permission reviews and secret‑rotation efforts.

Share:

PreviousWhen AI adoption outpaces security, organizations struggle for collective safety
NextTXOne Networks Showcases TXOne Complete at S4x26, Advancing the Full OT Security Journey for Channel Partners

Related Posts

4.3 million WannaCry attempts stopped by Sophos-protected endpoints

4.3 million WannaCry attempts stopped by Sophos-protected endpoints

Monday, September 23, 2019

More vulnerabilities found in IaC and PaC platforms

More vulnerabilities found in IaC and PaC platforms

Monday, December 2, 2024

Enhancing DNS security in an escalating Financial Services threat environment

Enhancing DNS security in an escalating Financial Services threat environment

Friday, November 13, 2020

National University of Singapore empowers student ethical hackers to bolster cybersecurity

National University of Singapore empowers student ethical hackers to bolster cybersecurity

Saturday, September 7, 2019

Leave a reply Cancel reply

You must be logged in to post a comment.

Voters-draw/RCA-Sponsors

Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
previous arrow
next arrow

CybersecAsia Voting Placement

Gamification listing or Participate Now

PARTICIPATE NOW

Vote Now -Placement(Google Ads)

Top-Sidebar-banner

Whitepapers

  • Closing the Gap in Email Security:How To Stop The 7 Most SinisterAI-Powered Phishing Threats

    Closing the Gap in Email Security:How To Stop The 7 Most SinisterAI-Powered Phishing Threats

    Insider threats continue to be a major cybersecurity risk in 2024. Explore more insights on …Download Whitepaper
  • 2024 Insider Threat Report: Trends, Challenges, and Solutions

    2024 Insider Threat Report: Trends, Challenges, and Solutions

    Insider threats continue to be a major cybersecurity risk in 2024. Explore more insights on …Download Whitepaper
  • AI-Powered Cyber Ops: Redefining Cloud Security for 2025

    AI-Powered Cyber Ops: Redefining Cloud Security for 2025

    The future of cybersecurity is a perfect storm: AI-driven attacks, cloud expansion, and the convergence …Download Whitepaper
  • Data Management in the Age of Cloud and AI

    Data Management in the Age of Cloud and AI

    In today’s Asia Pacific business environment, organizations are leaning on hybrid multi-cloud infrastructures and advanced …Download Whitepaper

Middle-sidebar-banner

Case Studies

  • Cyber protection for medical clinics in Singapore

    Cyber protection for medical clinics in Singapore

    As Singapore’s healthcare sector becomes increasingly digital and interconnected, clinics are facing heightened cyber risks, …Read more
  • India’s WazirX strengthens governance and digital asset security

    India’s WazirX strengthens governance and digital asset security

    Revamping its custody infrastructure using multi‑party computation tools has improved operational resilience and institutional‑grade safeguardsRead more
  • Bangladesh LGED modernizes communication while addressing data security concerns

    Bangladesh LGED modernizes communication while addressing data security concerns

    To meet emerging data localization/privacy regulations, the government engineering agency deploys a secure, unified digital …Read more
  • What AI worries keep members of the Association of Certified Fraud Examiners sleepless?

    What AI worries keep members of the Association of Certified Fraud Examiners sleepless?

    This case study examines how many anti-fraud professionals reported feeling underprepared to counter rising AI-driven …Read more

Bottom sidebar

Other News

  • SU Group Announces Pricing of $6 Million Public Offering

    Tuesday, May 12, 2026
    HONG KONG, May 12, 2026 …Read More »
  • VIVOTEK AI Solutions Enhance Efficiency at Traffic Hubs in Norway

    Wednesday, May 6, 2026
    TAIPEI, May 6, 2026 /PRNewswire/ …Read More »
  • Taoping Reports Fiscal Year 2025 Results

    Thursday, April 30, 2026
    Strategic Transformation Drives Platform Expansion, …Read More »
  • DESILO Launches World’s First Fully Homomorphic Encryption Library Integrating 5th-Generation FHE Scheme ‘GL’, Accelerating the Era of Private AI

    Tuesday, April 28, 2026
    SEOUL, South Korea, April 28, …Read More »
  • Tencent Cloud Cube Sandbox Goes Fully Open-Source, with Five Major Breakthroughs Enabling Large-Scale Agent Deployment

    Thursday, April 23, 2026
    Tencent Cloud’s Cube Sandbox goes …Read More »
  • Our Brands
  • DigiconAsia
  • MartechAsia
  • Home
  • About Us
  • Contact Us
  • Sitemap
  • Privacy & Cookies
  • Terms of Use
  • Advertising & Reprint Policy
  • Media Kit
  • Subscribe
  • Manage Subscriptions
  • Newsletter

Copyright © 2026 CybersecAsia All Rights Reserved.