Last updated on
August 20, 2025

ShinyHunters and Scattered Spider: A Merger of Chaos in the 2025 Salesforce Attacks

Obsidian Threat Research Team

Overlapping IOCs, dozens of victims, and a chaotic Telegram spectacle have led Obsidian researchers to conclude that a partnership or merger of UNC6040, UNC6240, and UNC3944 may have occurred.

An AI-generated image, posted by alleged ShinyHunters members, depicts the threat actor groups targeting Salesforce and other victims.
An AI-generated image, posted by alleged ShinyHunters members, depicts the threat actor groups targeting Salesforce and other victims.

Over the past few months, two names kept resurfacing in our research: ShinyHunters and Scattered Spider.

ShinyHunters have been tied to a surge in Salesforce-related attacks, including breaches at Google and Workday. Scattered Spider, meanwhile, has carried out highly disruptive intrusions against airlines, retailers, and insurers.

What caught our attention was not just the size of these campaigns but the overlap in tradecraft. Scattered Spider built its reputation on voice phishing and helpdesk social engineering. These tactics are particularly effective because they sidestep traditional security controls. ShinyHunters have taken a quieter path since 2020. They rely on stolen or leaked credentials to access SaaS environments, steal data, and extort victims.

Until recently, the two groups were considered separate, but the Salesforce attacks changed that.

The Salesforce Attacks

In June and July 2025, we observed a wave of Salesforce CRM data thefts notable for both their scale and the simplicity of the attack chain. The attackers did not exploit any Salesforce platform vulnerabilities. Instead, they used traditional voice phishing combined with malicious OAuth ‘Connected Apps’ to obtain tokens, granting API access and enabling bulk exports of CRM data.

The social engineering was straightforward. Attackers called employees, posing as IT support, and directed them to Salesforce’s “Connect an App / enter code” screen. When victims entered the attacker-provided code, a trojanized Data Loader-style app captured OAuth tokens. These tokens bypassed MFA controls, allowing attackers to extract large volumes of CRM records via the Salesforce API.

The campaign was broad, impacting dozens of organizations across technology, retail and luxury goods, aviation, and insurance. Stolen data primarily included CRM records such as names, emails, phone numbers, account notes, and loyalty program details. Core systems were not directly affected, but the exposure of customer and business data at this scale is significant.

Prominent disclosed victims include Google’s corporate Salesforce instance, Qantas, Allianz Life, LVMH/Chanel, and Workday. Attribution varies across sources: Google tracks the intrusion as UNC6040 and the subsequent extortion as UNC6240, while the actors claim affiliation with ShinyHunters. Open-source reporting, including DataBreaches.net, supports this connection, highlighting extortion emails sent to Google during the campaign.

The overlap in tactics drew particular attention. Multiple intelligence reports noted that the voice-phishing and helpdesk social engineering resembled Scattered Spider operations. Combined with reports of potential collaboration, this raises questions about whether ShinyHunters and Scattered Spider are now working together.

The campaign extended beyond theft. After the data exports, victims received pay-or-leak extortion demands, with some attackers posting sample data to pressure companies into paying.

For defenders, some quick recommendations:

This campaign illustrates how simple social engineering combined with token abuse can bypass technical controls, emphasizing the need for both user awareness and proactive platform monitoring.

Attribution

The 2025 Salesforce attacks have been confidently attributed to ShinyHunters (UNC6040 and UNC6240). This attribution was straightforward and widely accepted as fact.

That changed on August 3, when Dissent Doe, the author of databreaches.net, reported that the alleged leader of ShinyHunters claimed the Salesforce attacks were carried out in partnership with Scattered Spider.

Dissent had previously spoken with ‘Shiny,’ which enabled her to reference details from past conversations to verify she was speaking with the correct person.

“One of the first questions I asked him was to name someone we both hated. Without hesitation, he correctly named the person and added three aliases the individual used. I’ve redacted his answer in the screengrab, but it was correct. During the chat, Shiny also showed me several screen grabs of our past chats. At one point, he spontaneously inquired about someone he had asked me about several times in the past — someone he cares about. He asked how that person was doing now, which is a question he had often asked me.” —Dissent via Databreaches.net

In a separate conversation, Dissent spoke with Shiny, during which ShinyHunters once again explicitly claimed a partnership with Scattered Spider. Dissent asked whether Scattered Spider members had remained active since the arrest of four of their members, whether they were targeting new victims, and if Shiny could provide any insight into who those victims might be. Shiny responded:

“They’ve been working with us. Despite everyone’s efforts to halt the Salesforce-related attacks, we continue to attack multi-billion- to multi-hundred-billion-dollar companies daily and successfully dump them. We urge law enforcement and Google Threat Intelligence to collaborate closely with CrowdStrike and Unit221b to effectively counter and put an end to this threat. Google Threat Intelligence and law enforcement have shown nothing but incompetence and inaccuracy.”

Google Threat Intelligence has been actively monitoring the situation, particularly tracking the activity and TTPs of the four alleged Scattered Spider members arrested in the U.K. These four individuals, however, do not represent the full scope of Scattered Spider.

Meanwhile, threat intelligence from Mandiant and other firms has largely adhered to strict group-based attribution, assigning UNC6040 to social engineering and data exfiltration activity, and UNC6240 to extortion.

Dissent recommends treating ShinyHunters and Scattered Spider as a single entity, arguing that rigid labeling only adds confusion—a view shared by Obsidian researchers.

Strict labeling of threat actors, especially groups originating from ‘The Com,’ can be problematic due to the fluid and overlapping nature of their ecosystem. Overly rigid labels can fragment intelligence, obscure techniques, and lead to inaccurate guidance, such as when Mandiant reported that Scattered Spider had ceased operations. Obsidian believes this claim was incorrect.

The bottom line: Scattered Spider has not stopped—they have evolved.

Telegram Chaos Suggests Threat Groups Have Combined Forces

One of the last images posted to the Scattered Lapsus$ Hunters Telegram channel before all messages were deleted.
One of the last images posted to the Scattered Lapsus$ Hunters Telegram channel before all messages were deleted.

A Telegram channel appeared on August 8th, conflating three groups: ShinyHunters, Scattered Spider, and Lapsus$. Since the first channel emerged and was subsequently banned, several others have surfaced. These channels have been highly unpredictable.

While Obsidian researchers could not verify all the content, if the claims are taken at face value, the channels have shared a wide range of material, including exploits, partial data leaks, advertisements for stolen data, doxxing claims, initial access requests, memes, taunts, and threats.

Supposed POC exploit for SAP NetWeaver.

Members of the Telegram channel taunting law enforcement and cybersecurity companies.
Members of the Telegram channel taunting law enforcement and cybersecurity companies.

A channel member threatened CrowdStrike’s CEO while offering information. Obsidian believes that CrowdStrike did not comply with these demands.
A channel member threatened CrowdStrike’s CEO while offering information. Obsidian believes that CrowdStrike did not comply with these demands.

This represents only a small selection of the messages. Between threats and data leaks, channel admins frequently post unrelated or inflammatory content. The chaos is amplified by companion chats linked to the main channel, which allow anyone to post. In the past few days, channel admins have also initiated video chats on three occasions. Obsidian researchers observed these sessions but have no insights to report at this time.

At the time of writing, the most active channel has been cleared of messages and renamed “Deleted Channel.” Other channels under the name “Scattered Lapsus$ Hunters” have since appeared, but their authenticity remains uncertain.

A Note on Lapsus’ Inclusion

Lapsus$ was first observed in 2021 with an attack on Brazil’s Ministry of Health. In early 2022, the group targeted Okta, Nvidia, Samsung, Ubisoft, T-Mobile, Microsoft, Globant, and other organizations. After a period of dormancy, Lapsus$ resurfaced with an attack on Uber in late 2022.

Following this series of high-profile attacks, several members of Lapsus$ were arrested throughout 2022

Since then, the group has remained largely inactive, though individuals continue to claim affiliation. A post in the Scattered Lapsus$ Hunters Telegram channel suggests that Lapsus$’s inclusion may be more of a homage to “all the fallen soldiers of Lapsus$,” referencing a message demanding their release from prison.

To Obsidian’s knowledge, the individual mentioned in this message was not released, and neither the GitHub repository nor the database was leaked.

Technique Comparison

Below, we have mapped the MITRE ATT&CK techniques observed in the Salesforce incidents against the known tactics and techniques of Scattered Spider:

Scattered Spider techniques are shown in red, ShinyHunters (Salesforce-specific) in blue, and overlapping techniques in purple.

While many techniques observed in Scattered Spider operations were not seen in the Salesforce attacks, the overlap is notable and provides further evidence that some form of partnership may have occurred.

Recommendations for Securing Your Organization

Consistent with guidance from Falcon Feeds, we recommend: 

Aligning with Salesforce Ben, we also recommend:

Final Thoughts

The 2025 Salesforce attacks show just how quickly threat actors can adapt and combine forces. ShinyHunters and Scattered Spider may have joined skills, making attacks more powerful and harder to spot. The lesson is clear: even simple social engineering can have a big impact. Organizations need strong user awareness, careful monitoring of OAuth and API activity, and tight controls on access to keep their data safe.

Want to Learn More from the Experts? Obsidian’s Recent Trends in Advanced SaaS TTPs explores how attackers target help desks, MFA, and admin accounts across SaaS environments. Learn actionable steps to detect threats, respond effectively, and reduce dwell time from evolving SaaS and AI-powered attacks.

Sources:

Get Started

Start in minutes and secure your critical SaaS applications with continuous monitoring and data-driven insights.

get a demo