- Gmail users could be assigned to the Shinyhuters attack campaign
- Google warned those who can be vulnerable
- This campaign has targeted a large number of companies
A Google warning described a prolific hacking group, Shinyhuters, used Gmail to attack users. Google’s Google’s threat report reveals that the group has accessed the data during a small window, which could leave the users on display.
About 2.5 billion users were asked to reset their passwords and tighten their safety after the contact details of small and medium -sized enterprises have been accessible. The information was accessible to the public, generally names and contact details, but that is still a little vulnerable to phishing attacks.
Google has since informed people affected by the incident by e -mail – but those whose data have been compromised should be looking for social engineering and extortion attacks. These incidents generally involve an email or call for employees of victims organizations requiring large sums of bitcoin.
Risk of phishing
The violation comes from Shinyhunter’s data theft via a Business Salesforce body, confirmed by the company. Salesforce was targeted by the group, who usurped the identity of the company’s staff and contacted IT support services to access.
“In June, one of the Salesforce de Google bodies was affected by a similar UNC6040 activity described in this article,” said the company, “the data recovered by the threat player has linked to basic commercial information and widely accessible to the public, such as corporate names and contact details.”
Shinyhuanters is an extremely successful group of threats, recently attacking Santander, AT&T, and the giant of Allianz insurance. But, Google does not yet think they have done;
“We believe that threat actors using the brand” Shinyhuters “can prepare to degenerate their extortion tactics by launching a data leak site (DLS),” confirms the report.
“These new tactics are probably intended to increase pressure on victims, including those associated with recent violations of data related to Salesforce UNC6040. We continue to monitor this actor and provide updates if necessary. ”