{"id":27413,"date":"2025-08-22T03:02:31","date_gmt":"2025-08-22T03:02:31","guid":{"rendered":"https:\/\/www.adminbyrequest.com\/?p=27413"},"modified":"2026-01-24T22:46:26","modified_gmt":"2026-01-24T22:46:26","slug":"workday-falls-victim-to-the-shinyhunters-salesforce-attack-spree","status":"publish","type":"post","link":"https:\/\/www.adminbyrequest.com\/en\/blogs\/workday-falls-victim-to-the-shinyhunters-salesforce-attack-spree","title":{"rendered":"Workday Falls Victim to the ShinyHunters Salesforce Attack Spree"},"content":{"rendered":"\n<p>HR tech giant Workday has joined a growing list of high-profile companies caught in the crosshairs of an ongoing social engineering campaign targeting Salesforce databases. In a <a href=\"https:\/\/blog.workday.com\/en-us\/protecting-you-from-social-engineering-campaigns-update-from-workday.html\">blog post published late Friday<\/a>, the company disclosed that attackers had gained access to a third-party customer relationship management platform and stolen contact information including names, email addresses, and phone numbers.<\/p>\n\n\n\n<p>The breach, <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/hr-giant-workday-discloses-data-breach-amid-salesforce-attacks\/\">discovered on August 6<\/a>, affects one of the world&#8217;s largest human resources technology providers, serving over 11,000 organizations and 70 million users worldwide. What makes this incident particularly concerning isn&#8217;t just the scale of Workday&#8217;s reach, but how it fits into a much larger pattern of attacks that security researchers have linked to the notorious ShinyHunters cybercrime group.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Attack: Social Engineering at Scale<\/h2>\n\n\n\n<p>The ShinyHunters group uses a sophisticated but surprisingly straightforward approach to breach Salesforce instances. The attackers begin by calling employees, often targeting English-speaking branches of multinational companies, and posing as corporate IT staff requesting urgent troubleshooting assistance.<\/p>\n\n\n\n<p>During these calls, attackers direct victims to Salesforce&#8217;s Connected Apps authorization page and provide an eight-digit connection code. They convince employees to authorize what appears to be a legitimate Salesforce application called &#8220;Data Loader&#8221; &#8211; a real client application that allows users to import, export, update, or delete data within Salesforce environments.<\/p>\n\n\n\n<p>However, the attackers use a modified version of this tool that gives them broad access to download customer databases. The application supports OAuth and integrates directly via Salesforce&#8217;s &#8220;connected apps&#8221; functionality, making the authorization request look completely legitimate to unsuspecting employees.<\/p>\n\n\n\n<p>Once authorized, the attackers can exfiltrate massive amounts of data before organizations realize what&#8217;s happened. Security researchers note that the group uses Mullvad VPN and TOR IPs to obfuscate their data theft activities.<\/p>\n\n\n\n<p>For Workday specifically, the company stated there&#8217;s <a href=\"https:\/\/techcrunch.com\/2025\/08\/18\/hr-giant-workday-says-hackers-stole-personal-data-in-recent-breach\/\">&#8220;no indication of access to customer tenants or the data within them,&#8221;<\/a> which corporate customers typically use to store the bulk of their human resources files and employees&#8217; personal data. However, the stolen contact information could easily be weaponized for future attacks.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/08\/inline-1-6-1024x576.png\" alt=\"\" class=\"wp-image-27655\" srcset=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/08\/inline-1-6-1024x576.png 1024w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/08\/inline-1-6-300x169.png 300w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/08\/inline-1-6-768x432.png 768w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/08\/inline-1-6-1536x864.png 1536w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/08\/inline-1-6-800x450.png 800w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/08\/inline-1-6.png 1820w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Part of a Massive Campaign<\/h2>\n\n\n\n<p>The Workday breach isn&#8217;t an isolated incident. It&#8217;s part of what security researchers are calling one of the most significant social engineering campaigns of 2025. Victims included Adidas, Cartier, Google, Louis Vuitton, Dior, Chanel, Tiffany &amp; Co., Qantas Airways, Air France\u2013KLM, Allianz Life, Cisco, Pandora, and others.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.securityweek.com\/google-discloses-salesforce-hack\/\">Google revealed<\/a> that one of its corporate Salesforce instances was targeted by threat actors. The attack appears to be part of a campaign that has hit several major companies. The tech giant attributed the activity to a threat group they track as UNC6040, which has clear links to the ShinyHunters collective.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">When Humans Become the Weak Link<\/h2>\n\n\n\n<p>This campaign once again spotlights a serious challenge in cybersecurity: humans are the weakest link. No matter how sophisticated your technical defenses are, <a href=\"\/en\/blogs\/dont-get-hooked-10-social-engineering-indicators\" target=\"_blank\" rel=\"noopener\" title=\"\">if an attacker can convince an employee to authorize access<\/a>, those protections become irrelevant.<\/p>\n\n\n\n<p>The attackers didn&#8217;t exploit a software vulnerability or break through firewalls, they just called someone up and convinced them to grant access, turning low-tech social engineering into high-impact results.<\/p>\n\n\n\n<p>This approach is particularly effective because it exploits the helpful nature of employees who genuinely want to assist what they believe are legitimate IT requests. The attackers often create a sense of urgency, claiming there&#8217;s a critical system issue that needs immediate attention.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Why Third-Party Platforms Complicate Security<\/h2>\n\n\n\n<p>One of the most challenging aspects of the Workday breach is that it involved a third-party CRM platform (widely reported to be Salesforce, though Workday hasn&#8217;t confirmed this). This creates a security blind spot that many organizations struggle to address.<\/p>\n\n\n\n<p>When you&#8217;re using multiple cloud platforms and services, each one represents a potential entry point for attackers. Your security is only as strong as the weakest link in your technology stack. Even if your primary systems are locked down tight, a breach in a connected third-party service can provide attackers with valuable data and a foothold for future attacks.<\/p>\n\n\n\n<p>This interconnectedness means that access management becomes exponentially more complex. You&#8217;re managing who has access to what within your own systems, plus how those systems integrate with external platforms and what permissions those integrations require.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/08\/inline-2-6-1024x576.png\" alt=\"\" class=\"wp-image-27656\" srcset=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/08\/inline-2-6-1024x576.png 1024w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/08\/inline-2-6-300x169.png 300w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/08\/inline-2-6-768x432.png 768w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/08\/inline-2-6-1536x864.png 1536w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/08\/inline-2-6-800x450.png 800w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/08\/inline-2-6.png 1820w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">What This Means for Your Organization<\/h2>\n\n\n\n<p>The ShinyHunters campaign targeting Salesforce instances should be a wake-up call for every organization using cloud-based business applications.<\/p>\n\n\n\n<p><strong>Social engineering awareness is critical.<\/strong> Your employees need to understand that attackers are specifically targeting them with sophisticated phone-based attacks. Regular training on recognizing and reporting suspicious contact attempts is essential.<\/p>\n\n\n\n<p><strong>Third-party integrations need security oversight.<\/strong> Every cloud service you connect to your business systems represents a potential attack vector. You need visibility into what data these integrations can access and who has the ability to authorize new connections.<\/p>\n\n\n\n<p><strong>Incident response plans need to account for third-party breaches.<\/strong> When a service provider like Workday gets breached, you need procedures in place to assess the potential impact on your organization and take appropriate protective measures.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Moving Forward<\/h2>\n\n\n\n<p>The Workday breach is a reminder that cybersecurity involves technology, people, processes, and the complex web of services that modern businesses depend on. Organizations need to think holistically about security, ensuring that employee training and incident response capabilities work together to create a robust defense against these evolving threats.<\/p>\n\n\n\n<p>The ShinyHunters campaign won&#8217;t be the last time we see attackers successfully exploit the human element to bypass technical security controls. Every organization will face similar attacks. The real question is whether you&#8217;ll be prepared when they come.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Workday confirms a data breach tied to ShinyHunters, with attackers exploiting Salesforce-connected apps in a growing wave of social engineering incidents.<\/p>\n","protected":false},"author":16,"featured_media":27657,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[36],"tags":[148,223,448,67,68,513,434,511],"ppma_author":[428],"class_list":["post-27413","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogs","tag-cybersecurity","tag-data-breach","tag-news","tag-pam","tag-privileged-access-management","tag-salesforce","tag-social-engineering","tag-workday","entry","has-media"],"aioseo_notices":[],"aioseo_head":"\n\t\t<!-- All in One SEO Pro 4.9.5.2 - aioseo.com -->\n\t<meta name=\"description\" content=\"Workday confirms a data breach tied to ShinyHunters, with attackers exploiting Salesforce-connected apps in a growing wave of social engineering incidents.\" \/>\n\t<meta name=\"robots\" content=\"max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n\t<meta name=\"author\" content=\"Pocholo Legaspi\"\/>\n\t<meta name=\"keywords\" content=\"cybersecurity,data breach,news,pam,privileged access management,salesforce,social engineering,workday\" \/>\n\t<link rel=\"canonical\" href=\"https:\/\/www.adminbyrequest.com\/en\/blogs\/workday-falls-victim-to-the-shinyhunters-salesforce-attack-spree\" \/>\n\t<meta name=\"generator\" content=\"All in One SEO Pro (AIOSEO) 4.9.5.2\" \/>\n\t\t<meta property=\"og:locale\" content=\"en_US\" \/>\n\t\t<meta property=\"og:site_name\" content=\"Admin By Request \u00bb Local Admin Rights, Managed.\" \/>\n\t\t<meta property=\"og:type\" content=\"article\" \/>\n\t\t<meta property=\"og:title\" content=\"Workday Falls Victim to the ShinyHunters Salesforce Attack Spree\" \/>\n\t\t<meta property=\"og:description\" content=\"Workday confirms a data breach tied to ShinyHunters, with attackers exploiting Salesforce-connected apps in a growing wave of social engineering incidents.\" \/>\n\t\t<meta property=\"og:url\" content=\"https:\/\/www.adminbyrequest.com\/en\/blogs\/workday-falls-victim-to-the-shinyhunters-salesforce-attack-spree\" \/>\n\t\t<meta property=\"og:image\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<meta property=\"og:image:secure_url\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<meta property=\"article:published_time\" content=\"2025-08-22T03:02:31+00:00\" \/>\n\t\t<meta property=\"article:modified_time\" content=\"2026-01-24T22:46:26+00:00\" \/>\n\t\t<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/adminbyrequest\" \/>\n\t\t<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n\t\t<meta name=\"twitter:site\" content=\"@AdminByRequest\" \/>\n\t\t<meta name=\"twitter:title\" content=\"Workday Falls Victim to the ShinyHunters Salesforce Attack Spree\" \/>\n\t\t<meta name=\"twitter:description\" content=\"Workday confirms a data breach tied to ShinyHunters, with attackers exploiting Salesforce-connected apps in a growing wave of social engineering incidents.\" \/>\n\t\t<meta name=\"twitter:creator\" content=\"@AdminByRequest\" \/>\n\t\t<meta name=\"twitter:image\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<script type=\"application\/ld+json\" class=\"aioseo-schema\">\n\t\t\t{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"BlogPosting\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/workday-falls-victim-to-the-shinyhunters-salesforce-attack-spree#blogposting\",\"name\":\"Workday Falls Victim to the ShinyHunters Salesforce Attack Spree\",\"headline\":\"Workday Falls Victim to the ShinyHunters Salesforce Attack Spree\",\"author\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/pocholo-editor#author\"},\"publisher\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/main-7.png\",\"width\":1820,\"height\":1024},\"datePublished\":\"2025-08-22T03:02:31+00:00\",\"dateModified\":\"2026-01-24T22:46:26+00:00\",\"inLanguage\":\"en-US\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/workday-falls-victim-to-the-shinyhunters-salesforce-attack-spree#webpage\"},\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/workday-falls-victim-to-the-shinyhunters-salesforce-attack-spree#webpage\"},\"articleSection\":\"Blogs, Cybersecurity, Data Breach, News, PAM, Privileged Access Management, Salesforce, Social Engineering, Workday, Pocholo Legaspi\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/workday-falls-victim-to-the-shinyhunters-salesforce-attack-spree#breadcrumblist\",\"itemListElement\":[{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en#listItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs#listItem\",\"name\":\"Blogs\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs#listItem\",\"position\":2,\"name\":\"Blogs\",\"item\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/workday-falls-victim-to-the-shinyhunters-salesforce-attack-spree#listItem\",\"name\":\"Workday Falls Victim to the ShinyHunters Salesforce Attack Spree\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en#listItem\",\"name\":\"Home\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/workday-falls-victim-to-the-shinyhunters-salesforce-attack-spree#listItem\",\"position\":3,\"name\":\"Workday Falls Victim to the ShinyHunters Salesforce Attack Spree\",\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs#listItem\",\"name\":\"Blogs\"}}]},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\",\"name\":\"Admin By Request\",\"description\":\"Local Admin Rights, Managed.\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/\",\"telephone\":\"+12622994600\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/Circle-Tick-24.svg\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/workday-falls-victim-to-the-shinyhunters-salesforce-attack-spree\\\/#organizationLogo\"},\"image\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/workday-falls-victim-to-the-shinyhunters-salesforce-attack-spree\\\/#organizationLogo\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/adminbyrequest\",\"https:\\\/\\\/twitter.com\\\/AdminByRequest\",\"https:\\\/\\\/www.instagram.com\\\/AdminByRequest\\\/\",\"https:\\\/\\\/www.tiktok.com\\\/@adminbyrequest\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCwq1wlbT9m_z3YH-EPaZqKw\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/adminbyrequest\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/pocholo-editor#author\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/pocholo-editor\",\"name\":\"Pocholo Legaspi\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/workday-falls-victim-to-the-shinyhunters-salesforce-attack-spree#webpage\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/workday-falls-victim-to-the-shinyhunters-salesforce-attack-spree\",\"name\":\"Workday Falls Victim to the ShinyHunters Salesforce Attack Spree\",\"description\":\"Workday confirms a data breach tied to ShinyHunters, with attackers exploiting Salesforce-connected apps in a growing wave of social engineering incidents.\",\"inLanguage\":\"en-US\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#website\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/workday-falls-victim-to-the-shinyhunters-salesforce-attack-spree#breadcrumblist\"},\"author\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/pocholo-editor#author\"},\"creator\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/pocholo-editor#author\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/main-7.png\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/workday-falls-victim-to-the-shinyhunters-salesforce-attack-spree\\\/#mainImage\",\"width\":1820,\"height\":1024},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/workday-falls-victim-to-the-shinyhunters-salesforce-attack-spree#mainImage\"},\"datePublished\":\"2025-08-22T03:02:31+00:00\",\"dateModified\":\"2026-01-24T22:46:26+00:00\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/\",\"name\":\"Admin By Request\",\"alternateName\":\"ABR\",\"description\":\"Local Admin Rights, Managed.\",\"inLanguage\":\"en-US\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\"}}]}\n\t\t<\/script>\n\t\t<script type=\"text\/javascript\">\n\t\t\t(function(c,l,a,r,i,t,y){\n\t\t\tc[a]=c[a]||function(){(c[a].q=c[a].q||[]).push(arguments)};t=l.createElement(r);t.async=1;\n\t\t\tt.src=\"https:\/\/www.clarity.ms\/tag\/\"+i+\"?ref=aioseo\";y=l.getElementsByTagName(r)[0];y.parentNode.insertBefore(t,y);\n\t\t})(window, document, \"clarity\", \"script\", \"n4woz8og40\");\n\t\t<\/script>\n\t\t<script>(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src='https:\/\/www.googletagmanager.com\/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f);})(window,document,'script','dataLayer',\"GTM-PGQ6572W\");<\/script>\n\t\t<!-- All in One SEO Pro -->\r\n\t\t<title>Workday Falls Victim to the ShinyHunters Salesforce Attack Spree<\/title>\n\n","aioseo_head_json":{"title":"Workday Falls Victim to the ShinyHunters Salesforce Attack Spree","description":"Workday confirms a data breach tied to ShinyHunters, with attackers exploiting Salesforce-connected apps in a growing wave of social engineering incidents.","canonical_url":"https:\/\/www.adminbyrequest.com\/en\/blogs\/workday-falls-victim-to-the-shinyhunters-salesforce-attack-spree","robots":"max-snippet:-1, max-image-preview:large, max-video-preview:-1","keywords":"cybersecurity,data breach,news,pam,privileged access management,salesforce,social engineering,workday","webmasterTools":{"miscellaneous":""},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"BlogPosting","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/workday-falls-victim-to-the-shinyhunters-salesforce-attack-spree#blogposting","name":"Workday Falls Victim to the ShinyHunters Salesforce Attack Spree","headline":"Workday Falls Victim to the ShinyHunters Salesforce Attack Spree","author":{"@id":"https:\/\/www.adminbyrequest.com\/en\/author\/pocholo-editor#author"},"publisher":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#organization"},"image":{"@type":"ImageObject","url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/08\/main-7.png","width":1820,"height":1024},"datePublished":"2025-08-22T03:02:31+00:00","dateModified":"2026-01-24T22:46:26+00:00","inLanguage":"en-US","mainEntityOfPage":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/workday-falls-victim-to-the-shinyhunters-salesforce-attack-spree#webpage"},"isPartOf":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/workday-falls-victim-to-the-shinyhunters-salesforce-attack-spree#webpage"},"articleSection":"Blogs, Cybersecurity, Data Breach, News, PAM, Privileged Access Management, Salesforce, Social Engineering, Workday, Pocholo Legaspi"},{"@type":"BreadcrumbList","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/workday-falls-victim-to-the-shinyhunters-salesforce-attack-spree#breadcrumblist","itemListElement":[{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en#listItem","position":1,"name":"Home","item":"https:\/\/www.adminbyrequest.com\/en","nextItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs#listItem","name":"Blogs"}},{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs#listItem","position":2,"name":"Blogs","item":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs","nextItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/workday-falls-victim-to-the-shinyhunters-salesforce-attack-spree#listItem","name":"Workday Falls Victim to the ShinyHunters Salesforce Attack Spree"},"previousItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en#listItem","name":"Home"}},{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/workday-falls-victim-to-the-shinyhunters-salesforce-attack-spree#listItem","position":3,"name":"Workday Falls Victim to the ShinyHunters Salesforce Attack Spree","previousItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs#listItem","name":"Blogs"}}]},{"@type":"Organization","@id":"https:\/\/www.adminbyrequest.com\/en\/#organization","name":"Admin By Request","description":"Local Admin Rights, Managed.","url":"https:\/\/www.adminbyrequest.com\/en\/","telephone":"+12622994600","logo":{"@type":"ImageObject","url":"\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/workday-falls-victim-to-the-shinyhunters-salesforce-attack-spree\/#organizationLogo"},"image":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/workday-falls-victim-to-the-shinyhunters-salesforce-attack-spree\/#organizationLogo"},"sameAs":["https:\/\/www.facebook.com\/adminbyrequest","https:\/\/twitter.com\/AdminByRequest","https:\/\/www.instagram.com\/AdminByRequest\/","https:\/\/www.tiktok.com\/@adminbyrequest","https:\/\/www.youtube.com\/channel\/UCwq1wlbT9m_z3YH-EPaZqKw","https:\/\/www.linkedin.com\/company\/adminbyrequest\/"]},{"@type":"Person","@id":"https:\/\/www.adminbyrequest.com\/en\/author\/pocholo-editor#author","url":"https:\/\/www.adminbyrequest.com\/en\/author\/pocholo-editor","name":"Pocholo Legaspi"},{"@type":"WebPage","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/workday-falls-victim-to-the-shinyhunters-salesforce-attack-spree#webpage","url":"https:\/\/www.adminbyrequest.com\/en\/blogs\/workday-falls-victim-to-the-shinyhunters-salesforce-attack-spree","name":"Workday Falls Victim to the ShinyHunters Salesforce Attack Spree","description":"Workday confirms a data breach tied to ShinyHunters, with attackers exploiting Salesforce-connected apps in a growing wave of social engineering incidents.","inLanguage":"en-US","isPartOf":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#website"},"breadcrumb":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/workday-falls-victim-to-the-shinyhunters-salesforce-attack-spree#breadcrumblist"},"author":{"@id":"https:\/\/www.adminbyrequest.com\/en\/author\/pocholo-editor#author"},"creator":{"@id":"https:\/\/www.adminbyrequest.com\/en\/author\/pocholo-editor#author"},"image":{"@type":"ImageObject","url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/08\/main-7.png","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/workday-falls-victim-to-the-shinyhunters-salesforce-attack-spree\/#mainImage","width":1820,"height":1024},"primaryImageOfPage":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/workday-falls-victim-to-the-shinyhunters-salesforce-attack-spree#mainImage"},"datePublished":"2025-08-22T03:02:31+00:00","dateModified":"2026-01-24T22:46:26+00:00"},{"@type":"WebSite","@id":"https:\/\/www.adminbyrequest.com\/en\/#website","url":"https:\/\/www.adminbyrequest.com\/en\/","name":"Admin By Request","alternateName":"ABR","description":"Local Admin Rights, Managed.","inLanguage":"en-US","publisher":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#organization"}}]},"og:locale":"en_US","og:site_name":"Admin By Request \u00bb Local Admin Rights, Managed.","og:type":"article","og:title":"Workday Falls Victim to the ShinyHunters Salesforce Attack Spree","og:description":"Workday confirms a data breach tied to ShinyHunters, with attackers exploiting Salesforce-connected apps in a growing wave of social engineering incidents.","og:url":"https:\/\/www.adminbyrequest.com\/en\/blogs\/workday-falls-victim-to-the-shinyhunters-salesforce-attack-spree","og:image":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","og:image:secure_url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","article:published_time":"2025-08-22T03:02:31+00:00","article:modified_time":"2026-01-24T22:46:26+00:00","article:publisher":"https:\/\/www.facebook.com\/adminbyrequest","twitter:card":"summary_large_image","twitter:site":"@AdminByRequest","twitter:title":"Workday Falls Victim to the ShinyHunters Salesforce Attack Spree","twitter:description":"Workday confirms a data breach tied to ShinyHunters, with attackers exploiting Salesforce-connected apps in a growing wave of social engineering incidents.","twitter:creator":"@AdminByRequest","twitter:image":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg"},"aioseo_meta_data":{"post_id":"27413","title":"#post_title","description":"#post_excerpt","keywords":null,"keyphrases":{"focus":{"keyphrase":"","score":0,"analysis":{"keyphraseInTitle":{"score":0,"maxScore":9,"error":1}}},"additional":[]},"primary_term":null,"canonical_url":null,"og_title":null,"og_description":null,"og_object_type":"default","og_image_type":"default","og_image_url":null,"og_image_width":null,"og_image_height":null,"og_image_custom_url":null,"og_image_custom_fields":null,"og_video":"","og_custom_url":null,"og_article_section":null,"og_article_tags":null,"twitter_use_og":false,"twitter_card":"default","twitter_image_type":"default","twitter_image_url":null,"twitter_image_custom_url":null,"twitter_image_custom_fields":null,"twitter_title":null,"twitter_description":null,"schema":{"blockGraphs":[],"customGraphs":[],"default":{"data":{"Article":[],"Course":[],"Dataset":[],"FAQPage":[],"Movie":[],"Person":[],"Product":[],"ProductReview":[],"Car":[],"Recipe":[],"Service":[],"SoftwareApplication":[],"WebPage":[]},"graphName":"BlogPosting","isEnabled":true},"graphs":[]},"schema_type":"default","schema_type_options":null,"pillar_content":false,"robots_default":true,"robots_noindex":false,"robots_noarchive":false,"robots_nosnippet":false,"robots_nofollow":false,"robots_noimageindex":false,"robots_noodp":false,"robots_notranslate":false,"robots_max_snippet":"-1","robots_max_videopreview":"-1","robots_max_imagepreview":"large","priority":null,"frequency":"default","local_seo":null,"seo_analyzer_scan_date":"2026-01-24 22:46:47","breadcrumb_settings":null,"limit_modified_date":false,"reviewed_by":null,"open_ai":null,"ai":{"faqs":[],"keyPoints":[],"titles":[],"descriptions":[],"socialPosts":{"email":[],"linkedin":[],"twitter":[],"facebook":[],"instagram":[]}},"created":"2025-08-20 01:16:58","updated":"2026-01-24 22:46:48"},"aioseo_breadcrumb":"<div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.adminbyrequest.com\/en\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.adminbyrequest.com\/en\/category\/blogs\" title=\"Blogs\">Blogs<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\tWorkday Falls Victim to the ShinyHunters Salesforce Attack Spree\n<\/span><\/div>","aioseo_breadcrumb_json":[{"label":"Home","link":"https:\/\/www.adminbyrequest.com\/en"},{"label":"Blogs","link":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs"},{"label":"Workday Falls Victim to the ShinyHunters Salesforce Attack Spree","link":"https:\/\/www.adminbyrequest.com\/en\/blogs\/workday-falls-victim-to-the-shinyhunters-salesforce-attack-spree"}],"authors":[{"term_id":428,"user_id":16,"is_guest":0,"slug":"pocholo-editor","display_name":"Pocholo Legaspi","avatar_url":{"url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/04\/Pocholo-Headshot.jpg","url2x":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/04\/Pocholo-Headshot.jpg"},"author_category":"1","user_url":"","last_name":"Legaspi","first_name":"Pocholo","job_title":"","description":"Pocholo Legaspi is a seasoned content marketer and SEO specialist with over nine years of experience crafting digital content that drives engagement and growth. With a background in tech and a Master\u2019s in Business Informatics, he brings a data-driven approach to content strategy and storytelling."}],"_links":{"self":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts\/27413","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/comments?post=27413"}],"version-history":[{"count":2,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts\/27413\/revisions"}],"predecessor-version":[{"id":27659,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts\/27413\/revisions\/27659"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/media\/27657"}],"wp:attachment":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/media?parent=27413"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/categories?post=27413"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/tags?post=27413"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/ppma_author?post=27413"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}