Detect, Respond, Protect
See how the global Huntress SOC can augment your team
with 24/7 coverage and unmatched human expertise.
Start your free trial today.
ShinyHunters is a financially motivated cybercrime and extortion operation that has been active since at least 2019. The group is best known for large-scale data theft, SaaS-focused intrusions, and pay-or-leak extortion. Operating with no confirmed (or overt) nation-state affiliation, the group has established itself as one of the most prolific data theft and extortion gangs in the world, targeting SaaS platforms, cloud environments, and enterprise identity providers through sophisticated social engineering, credential theft, and large-scale data exfiltration — followed by ransom demands under a ruthless "pay or leak" model.
ShinyHunters does not have a confirmed country of origin. The group is believed to be decentralized and internationally distributed. Known arrested affiliates include a French national (Sébastien Raoult, arrested in Morocco in 2022 and extradited to the U.S.) and at least four additional individuals arrested in France in June 2025, suggesting European ties. However, researchers widely assess the broader group to be a loose, multinational collective with members across multiple countries. No single nation-state has been formally attributed as the group's base of operations.
No confirmed public ringleader has been identified. Public reporting has associated the name `shinycorp` with ShinyHunters branding, but real-world leadership attribution remains unconfirmed. The aliases `Hollow`, `Noct`, and `Depressed` are better treated as personas tied to arrests or affiliated activity, not confirmed group leadership.
ShinyHunters is better described as a loose criminal ecosystem than a rigidly structured organization. Huntress reporting describes ShinyHunters, Scattered Spider, and Lapsus$ as converging into the broader SLSH/ShinySp1d3r threat ecosystem, while Google tracks related activity under multiple distinct clusters depending on campaign and role — UNC6240, UNC6661, UNC6671, UNC6395, and UNC6040 among them. That suggests overlap and collaboration, but not a single neatly bounded membership list. Exact membership count is unknown, and the ShinyHunters name is best understood as a brand used by a fluid network of criminal affiliates rather than a fixed roster of individuals.
ShinyHunters is primarily motivated by financial gain through large-scale data theft and extortion. The group's overarching tactical goals are:
ShinyHunters relies on a mix of social engineering, identity abuse, and SaaS-focused data theft techniques:
ShinyHunters follows a repeatable pattern across recent campaigns:
In mid-2024, ShinyHunters exploited stolen contractor credentials — not a vulnerability in Snowflake's platform itself — to access cloud data belonging to Snowflake customers. This campaign resulted in the theft and sale of data from Ticketmaster (560M records), Santander Bank (30M records), AT\&T (109M call records — AT\&T paid a $370,000 ransom to delete the data), Neiman Marcus (31M records), and dozens of other organizations. The group used a distinctive tool signature called "RapeFlake" during this operation.
ShinyHunters used the TruffleHog open-source security tool to scan source code repositories, discovering OAuth tokens for the Salesloft Drift email platform. Using those tokens, the group accessed approximately 760 Salesforce customer organizations between August 8–18, 2025, exfiltrating roughly 1.5 billion records across Account, Contact, Case, Opportunity, and User data tables. Confirmed victims included Cloudflare, Workiva, Zscaler, Tenable, CyberArk, Elastic, BeyondTrust, Proofpoint, JFrog, Rubrik, Cato Networks, and Palo Alto Networks. Google's Threat Intelligence team tracked this activity as UNC6395 and confirmed awareness of over 700 potentially impacted organizations.
In a near-identical follow-up, ShinyHunters stole OAuth tokens from Gainsight's Salesforce integration and accessed approximately 285 Salesforce instances (200+ confirmed by Google). Victims included Atlassian, DocuSign, F5, GitLab, Malwarebytes, SonicWall, Thomson Reuters, and Verizon. Salesforce revoked all associated OAuth tokens and temporarily removed related AppExchange applications during the incident.
Operating as UNC6661 and UNC6671, ShinyHunters impersonated IT support staff to trick employees at targeted organizations into entering Okta SSO credentials and MFA codes on custom victim-branded phishing portals. Post-access, attackers exfiltrated data from SharePoint, OneDrive, Salesforce, and Slack. In some incidents, the ToogleBox Recall Gmail add-on was silently authorized to delete MFA enrollment notification emails. Confirmed victims include Wynn Resorts, Odido, Panera Bread, Betterment, Grubhub, Harvard University, Princeton University, and University of Pennsylvania.
In March 2026, Salesforce issued a security advisory warning of a "known threat group" exploiting misconfigurations in Salesforce Experience Cloud (Aura). ShinyHunters claimed responsibility on their DLS, warning approximately 400 victim companies — including Snowflake, Okta, LastPass, and Salesforce itself — to pay or face data leaks. The group used a modified version of Google's AuraInspector Chrome extension alongside a custom-developed scanning tool. The user-agent string "RapeForce" was observed, mirroring the earlier Snowflake campaign's "RapeFlake" signature.
ShinyHunters exploited previously-stolen credential tokens from Anodot to gain access to Instructure's Free-for-Teacher environment — related to support ticket handling — and steal 275 million records (3.65TB of data) from Canvas, one of the world's most widely used learning management systems used by more than 9,000 institutions. After a second wave of unauthorized access on May 7, 2026 defaced Canvas login portals at approximately 330 institutions with extortion messages, Instructure reached a ransom agreement with the group by May 12, 2026 to prevent data leakage. The company confirmed no passwords or course content were compromised.
Despite the group's extensive criminal activity, law enforcement actions have been limited in scope and have not significantly disrupted operations:
Deploy phishing-resistant MFA: Replace push-based and SMS authentication with FIDO2 security keys or passkeys. These methods are resistant to the real-time social engineering and adversary-in-the-middle attacks ShinyHunters routinely employs. Google and Okta both explicitly recommend this step in response to these campaigns.
Enforce conditional access policies: Block logins from anonymized IPs (Mullvad, Oxylabs, 9Proxy, etc.), enforce device compliance checks, and require trusted network conditions for SSO access.
Monitor for new MFA device enrollments: Alert on any new device being registered against user accounts, especially if done outside of IT change windows or from unusual geolocations.
Audit OAuth application grants regularly: Review and revoke unnecessary OAuth applications connected to your identity provider and SaaS platforms. Immediately investigate any unexpected authorization events, especially for tools like ToogleBox Recall.
Limit SaaS-to-SaaS integration permissions: Apply least privilege to all OAuth integrations. Third-party SaaS integrations (e.g., analytics, CRM, email tools) should have read-only access where possible and should be reviewed quarterly.
Conduct security awareness training: Employees should be trained to verify the identity of any caller claiming to be IT support before taking any action. Establish a clear callback procedure using verified contact numbers from internal directories.
Hunt for behavioral indicators: Monitor SIEM/XDR for bulk SharePoint/OneDrive downloads, PowerShell-based file access, Salesforce Data Loader activity, high-volume document access events, and suspicious SharePoint keyword searches ("poc," "confidential," "vpn," "salesforce").
Monitor email deletion events: Alert on the deletion of MFA-related emails from Exchange/Gmail (e.g., emails with subjects matching "new MFA device," "security method enrolled," "factor activated").
Integrate threat intelligence feeds: Subscribe to Google Security Operations rule packs (Okta, Cloud Hacktool, O365 rule packs) for curated detections aligned to ShinyHunters TTPs.
Deploy dark web monitoring: Monitor for your organization's data appearing on paste sites, ShinyHunters' data leak site, or hacker forums where the group sells and auctions stolen data.