Google

Google

Google disclosed a data breach involving a **Salesforce database** used internally to manage potential advertisers. The breach was executed by the hacker group **ShinyHunters**, who impersonated an IT help desk employee to deploy malware and extract **business contact information** (e.g., company and customer names). While no **personal Gmail credentials or sensitive consumer data** were exposed, the stolen data fueled a surge in **highly targeted phishing and vishing (voice phishing) attacks**, accounting for **37% of successful account takeovers** across Google platforms. The attackers also compromised **OAuth tokens** for the *Drift Email* integration, prompting Google to revoke access and disable the Salesforce-Gmail connection to prevent further spread. Though the breach was contained to Salesforce and did not directly compromise Google Workspace or Alphabet, the leaked business data enabled **sophisticated social engineering scams**, increasing risks for users. Google advised password updates, non-SMS 2FA, and migration to **passkeys** (biometric authentication) as mitigation. No timeline for further disclosures was provided, but analysts anticipate **ongoing attacks** leveraging the exposed data.

Source: https://www.newsweek.com/google-gmail-data-breach-warning-2122287

TPRM report: https://www.rankiteo.com/company/googlecloudsecurity

"id": "goo21105921090425",
"linkid": "googlecloudsecurity",
"type": "Breach",
"date": "7/2022",
"severity": "60",
"impact": "3",
"explanation": "Attack with significant impact with internal employee data leaks"
{'affected_entities': [{'customers_affected': 'Potential advertisers (business '
                                              'contact data exposed)',
                        'industry': 'Technology (Cloud Services, Advertising, '
                                    'Email)',
                        'location': 'Mountain View, California, USA (HQ); '
                                    'Breach Linked to Salesforce Database',
                        'name': 'Google (Alphabet Inc.)',
                        'size': '2.5 billion Gmail users (indirectly '
                                'affected); Google Workspace administrators '
                                '(directly notified)',
                        'type': 'Corporation'},
                       {'industry': 'Customer Relationship Management (CRM)',
                        'location': 'San Francisco, California, USA',
                        'name': 'Salesforce (Third-Party Vendor)',
                        'type': 'Corporation'},
                       {'industry': 'Sales Engagement Platform',
                        'name': 'Drift Email (Salesloft Integration)',
                        'type': 'Software Service'}],
 'attack_vector': ['Impersonation (IT Help Desk)',
                   'Malware Deployment',
                   'OAuth Token Compromise'],
 'customer_advisories': ['Avoid clicking unsolicited email links.',
                         'Check for login alerts in Gmail.',
                         'Report phishing attempts via Google’s reporting '
                         'tools.',
                         'Consider enrolling in the Advanced Protection '
                         'Program for high-risk accounts.'],
 'data_breach': {'data_exfiltration': True,
                 'sensitivity_of_data': 'Low (No PII, Passwords, or Financial '
                                        'Data)',
                 'type_of_data_compromised': ['Business Contact Information '
                                              '(Non-Sensitive)']},
 'date_publicly_disclosed': '2025-08-05',
 'description': 'Google issued a global security alert advising its 2.5 '
                'billion Gmail users to update their passwords following a '
                'data breach involving one of its Salesforce databases. While '
                'consumer Gmail and Cloud accounts were not directly '
                'compromised, the stolen business contact details were used in '
                "phishing and 'vishing' (voice phishing) campaigns mimicking "
                'legitimate Google communications. The breach was attributed '
                'to the hacker group ShinyHunters, who impersonated an IT help '
                'desk to deploy malware and extract the database contents. '
                "Google revoked compromised OAuth tokens for the 'Drift Email' "
                'integration and disabled connections between Gmail and '
                'Salesforce services to mitigate risks.',
 'impact': {'brand_reputation_impact': ['Increased Phishing Risks for 2.5B '
                                        'Gmail Users',
                                        'Erosion of Trust in Google Workspace '
                                        'Security'],
            'data_compromised': ['Business Contact Information (Company Names, '
                                 'Customer Names)'],
            'identity_theft_risk': ['Low (No PII or Passwords Compromised)'],
            'operational_impact': ['Temporary Suspension of Gmail-Salesforce '
                                   'Integrations',
                                   'Revocation of OAuth Tokens'],
            'systems_affected': ['Salesforce Database (Advertiser Management)',
                                 'Drift Email Integration',
                                 'OAuth Tokens']},
 'initial_access_broker': {'backdoors_established': ['Malware Deployment on '
                                                     'Salesforce Database'],
                           'entry_point': 'IT Help Desk Impersonation (Social '
                                          'Engineering)',
                           'high_value_targets': ['Google Workspace OAuth '
                                                  'Tokens',
                                                  'Drift Email Integration']},
 'investigation_status': 'Ongoing (OAuth token revocation and integration '
                         'suspension pending further analysis)',
 'lessons_learned': ['Third-party integrations (e.g., Salesforce, Drift) '
                     'introduce attack surfaces even for tech giants like '
                     'Google.',
                     'Social engineering (e.g., IT help desk impersonation) '
                     'remains a critical vector for initial access.',
                     'OAuth token security requires stricter authentication '
                     'and monitoring.',
                     'Phishing risks escalate significantly even with '
                     'non-sensitive data breaches (e.g., business contacts '
                     'used for convincing scams).'],
 'motivation': ['Financial Gain (Phishing/Scams)',
                'Data Exfiltration for Resale',
                'Disruption'],
 'post_incident_analysis': {'corrective_actions': ['Disabled vulnerable '
                                                   'integrations (Drift Email) '
                                                   'pending security review.',
                                                   'Revoked compromised OAuth '
                                                   'tokens and enforced '
                                                   're-authentication.',
                                                   'Accelerated rollout of '
                                                   'passkey adoption to reduce '
                                                   'password-based risks.',
                                                   'Enhanced employee training '
                                                   'on social engineering '
                                                   'tactics.'],
                            'root_causes': ['Successful social engineering '
                                            'attack (IT help desk '
                                            'impersonation).',
                                            'Inadequate safeguards for '
                                            'third-party OAuth token '
                                            'integrations (Drift/Salesloft).',
                                            'Lack of real-time monitoring for '
                                            'anomalous database access '
                                            'patterns.']},
 'recommendations': ['Replace passwords with passkeys (biometric '
                     'authentication) for all users.',
                     'Enable non-SMS two-factor authentication (2FA) across '
                     'Google Workspace.',
                     'Enroll high-risk users in Google’s Advanced Protection '
                     'Program.',
                     'Monitor for phishing/vishing campaigns leveraging '
                     'breached business data.',
                     'Audit and secure third-party integrations (e.g., '
                     'Salesforce, Drift) with granular OAuth permissions.',
                     'Conduct regular social engineering drills for employees '
                     '(e.g., IT help desk impersonation scenarios).'],
 'references': [{'date_accessed': '2025-08-28',
                 'source': 'Newsweek',
                 'url': 'https://www.newsweek.com/google-gmail-password-update-data-breach-1823456'},
                {'date_accessed': '2025-08-05',
                 'source': 'Google Official Blog',
                 'url': 'https://blog.google/technology/safety-security/google-security-alert-august-2025/'},
                {'date_accessed': '2025-08-28',
                 'source': 'Google Account Help (Passkeys)',
                 'url': 'https://support.google.com/accounts/answer/13115501'}],
 'response': {'communication_strategy': ['Global Security Alert to 2.5B Gmail '
                                         'Users',
                                         'Official Blog Post (August 5, 2025)',
                                         'Direct Notifications to Workspace '
                                         'Administrators',
                                         'Security Help Resources (Passkey '
                                         'Adoption Guides)'],
              'containment_measures': ['Revoked OAuth Tokens for Drift Email '
                                       'Integration',
                                       'Disabled Gmail-Salesloft Drift '
                                       'Connectivity',
                                       'Notified Google Workspace '
                                       'Administrators'],
              'enhanced_monitoring': ['Phishing and Vishing Attack Patterns'],
              'incident_response_plan_activated': True,
              'remediation_measures': ['Password Update Recommendations for '
                                       'Gmail Users',
                                       'Promotion of Passkeys (Biometric '
                                       'Authentication)',
                                       'Enhanced Phishing Detection Filters']},
 'stakeholder_advisories': ['Google Workspace administrators notified of '
                            'breach and mitigation steps.',
                            'Gmail users advised to update passwords, enable '
                            '2FA, and adopt passkeys.'],
 'threat_actor': 'ShinyHunters',
 'title': 'Google Salesforce Database Breach Leading to Phishing and Vishing '
          'Attacks',
 'type': ['Data Breach', 'Phishing Attack', 'Social Engineering'],
 'vulnerability_exploited': ['Human Error (Social Engineering)',
                             'Weak Authentication for OAuth Tokens',
                             'Third-Party Integration (Drift Email/Salesloft)']}
Great! Next, complete checkout for full access to Rankiteo Blog.
Welcome back! You've successfully signed in.
You've successfully subscribed to Rankiteo Blog.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info has been updated.
Your billing was not updated.