ShinyHunters Breached Amtrak via Salesforce — 2.1M Passenger Records Confirmed in HIBP
On April 14, 2026, the clock ran out for Amtrak. ShinyHunters had issued the National Railroad Passenger Corporation a ransom ultimatum: pay by April 14, or 9.4 million Salesforce records containing passenger personally identifiable information would be published to the open internet. Amtrak stayed silent. The deadline passed. By April 17, 2.1 million unique email addresses from the dataset had been verified and added to Have I Been Pwned — making this one of the first confirmed dark web data publications affecting US critical rail infrastructure in recent memory. The Amtrak data breach is not a claim. It is a confirmed fact.
The breach did not exploit a zero-day vulnerability. ShinyHunters did not breach Amtrak through an unpatched server or a Salesforce software flaw. The entry point was mundane and increasingly familiar: infostealer malware deployed against Amtrak employees harvested authentication credentials silently. Those stolen credentials — Salesforce usernames, passwords, and session tokens — gave ShinyHunters authenticated access to Amtrak's cloud CRM environment. The exfiltration was automated and silent, appearing identical to normal Salesforce activity from a legitimate authenticated session. By the time detection occurred, the damage was complete.
The Amtrak incident sits within a months-long ShinyHunters campaign that has breached more organisations in 2026 than any other extortion group. McGraw Hill lost 13.5 million student accounts via Salesforce. Rockstar Games lost 78.6 million records through a third-party SaaS integration. Alert360, the fifth-largest US home security provider, lost 2.5 million customer records. The European Commission lost 350GB of documents. Amtrak is the most symbolically significant target yet — a semi-governmental entity responsible for the personal data of millions of American rail travelers. What makes Amtrak's breach the definitive lesson for 2026: ShinyHunters did not need to exploit a single software vulnerability. They needed one employee's stolen password.
How infostealer malware handed ShinyHunters the keys to Amtrak's Salesforce
Infostealer malware operates silently inside browser environments on infected endpoints, harvesting credentials stored by password autofill, active session cookies, and authentication tokens — without generating any user-visible activity. The most prolific infostealers targeting enterprise cloud credentials in 2026 — Lumma Stealer, Vidar, and Redline — specifically target Salesforce authentication artifacts, Microsoft 365 session tokens, and Okta cookies, which are packaged into credential logs and sold on dark web markets for $10–$50 per compromised machine.
In the Amtrak case, infostealer malware targeting at least one employee endpoint harvested Salesforce credentials that provided authenticated access to Amtrak's CRM environment. Once inside, ShinyHunters used automated scripts to enumerate and exfiltrate records — a technique consistent with MITRE ATT&CK T1530 (Data from Cloud Storage) and T1078 (Valid Accounts). Because the access originated from a legitimate authenticated session using real credentials, Amtrak's standard monitoring did not flag the activity as anomalous until after the exfiltration window had closed.
This same credential-to-cloud methodology has been documented across ShinyHunters' entire 2026 campaign. As detailed in our earlier breakdown of the [ShinyHunters McGraw Hill Salesforce breach](/blog/shinyhunters-mcgraw-hill-salesforce-breach-45-million), the group's technical approach is deliberately minimalist: they purchase harvested credentials that let them walk through the front door of cloud platforms as authenticated users. No vulnerability exploitation. No malware deployment on target infrastructure. Just a stolen password and an API query.
Infostealer infection — employee endpoint compromised
Lumma Stealer, Vidar, or Redline malware runs silently on an Amtrak employee's device, harvesting saved browser credentials and active session tokens including Salesforce authentication artifacts.
Credential sale — dark web marketplace
Harvested credentials are packaged into infostealer logs and sold on dark web markets. ShinyHunters acquires Amtrak Salesforce credentials, either directly or via a broker.
Authenticated CRM access — appears as legitimate session
ShinyHunters authenticates to Amtrak's Salesforce instance using valid stolen credentials. The session appears indistinguishable from normal employee activity — no exploit alert fires.
Automated exfiltration — 9.4M records extracted
Automated scripts enumerate and extract Salesforce records: passenger names, email addresses, street addresses, and customer support ticket contents. Exfiltration completes before detection.
Extortion — April 14 deadline, data published after non-payment
ShinyHunters lists Amtrak on its dark web extortion portal claiming 9.4M records. After Amtrak declines to pay, the data is published. 2.1M unique emails are confirmed in Have I Been Pwned on April 17.
What the dark web dataset contains: 2.1 million confirmed passenger records
When ShinyHunters published the Amtrak dataset after the April 14 ransom deadline passed, security researchers reviewed the leaked material. Have I Been Pwned's Troy Hunt confirmed 2.1 million unique email addresses, with each record carrying the following data fields: full name, email address, street address, and customer support ticket content. The 9.4 million figure ShinyHunters cited reflects total records — including duplicates and multiple entries per individual — not unique affected persons.
Approximately 80% of the exposed email addresses were already present in prior breach compilations in HIBP, indicating that Amtrak passengers who reuse passwords across services face elevated credential stuffing risk from this dataset. The remaining 20% — roughly 420,000 email addresses — represent net-new exposure that did not exist in any prior breach database.
The customer support ticket content is the most operationally dangerous element of the dataset. Support tickets contain context that makes downstream spear-phishing attempts extraordinarily credible: trip dates and routes, complaint narratives, station references, and prior interactions with Amtrak staff. A threat actor with this data can craft phishing emails that reference a specific trip from New York Penn to Washington Union on a specific date, the seat assignment complaint the target filed, or the refund dispute they opened — making the communication indistinguishable from a legitimate Amtrak follow-up. This is not bulk credential stuffing territory. It is raw material for surgical social engineering at scale.
ShinyHunters' 2026 rampage: Amtrak among dozens of confirmed victims this year
ShinyHunters — tracked as threat cluster UNC6661 and related sub-clusters by Google's Mandiant research team — has operationalised a repeatable, scalable attack factory in 2026. The group acquires infostealer-harvested credentials from dark web markets or conducts voice phishing (vishing) campaigns to steal SSO credentials in real time, then authenticates to cloud platforms, exfiltrates high-value datasets, demands ransom within 72–96 hours, and publishes to their dark web leak site on deadline expiry.
The confirmed 2026 victim list spans critical sectors. McGraw Hill: 13.5 million student and educator accounts leaked via Salesforce misconfiguration. Rockstar Games: 78.6 million records extracted through Anodot, a third-party cloud cost-monitoring SaaS integrated with Rockstar's Snowflake warehouse — covered in the [weekly roundup from April 17](/blog/forticlient-ems-cve-2026-35616-weekly-roundup). Alert360: 2.5 million records from the fifth-largest US home security provider, leaked after ransom talks failed. Hims & Hers: customer support ticket data via Zendesk compromise, breach notification sent April 2. European Commission: 350GB of documents. Wynn Resorts: 800,000 customer and employee records. The group has additionally threatened Crunchbase, Betterment, SoundCloud, and Ameriprise Financial.
Amtrak is the most significant victim from a critical infrastructure perspective. Unlike a gaming company or edtech platform, Amtrak is a government-chartered corporation providing essential national transportation infrastructure. The breach establishes that no sector — including federally connected entities — is outside ShinyHunters' operational scope in 2026.
“ShinyHunters extracted authentication tokens from cloud services that granted them access from what appeared to be fully legitimate sessions. No malware on the target's servers, no vulnerability exploitation on Salesforce's end. The breach began and ended in the identity layer.”
— Google Cloud / Mandiant — Tracking the Expansion of ShinyHunters-Branded SaaS Data Theft, April 2026
ShinyHunters IOCs: network indicators and infrastructure from the 2026 campaign
Google's Mandiant team has published network indicators associated with ShinyHunters' UNC6661 threat cluster from the January–April 2026 campaign. These IOCs should be ingested into SIEM, EDR, and firewall platforms immediately. Particular attention should be paid to the ToogleBox Recall OAuth application indicator — ShinyHunters uses this legitimate-looking application to authorise deletion of MFA notification emails from victims' inboxes, preventing detection of new device enrolments.
ShinyHunters credential harvesting infrastructure follows a consistent domain pattern for vishing and phishing operations: `<companyname>sso.com`, `my<companyname>sso.com`, `<companyname>internal.com`, `<companyname>support.com`, and `<companyname>okta.com`. If your organisation discovers any domains following this pattern registered without your knowledge, treat it as an active targeting indicator.
Extortion contact channels documented in active campaigns: shinycorp@tutanota.com and shinygroup@onionmail.com. The group communicates ransom demands via these addresses and offers Tox IDs for direct negotiation. Do not engage with ransom demands without legal counsel.
| Artifact | Type | SHA-256 (Truncated) |
|---|---|---|
| 24.242.93.122 (ASN 11427) | IP — UNC6661 | ShinyHunters operational IP — block at firewall and alert on historical SIEM hits |
| 23.234.100.107 (ASN 11878) | IP — UNC6661 | ShinyHunters operational IP — block at firewall and alert on historical SIEM hits |
| 73.135.228.98 (ASN 33657) | IP — UNC6661 | ShinyHunters operational IP — block at firewall and alert on historical SIEM hits |
| 149.50.97.144 (ASN 201814, Poland) | IP — UNC6661 | ShinyHunters operational IP — block at firewall and alert on historical SIEM hits |
| 76.64.54.159 / 76.70.74.63 / 206.170.208.23 (ASN 577) | IP — UNC6671 | Related ShinyHunters sub-cluster — include in blocklist sweep |
| ToogleBox Recall (OAuth app, Gmail scope: gmail.addons.execute) | OAuth Application | Used to delete MFA enrolment notification emails — audit Google Workspace OAuth authorizations immediately |
| shinycorp@tutanota.com / shinygroup@onionmail.com | Extortion Contact | ShinyHunters ransom demand channels — receipt of email from these addresses confirms active targeting |
| <companyname>sso.com / my<companyname>sso.com / <companyname>support.com | Domain Pattern | ShinyHunters credential harvesting sites — monitor brand impersonation registrations via WHOIS alerts |
Any instance of msimg32.dll found outside C:\Windows\System32 is an active IOC. Isolate the host immediately. Full hashes and IOC lists are available via the Cisco Talos GitHub repository.
Detection: how to hunt ShinyHunters TTPs across your identity and cloud stack
ShinyHunters' attack methodology leaves detectable artifacts across identity provider logs, cloud audit trails, and email systems — if your monitoring is configured to capture the right events. The group's vishing-based MFA bypass is detectable at the Okta or Azure AD layer; the subsequent cloud exfiltration is detectable in Salesforce Event Monitoring and Google Workspace audit logs.
The highest-fidelity detection opportunity is the ToogleBox Recall OAuth authorization event. When ShinyHunters registers this application to a compromised Google account, a USER_RESOURCE_ACCESS event with App name 'ToogleBox Recall' and Gmail addons scope is written to Google Workspace audit logs. This event does not occur in normal user activity — any occurrence should trigger immediate account lockdown and investigation.
For Salesforce-specific detection, configure Salesforce Event Monitoring to alert on bulk API query volume exceeding a per-session threshold, login events from anonymized IP ranges (Mullvad, Oxylabs, NetNut, 9Proxy, Infatica, nsocks), and user agent strings associated with scripted access rather than legitimate browser-based Salesforce sessions.
Alert on new MFA device registrations from anonymized IPs
Configure Okta and Azure AD to generate high-priority alerts when a new device is registered for MFA from an IP identified as a VPN, proxy, or anonymizing service. ShinyHunters registers attacker-controlled devices for MFA immediately after credential theft to establish persistent access.
Block ToogleBox Recall OAuth authorization
Add ToogleBox Recall to your Google Workspace OAuth application blocklist. Create a SIEM alert on any historical USER_RESOURCE_ACCESS event with App name matching 'ToogleBox Recall' — any past authorization indicates the account was compromised and MFA notification emails were deleted.
Monitor Salesforce for bulk API access from scripted user agents
Enable Salesforce Event Monitoring and alert on sessions where API query volume exceeds a per-hour threshold, or where the user agent string indicates scripted access rather than a browser. ShinyHunters' exfiltration scripts generate bulk query patterns that are anomalous relative to normal Salesforce user behaviour.
Review email logs for MFA notification deletion events
Hunt across Exchange and Gmail logs for SoftDelete, HardDelete, or MoveToDeletedItems events where the email subject matches patterns: 'new MFA', 'security method enrolled', 'new device registered', or '2FA'. ShinyHunters deletes these notifications to hide device registration from the compromised account's owner.
Conduct infostealer credential sweeps on corporate domains
Enroll your corporate email domain in a dark web credential monitoring service (Flare, SpyCloud, KELA, or Have I Been Pwned's domain notification service). Infostealer logs containing your employees' Salesforce or Okta credentials are typically available on dark web markets days before an attack — early detection provides an intervention window.
Remediation for organizations on Salesforce, Okta, and Microsoft 365
The Amtrak breach and the broader ShinyHunters 2026 campaign make the remediation priorities clear: the attack surface is the identity layer, and the defensive priority is making stolen credentials useless. This requires both phishing-resistant MFA and continuous credential exposure monitoring — neither alone is sufficient.
For Amtrak passengers: check Have I Been Pwned immediately, change your Amtrak account password to a unique strong password, and monitor for spear-phishing emails referencing your travel history. Consider a fraud alert or credit freeze if you provided payment information through customer support. Report suspicious emails to Amtrak at security@amtrak.com.
For organisations running Salesforce, Okta, or Microsoft 365: the browser-based credential theft angle is addressed in detail in our earlier post on [malicious Chrome extensions harvesting OAuth2 tokens](/blog/malicious-chrome-extensions-oauth2-token-theft), which covers the complementary browser-layer attack vector ShinyHunters exploits alongside vishing campaigns.
Deploy phishing-resistant FIDO2/passkey MFA across all SSO accounts
Push-based MFA (authenticator app push, SMS OTP) is bypassed by ShinyHunters' real-time phishing kits, which relay the MFA code from the victim to the attacker in real time during the vishing call. FIDO2 hardware security keys and passkeys are cryptographically bound to the legitimate domain and cannot be relayed — they are immune to this attack class.
Audit Salesforce permissions for least privilege and API access
Review all Salesforce user profiles and permission sets for unnecessary API access, bulk data export permissions, and access to customer record objects beyond what each role requires. ShinyHunters' exfiltration scripts depend on API access being available on the compromised account — least-privilege configuration limits the blast radius of any single credential compromise.
Block Salesforce access from known proxy and VPN exit nodes
Configure Salesforce Network Access restrictions and your CASB or identity proxy to block or require step-up authentication for sessions originating from Mullvad, Oxylabs, NetNut, 9Proxy, Infatica, and nsocks — all VPN/proxy providers documented in ShinyHunters' 2026 operational infrastructure by Mandiant.
Enable Salesforce Event Monitoring and configure anomaly alerts
Salesforce Event Monitoring (available in Enterprise and Unlimited editions) captures detailed session activity including API call volume, query objects, login IP, and user agent. Configure alerts for sessions where API query volume exceeds 1,000 records per minute, or where the login IP is not in a previously observed geography for that user.
Enroll corporate domains in Have I Been Pwned domain notifications
haveibeenpwned.com offers free domain-level breach notifications that alert you immediately when employee email addresses from your domain appear in a newly verified breach dataset. This provides the earliest possible warning — often before the breach is publicly confirmed — giving your security team time to reset credentials before attackers can act on them.
The bottom line
The Amtrak data breach is a clarifying event for 2026 threat intelligence: ShinyHunters breached national rail infrastructure without exploiting a single software vulnerability. They needed one employee's Salesforce password — harvested by infostealer malware — and automated the rest. The 2.1 million confirmed emails in Have I Been Pwned are the verifiable floor of passenger exposure. If you have an Amtrak account, check HIBP now, change your password, and treat any email referencing your travel history as a potential spear-phish. For security teams: your Salesforce infostealer credential sweep is overdue. Run it today.
Frequently asked questions
Was Amtrak hacked in 2026?
Yes. In April 2026, the ShinyHunters extortion group claimed to have breached Amtrak's Salesforce environment and stolen 9.4 million records. After Amtrak declined to pay a ransom by the April 14 deadline, ShinyHunters published the dataset. Security researcher Troy Hunt subsequently reviewed the leaked material and added it to Have I Been Pwned, confirming 2.1 million unique email addresses — making the breach an independently verified fact, not an unsubstantiated claim.
What data did ShinyHunters steal from Amtrak?
The confirmed dataset contains email addresses, full names, street addresses, and customer support ticket contents. Have I Been Pwned verified 2.1 million unique email addresses in the leaked files. The support ticket content is particularly dangerous for downstream attacks: it includes trip references, complaint details, and station-specific context that attackers can use to craft highly credible spear-phishing messages targeting exposed passengers.
How did ShinyHunters breach Amtrak's Salesforce?
ShinyHunters used infostealer malware to harvest Amtrak employee authentication credentials — Salesforce usernames, passwords, and session tokens — from compromised endpoints. Those stolen credentials were then used to authenticate to Amtrak's Salesforce instance as a legitimate user, allowing automated scripts to enumerate and exfiltrate records without exploiting any Salesforce vulnerability. The access appeared indistinguishable from normal authenticated activity, consistent with MITRE ATT&CK T1078 (Valid Accounts) and T1530 (Data from Cloud Storage).
How do I check if my Amtrak data was leaked?
Visit haveibeenpwned.com and enter your email address to check whether it appears in the Amtrak breach dataset. If your email is confirmed in HIBP, change your Amtrak account password immediately and enable any available two-factor authentication. Be alert for incoming emails that reference your travel history, specific booking details, or past support interactions — these are signs of targeted spear-phishing using data from the leaked support ticket contents.
What is ShinyHunters and how do they operate?
ShinyHunters is a financially motivated extortion group active since 2020, tracked by Google's Mandiant team as threat cluster UNC6661. Their playbook: acquire stolen credentials from infostealer markets or through voice phishing (vishing) campaigns impersonating IT support; authenticate to cloud platforms using those credentials; exfiltrate large datasets silently; demand ransom within 72–96 hours; and publish the data on their dark web leak site on deadline expiry. In 2026 alone the group has confirmed victims including McGraw Hill, Rockstar Games, Alert360, Hims & Hers, and the European Commission.
How does infostealer malware steal Salesforce credentials?
Infostealer malware — such as Lumma Stealer, Vidar, and Redline — runs silently inside browser environments on infected endpoints. It harvests credentials stored by browser password managers, active session cookies, and authentication tokens, including Salesforce login credentials and session artifacts. These are then sold on dark web credential markets or used directly by the attacker. Because the stolen credentials represent legitimate authenticated sessions, access to Salesforce appears normal to standard monitoring tools — there is no exploit to detect.
What should Amtrak passengers do right now?
Check haveibeenpwned.com for your email address. Change your Amtrak account password immediately, using a strong unique password not reused elsewhere. Enable multi-factor authentication on your Amtrak account if available. Treat any email referencing your booking history, travel plans, or past customer support interactions as a potential spear-phishing attempt. Report suspicious messages to Amtrak and your email provider without clicking any links. Consider placing a fraud alert or credit freeze if you submitted payment information through Amtrak's customer support.
How can organizations protect Salesforce from credential-based attacks?
Deploy phishing-resistant FIDO2/passkey MFA on all Salesforce accounts — push-based MFA is bypassed by ShinyHunters' real-time vishing kits. Enroll your corporate domain in dark web credential monitoring services (Flare, SpyCloud) to detect infostealer-harvested credentials before attackers use them. Enable Salesforce Event Monitoring for anomalous bulk data access patterns. Restrict Salesforce access from known VPN and proxy exit nodes. Conduct regular infostealer sweeps across employee endpoints using EDR tooling configured to detect credential-harvesting behavior.
Sources & references
- Cybernews — Hackers threaten to leak over 9M Amtrak records, including personal info
- The Railway Supply — Amtrak data breach enters HIBP after leak claim
- SC Media — Amtrak allegedly breached by ShinyHunters, massive data leak threatened
- NetCrook — ShinyHunters Threatens Amtrak with Massive Data Leak
- Yazoul — Amtrak Ransomware Claim by ShinyHunters (April 2026)
- Google Cloud / Mandiant — Tracking the Expansion of ShinyHunters-Branded SaaS Data Theft
- Cybernews — Shiny Hunters hits Alert 360, leaks 2.5M records after ransom talks fail
- BleepingComputer — ShinyHunters claim hacks of Okta, Microsoft SSO accounts for data theft
- Rescana — McGraw-Hill Salesforce Data Breach 2026: Analysis of ShinyHunters Extortion
Critical CVE Reference Card 2025–2026
25 actively exploited vulnerabilities — CVSS scores, exploit status, and patch availability. The reference card your SOC team needs, free with your newsletter subscription.
No spam. Unsubscribe anytime.
Get threat intel before your inbox does.
50,000+ security professionals read Decryption Digest for early warnings on zero-days, ransomware, and nation-state campaigns. Free, weekly, no spam.
Unsubscribe anytime. We never sell your data.

Founder & Cybersecurity Evangelist, Decryption Digest
Cybersecurity professional with expertise in threat intelligence, vulnerability research, and enterprise security. Covers zero-days, ransomware, and nation-state operations for 50,000+ security professionals weekly.
