ShinyHunters Hit Medtronic and ADT: 14.5M Records Stolen via AI Vishing and Salesforce
ShinyHunters stole 9 million records from Medtronic and 5.5 million records from ADT in a single week — and the same attack chain is actively targeting your Salesforce environment right now. The financially motivated data extortion group confirmed both victims on April 27, 2026, using AI-powered voice phishing to bypass multi-factor authentication before pivoting through compromised Okta SSO accounts into Salesforce to exfiltrate bulk customer and corporate data at scale.
This is not a one-off breach. ShinyHunters has broken into over 400 organizations in 2026 alone, operating the same repeatable kill chain: AI-generated vishing calls impersonating IT helpdesk → Okta credential or session token theft → lateral movement into Salesforce Experience Cloud → bulk record export using a weaponized version of a legitimate auditing tool. The group's extortion model is pure data theft — no ransomware encryption, no operational disruption — which means traditional backup-based defenses offer no protection.
The ShinyHunters Medtronic ADT breach week represents a clear escalation in the group's targeting of critical sectors. Medical device companies hold terabytes of patient PII and corporate IP. Home security firms hold residential addresses, alarm codes, and physical security data for millions of households. The intelligence value of this data — for targeted fraud, social engineering, and physical security bypass — extends well beyond a ransom payment. Your organization is in ShinyHunters' crosshairs if it runs Salesforce Experience Cloud, authenticates via Okta SSO, or has not yet hardened its MFA against AI voice phishing.
How ShinyHunters Breached Medtronic and ADT Using the Same Attack Chain
The ShinyHunters attack chain that hit both Medtronic and ADT follows a documented three-stage sequence that has now been used against hundreds of enterprise targets in 2026.
In the ADT breach — the most fully disclosed of the two — ShinyHunters initiated a voice phishing call to an ADT employee on April 20, 2026, impersonating IT helpdesk staff and requesting MFA credential validation. The employee surrendered their Okta single sign-on credentials. Attackers used those credentials to authenticate into ADT's Salesforce Customer Relationship Management instance and exported customer records containing names, phone numbers, and addresses for the vast majority of victims, with a smaller subset also exposing dates of birth and partial SSN or Tax ID data. ADT detected and terminated the intrusion but confirmed the exfiltration. ShinyHunters set an April 27 ransom deadline and, after it expired, began threatening data publication.
The Medtronic breach followed the same pattern. ShinyHunters listed Medtronic on its dark web extortion site on April 18, issued a three-day ransom negotiation deadline on April 21, and confirmed the theft of over 9 million records and terabytes of internal corporate data. Medtronic disclosed on April 27 that its corporate IT systems had been accessed, confirming that hospital customer networks and medical device systems remained separate and unaffected. The group later removed Medtronic from the leak site, suggesting negotiations may have progressed.
Both breaches are consistent with ShinyHunters' documented use of AI-powered vishing platforms — Bland AI and Vapi — to automate social engineering calls at scale, as analyzed by EclecticIQ's threat intelligence team. The AI voice platforms generate realistic helpdesk impersonations that are difficult to distinguish from legitimate IT calls, making employee training against traditional phishing insufficient. Organizations relying on push-based MFA (Okta Verify, Microsoft Authenticator) rather than phishing-resistant FIDO2 keys are structurally vulnerable to this technique.
AI Vishing — Automated Voice Call Targets Helpdesk or Admin
ShinyHunters uses Bland AI or Vapi to generate a realistic IT helpdesk voice call to a target employee. The script presents a fake login anomaly or MFA reset scenario, creating urgency to surrender credentials or approve an MFA push notification.
Okta SSO Compromise — Session Token or Credential Captured
The target employee approves an MFA push or provides credentials. ShinyHunters captures the Okta session token or authentication material, gaining access to all applications connected to the victim's SSO identity — including Salesforce, Microsoft 365, and AWS.
Salesforce Pivot — Access to Experience Cloud or CRM
Using the compromised SSO session, attackers authenticate into the victim organization's Salesforce instance. They identify high-value objects — customer records, PII tables, corporate data — accessible via the compromised account or misconfigured guest user permissions.
Bulk Exfiltration — AuraInspector Tool Extracts Records at Scale
ShinyHunters deploys a modified version of AuraInspector to enumerate and extract Salesforce records via the /s/sfsites/aura API endpoint. The tool bundles up to 250 Aura actions per POST request and uses cursor-based pagination to systematically extract millions of records with minimal API rate-limit resistance.
Extortion — Pay or Leak Deadline Set on Dark Web Site
ShinyHunters lists the victim on its dark web extortion portal, publishes a data sample as proof, and sets a ransom deadline (typically 3–7 days). Demands range from six to eight figures. If the deadline passes without payment, data is leaked publicly or sold to other threat actors.
Which Sectors Is ShinyHunters Actively Targeting in 2026?
ShinyHunters does not limit its targeting to a single sector — the group attacks any organization with a Salesforce or cloud SaaS footprint and Okta SSO authentication. However, the 2026 campaign shows clear concentration in sectors holding high-value PII at scale.
Healthcare and medical technology represent the most alarming vector. The Medtronic breach demonstrates that even highly regulated organizations with strict data governance are vulnerable when cloud application authentication relies on push-based MFA. Nine million records from a medical device company exposes patient relationships, implanted device data, and clinical trial information — categories with significant downstream fraud and social engineering value beyond a ransom transaction.
Home security and physical infrastructure represent a distinct risk category. The ADT breach exposed residential addresses cross-referenced with home security system ownership — a dataset with obvious value for physical crime planning. This is ADT's third breach in approximately eight months, signaling a persistent targeting pattern rather than opportunistic compromise.
The retail, gaming, and education sectors have seen the highest raw victim counts. ShinyHunters breached Rockstar Games (claiming 80 million records), Udemy (1.4 million records), Zara, 7-Eleven, Carnival Corporation, and Amtrak — all via the same Salesforce and SSO attack chain documented in our [Amtrak ShinyHunters Salesforce breach analysis](/blog/amtrak-shinyhunters-salesforce-breach-9-million-records). Telecom remains the highest-value single target: the $65 million ransom demand against Telus Digital for 1 petabyte of data represents the most aggressive extortion demand the group has issued.
The common thread across all 400+ victims is not sector — it is technology stack. Salesforce Experience Cloud with misconfigured guest user permissions, combined with Okta SSO without phishing-resistant MFA, is the attack surface ShinyHunters has systematically weaponized throughout 2026.
The AI Vishing Playbook: How ShinyHunters Bypasses MFA at Scale
Traditional phishing awareness training has almost no defensive value against ShinyHunters' AI vishing technique — and that is by design. The group uses AI-powered voice call platforms, specifically Bland AI and Vapi, to generate realistic, context-aware helpdesk impersonations that operate at a scale and realism no human calling operation could match.
The ShinyHunters vishing playbook follows a documented pattern analyzed by EclecticIQ. Calls begin with a calm, cooperative tone and a plausible IT scenario — a reported login anomaly, a suspicious access alert, a mandatory MFA re-enrollment. The caller knows the target's name, sometimes their role, and the name of their organization's IT system — information scraped from LinkedIn, previous breach data, or the victim company's public Salesforce portal. This specificity creates the illusion of legitimacy that generic phishing lacks.
The call gradually escalates from benign requests (confirming a username) to sensitive ones (approving an MFA push notification, providing a one-time code, or installing a remote management tool). Employees who recognize phishing emails often fail to apply the same skepticism to a professional-sounding phone call from someone who already knows their name and employer.
The AI automation is the force multiplier. A single ShinyHunters operator can run hundreds of concurrent vishing calls using these platforms, targeting employee lists across multiple organizations simultaneously. The marginal cost per call approaches zero. This transforms vishing from a targeted, labor-intensive attack into a scalable mass-campaign technique that makes every employee in a Salesforce-connected organization a potential entry point.
Push-based MFA — Okta Verify, Microsoft Authenticator, Google Authenticator — provides no protection against vishing. An employee tricked into approving an MFA push has fully authenticated the attacker. Only phishing-resistant FIDO2 hardware keys (YubiKey, Google Titan) cryptographically bind the authentication to the legitimate origin domain, making the credential useless on an attacker's device regardless of employee action.
“ShinyHunters abuses legitimate AI-powered voice call platforms such as Vapi and Bland to automate social engineering calls at scale — beginning with a calm, cooperative tone and a fake IT help scenario, then escalating to requests for MFA approval or remote tool installation.”
— EclecticIQ Threat Intelligence — ShinyHunters Calling, April 2026
Salesforce AuraInspector Exploit: How ShinyHunters Extracts Millions of Records
The Salesforce exploitation phase of the ShinyHunters attack chain is technically sophisticated and targets a misconfiguration that affects a significant proportion of Salesforce Experience Cloud deployments — organizations that built customer-facing portals without correctly restricting guest user access to backend data objects.
Salesforce Experience Cloud portals that give guest users overly permissive access to Apex controllers or SOQL-accessible record objects expose those records to unauthenticated or minimally authenticated API calls via the Aura framework's /s/sfsites/aura endpoint. ShinyHunters identified this misconfiguration pattern at scale by weaponizing AuraInspector — a legitimate open-source security auditing tool released in January 2026 to help Salesforce administrators find exposed guest configurations — and modifying it for automated mass-scanning and exfiltration.
The technical exfiltration method uses 'boxcar bundling': ShinyHunters bundles up to 250 Salesforce Aura server-side actions into a single POST request to the /s/sfsites/aura endpoint. This dramatically reduces the number of API calls required to extract large datasets, bypassing Salesforce's standard query volume limits. The group further exploits the sortBy parameter in Salesforce's GraphQL API to bypass the default 2,000-record result cap, and uses Base64-encoded cursor tokens in the after parameter to paginate through millions of records systematically.
This technique requires no account credentials when the misconfiguration exists — it exploits guest user permissions that the Salesforce administrator has failed to restrict. This is why phishing-resistant MFA, while critical, is not sufficient protection on its own: organizations with misconfigured Salesforce guest permissions can be breached without any credential compromise at all. The full ShinyHunters Salesforce exploitation methodology, including the McGraw-Hill breach where 45 million records were exfiltrated, was documented in our earlier analysis of the [ShinyHunters McGraw-Hill Salesforce breach](/blog/shinyhunters-mcgraw-hill-salesforce-breach-45-million).
ShinyHunters IOCs: Signs Your Organization Is Under Active Attack
ShinyHunters leaves a consistent set of network, application, and behavioral indicators that security teams can hunt for across their environments. Detection should be layered across identity, cloud application, and network telemetry simultaneously.
| Artifact | Type | SHA-256 (Truncated) |
|---|---|---|
| 191.96.207.179 | IP Address | ShinyHunters infrastructure — flag any authentication or data access events originating from this IP in Okta, Salesforce, or cloud application logs |
| 196.251.83.162 | IP Address | ShinyHunters infrastructure — correlated with vishing campaign infrastructure by EclecticIQ, April 2026 |
| 163.5.210.210 | IP Address | ShinyHunters exfiltration infrastructure — associated with bulk Salesforce API data extraction activity |
| 94.156.167.237 | IP Address | ShinyHunters phishing and C2 infrastructure — monitor for DNS or connection events |
| bless-invite.com | Phishing Domain | ShinyHunters phishing domain used for SSO credential harvesting — block at DNS/proxy layer |
| get-carrot-zoom.com | Phishing Domain | ShinyHunters domain used to spoof Zoom authentication pages for credential capture |
| modernatx-zoom.com | Phishing Domain | ShinyHunters domain impersonating Moderna/Zoom — used in healthcare sector targeting campaigns |
| recurly-zoom.com | Phishing Domain | ShinyHunters domain mimicking Recurly/Zoom for payment platform credential theft |
| Bulk Salesforce API calls from single session — /s/sfsites/aura endpoint | Cloud Behavior | Flag POST requests to /s/sfsites/aura exceeding 50 requests per minute from a single authenticated or guest session — ShinyHunters exfiltration signature |
| Okta new MFA enrollment outside business hours | Identity Behavior | ShinyHunters registers new MFA device after vishing — alert on any MFA enrollment not initiated via IT helpdesk ticket |
Any instance of msimg32.dll found outside C:\Windows\System32 is an active IOC. Isolate the host immediately. Full hashes and IOC lists are available via the Cisco Talos GitHub repository.
How to Defend Against ShinyHunters' Active Campaign Right Now
The ShinyHunters attack chain has two distinct entry points — vishing-based MFA bypass and Salesforce misconfiguration — requiring parallel defensive action. Neither control alone is sufficient.
Replace push-based MFA with FIDO2 phishing-resistant keys on all privileged accounts
Deploy FIDO2 hardware security keys (YubiKey, Google Titan) for all Okta, Salesforce, Microsoft 365, and AWS administrators. FIDO2 cryptographically binds authentication to the legitimate origin domain — an AI vishing call cannot trick an employee into approving a FIDO2 authentication on an attacker's device because the key will reject the origin mismatch. This is the single most impactful control against the ShinyHunters vishing attack chain.
Audit and restrict Salesforce Experience Cloud guest user permissions immediately
Run AuraInspector against your Salesforce instance to identify Apex controllers and SOQL-accessible objects reachable by guest users. Remove all unnecessary guest user permissions. Restrict the /s/sfsites/aura endpoint to authenticated sessions only. Apply IP-based access restrictions to Salesforce Connected Apps to limit access to known corporate IP ranges. Salesforce's Experience Cloud hardening guide provides step-by-step configuration for each control.
Enable Salesforce Transaction Security Policies to alert on bulk exports
Configure Salesforce Transaction Security to generate real-time alerts when any single session queries more than 500 records in a short window or submits more than 50 API calls per minute to the Aura endpoint. These thresholds catch the AuraInspector bulk exfiltration pattern before significant data leaves the environment. Salesforce Transaction Security is available on Enterprise and Unlimited editions at no additional cost.
Implement Okta callback verification policy for all helpdesk interactions
Require all Okta MFA resets and new device enrollments to be initiated exclusively via a verified IT helpdesk ticket, not via inbound phone calls. Publish a clear policy to employees: your IT team will never call you to approve an MFA push or request your credentials. Train staff to hang up on any caller requesting authentication actions and call back through the verified internal helpdesk number.
Block ShinyHunters infrastructure at DNS and network perimeter
Add the confirmed ShinyHunters IPs (191.96.207.179, 196.251.83.162, 163.5.210.210, 94.156.167.237) and phishing domains (bless-invite.com, get-carrot-zoom.com, modernatx-zoom.com, recurly-zoom.com) to your DNS blocklist and perimeter firewall deny rules. While ShinyHunters rotates infrastructure, blocking known indicators disrupts active operations and buys time for higher-confidence controls to be implemented.
Run AI voice phishing simulations with your helpdesk and IT admin teams
Commission or run AI-generated vishing simulations targeting your IT helpdesk staff specifically — the population most likely to receive and act on ShinyHunters impersonation calls. Standard phishing email simulations do not exercise voice social engineering resistance. Vendors including Proofpoint, KnowBe4, and Hoxhunt now offer AI voice phishing simulations. Track and remediate failure rates quarterly.
Why the ShinyHunters Medtronic Breach Matters Beyond the Headline
The ShinyHunters Medtronic data breach is significant beyond its record count. Medtronic manufactures implanted cardiac devices, insulin pumps, neurostimulators, and surgical robotics — and its corporate IT systems contain customer relationships, patient enrollment data from clinical studies, and device configuration data linked to individual patients.
Data at this intersection of identity and medical device history has downstream fraud implications that extend well beyond typical PII breach scenarios. Social engineering attacks leveraging knowledge of a patient's implanted device type or clinical trial participation can bypass security questions, manipulate healthcare interactions, and facilitate insurance fraud. The data retains value for years.
The broader implication for healthcare security teams is that ShinyHunters' pure-exfiltration model — no ransomware encryption, no operational disruption — means healthcare organizations' traditional continuity planning provides zero defensive value. You will not know you have been breached until ShinyHunters announces it. By then, the data is already gone. Detection and prevention must shift to identity telemetry monitoring, Salesforce API anomaly detection, and hardened MFA — not backup verification.
The bottom line
ShinyHunters stole 14.5 million records from Medtronic and ADT in one week using AI vishing and Salesforce misconfigurations that remain unpatched across hundreds of organizations right now. The three actions that will stop this attack chain: replace push-based MFA with FIDO2 keys on every privileged account today, run AuraInspector against your Salesforce Experience Cloud instance this week, and enable Salesforce Transaction Security Policies to catch bulk exports before they complete. If you run Salesforce and Okta, you are in ShinyHunters' target list — act before they announce you.
Frequently asked questions
What is ShinyHunters?
ShinyHunters is a financially motivated cybercrime and data extortion group active since 2020, operating under the 'pay or we leak your data' model. The group, led by the ShinyCorp persona, primarily targets enterprise cloud applications — Salesforce, Okta, Microsoft 365, and Amazon S3 — using AI-powered voice phishing to bypass MFA on privileged accounts. In 2026, ShinyHunters has breached over 400 organizations and is actively developing its own ransomware-as-a-service platform.
How did ShinyHunters breach Medtronic?
Medtronic confirmed on April 27, 2026 that ShinyHunters breached its corporate IT systems, claiming theft of over 9 million records including PII and terabytes of internal data. The attack vector was not fully disclosed, but ShinyHunters' documented method — AI vishing to compromise an Okta SSO account, then pivoting to Salesforce — is consistent with the group's other April 2026 campaigns. Medtronic stated no patient safety or medical device systems were affected; the breach was limited to corporate IT.
How did ShinyHunters breach ADT?
ADT disclosed on April 24, 2026 that ShinyHunters breached its systems on April 20 by voice-phishing an employee into surrendering their Okta single sign-on credentials. Attackers then accessed ADT's Salesforce instance and exfiltrated customer records including names, phone numbers, addresses, and in some cases dates of birth and partial SSN/Tax IDs. ShinyHunters claimed over 10 million records stolen and set an April 27 ransom deadline. ADT confirmed customer security systems and payment data were not compromised.
How does ShinyHunters use AI for vishing attacks?
ShinyHunters uses AI-powered voice call platforms — specifically Bland AI and Vapi — to automate social engineering calls at scale. The platforms generate realistic human-sounding voices that impersonate IT helpdesk staff, presenting fake login issues or MFA resets. Calls typically begin calmly and escalate to requests to approve MFA prompts or install remote management tools. The AI automation lets ShinyHunters run hundreds of concurrent vishing attempts, dramatically lowering the cost and skill barrier for large-scale credential theft.
How does ShinyHunters exploit Salesforce Experience Cloud?
ShinyHunters weaponized a modified version of AuraInspector — a legitimate Salesforce security auditing tool — to mass-scan the internet for misconfigured Salesforce Experience Cloud portals where guest users have access to more data than intended. Attackers target the /s/sfsites/aura API endpoint, then use boxcar bundling (up to 250 Aura actions per POST request) to extract records without authentication. The group claims to have breached 300–400 organizations this way since September 2025.
How do I check if my Salesforce is vulnerable to ShinyHunters?
Run the legitimate AuraInspector tool against your own Salesforce Experience Cloud instance to audit guest user permissions. Check whether your Experience Cloud guest user profile can access Apex controllers, SOQL queries, or record fields that should be restricted. Specifically audit the /s/sfsites/aura endpoint and review all Aura components exposed to unauthenticated users. Salesforce has published a hardening guide for Experience Cloud guest user permissions; ensure 'Guest User Sharing Rules' follow the principle of least privilege.
How do I protect my organization against ShinyHunters right now?
Five immediate actions: (1) Enable FIDO2 phishing-resistant MFA on all Okta and Salesforce admin accounts — AI vishing cannot bypass hardware keys. (2) Audit Salesforce Experience Cloud guest user permissions and restrict the /s/sfsites/aura endpoint. (3) Implement IP allowlisting on Salesforce connected apps. (4) Run vishing simulations including AI voice scenarios with your IT helpdesk team. (5) Monitor for bulk Salesforce API exports using Transaction Security Policies that alert on large record downloads.
Which sectors is ShinyHunters targeting in 2026?
ShinyHunters has breached organizations across healthcare (Medtronic, 9M records), home security (ADT, 5.5M records), gaming (Rockstar Games, 80M records claimed), education (Udemy, 1.4M records), telecom (Telus Digital, 1PB claimed), and retail (Zara, 7-Eleven, Carnival). The common thread is heavy Salesforce and cloud SaaS adoption combined with Okta SSO — making any mid-to-large enterprise a viable target regardless of sector.
Sources & references
- BleepingComputer — Medtronic confirms breach after hackers claim 9 million records theft
- BleepingComputer — ADT confirms data breach after ShinyHunters leak threat
- EclecticIQ — ShinyHunters Calling: Financially Motivated Data Extortion Group Targeting Enterprise Cloud Applications
- BleepingComputer — ShinyHunters claims ongoing Salesforce Aura data theft attacks
- The Hacker News — Threat Actors Mass-Scan Salesforce Experience Cloud via Modified AuraInspector Tool
- Cybernews — ShinyHunters dumps data tied to Mytheresa, Zara, Carnival, 7-Eleven in ransomware spree
Free resources
Critical CVE Reference Card 2025–2026
25 actively exploited vulnerabilities — CVSS scores, exploit status, and patch availability. Print it, pin it, share it with your SOC team.
Get the cheat sheet →Ransomware Incident Response Playbook
Step-by-step 24-hour IR checklist — detection, containment, eradication, and recovery. Built for SOC teams, IR leads, and CISOs.
Get the playbook →Get threat intel before your inbox does.
50,000+ security professionals read Decryption Digest for early warnings on zero-days, ransomware, and nation-state campaigns. Free, weekly, no spam.
Unsubscribe anytime. We never sell your data.

Founder & Cybersecurity Evangelist, Decryption Digest
Cybersecurity professional with expertise in threat intelligence, vulnerability research, and enterprise security. Covers zero-days, ransomware, and nation-state operations for 50,000+ security professionals weekly.
