ShinyHunters
Financially-motivated cybercrime collective active since April 2020, responsible for some of the largest data-theft and extortion incidents of the post-2020 era. Operationally blends credential-stuffing of cloud-data platforms (Snowflake in 2024, Salesforce in 2025-2026) with traditional database exfiltration. Notable victim list includes AT&T (70M wireless subscribers, 2021 theft / 2024 disclosure), Tokopedia, Microsoft GitHub, Pixlr, the 2024 Snowflake-customer wave (Ticketmaster, Santander, Neiman Marcus, Advance Auto Parts, Pure Storage, Cylance), and the 2026 Salesforce-customer wave (McGraw Hill, plus others). Operators arrested in France, Morocco, Turkey, and Canada — Sébastien Raoult sentenced to three years (2024); Connor Riley Moucka ('Judische') arrested Ontario Oct 2024; John Erin Binns arrested Turkey May 2024; four additional members arrested in France Jun 2025. Mandiant tracks the Snowflake-wave subset as UNC5537.
Aliases
Motivations
Target sectors
Target countries
Lineage & relationships
full graph →Diamond Model
Caltagirone / Pendergast / Betz 2013 — four-vertex attribution framework.
MITRE ATT&CK techniques
Timeline
3 events- CompromiseHigh2026-04-16·The Register
ShinyHunters extorts McGraw Hill via Salesforce misconfiguration
ShinyHunters leaked 13.5 million McGraw Hill user accounts after exploiting a misconfigured Salesforce-hosted webpage to extract internal data. The leak — totalling 100GB+ of PII across customer-account records — followed the same operational pattern as the group's mid-2024 Snowflake-customer wave: credential-replay or misconfiguration exploitation against a cloud-data platform, mass exfiltration, and public extortion via leak-forum posting. McGraw Hill is one of several confirmed 2026 Salesforce-platform victims; researchers assess the broader campaign as ongoing.
salesforcemisconfigurationextortioneducation - AnnouncementCritical2025-10-06·BleepingComputer
ShinyHunters launches 'Trinity of Chaos' Salesforce leak site, 39 victims listed
Operators self-styling as 'Scattered Lapsus$ Hunters' — an explicit cross-brand merger of ShinyHunters, Scattered Spider, and Lapsus$ — launched a Salesforce-themed data- leak site naming 39 victim companies and claiming 1B+ stolen records in aggregate. Confirmed names on the site included Disney/Hulu, Toyota, Adidas, FedEx, Marriott, Google, Cisco, McDonald's, Walgreens, Instacart, HBO Max, Cartier, Air France-KLM, IKEA, TransUnion (4.4M consumer records), and others. Initial access vectors split between malicious-OAuth-app social engineering and exploitation of misconfigured public-facing Salesforce sites. The U.S. government later seized the leak-site domain; victim additions continued through Q1 2026.
salesforceoauth-abuseextortionleak-sitebrand-merge - CompromiseCritical2024-05-30·Google Cloud / Mandiant
ShinyHunters / UNC5537 Snowflake-customer mass-extortion wave
Mandiant documented a sustained credential-stuffing campaign — tracked as UNC5537 with significant overlap to ShinyHunters — against Snowflake customer tenants lacking MFA. Credentials were harvested from prior infostealer infections on contractor and employee laptops, then replayed against ~165 Snowflake instances. The campaign produced the year's biggest data-breach headlines: Ticketmaster (560M records), Santander (30M customers across Spain / Chile / Uruguay), AT&T (call/SMS metadata for ~109M subscribers), Neiman Marcus, Advance Auto Parts, Pure Storage, and others. Alleged ringleader Connor Riley Moucka ('Judische') was arrested in Ontario on 30 October 2024.
credential-stuffingcloud-data-platformmass-extortioninfostealer-supply-chain
Indicators of compromise
3 indicators| Type | Value | First seen | Source |
|---|---|---|---|
| Name | family · ShinySp1d3r RaaS brand launched on a Scattered Lapsus$ Hunters Telegram channel in August 2025, marketed alongside the Trinity of Chaos data-leak site that went live on the TOR network on 3 October 2025 listing 39 Salesforce/Salesloft victims. | Aug 7, 2025 | Resecurity |
| IPv4 | Sample VPS exfiltration IP (ALEXHOST SRL, AS200019) used by UNC5537 to stage stolen Snowflake-customer data. Listed in Mandiant's June 2024 disclosure. | May 21, 2024 | Mandiant (Google Cloud) |
| Name | family · FROSTBITE Custom Snowflake reconnaissance utility (.NET and Java variants, attacker-named 'rapeflake') deployed by UNC5537 / ShinyHunters during the 2024 Snowflake-customer extortion campaign disclosed by Mandiant in June 2024. | Apr 13, 2024 | Mandiant (Google Cloud) |
Related actors
shared ATT&CK techniques- ?? · UnknownALPHV/BlackCat2 shared techniques
- RU · RussiaDarkSide2 shared techniques
- RU · RussiaINC Ransom2 shared techniques
- RU · Russia8Base1 shared technique
- ?? · UnknownAkira1 shared technique
- KP · DPRKAndariel1 shared technique
References
- ShinyHunters — WikipediaWikipedia (overview, well-sourced)
- UNC5537 Targets Snowflake Customer Instances for Data Theft and ExtortionGoogle Cloud / Mandiant · 2024-06-10
- Alleged Snowflake attacker gets 4 years for stealing data from 165 companies (Moucka indictment)U.S. Department of Justice · 2024-11-04
cite this page
Threat Intel Tracker. (2026-05-19). ShinyHunters — actor profile. Retrieved from https://threatintel.local/actors/shinyhunters