threatintel
actor tracker
All actors

ShinyHunters

shinyhunters · primary source: Other · first observed 2020
?? · UnknownCybercrimeHigh confidencelast cited Apr 15, 2026 · 1mo ago

Financially-motivated cybercrime collective active since April 2020, responsible for some of the largest data-theft and extortion incidents of the post-2020 era. Operationally blends credential-stuffing of cloud-data platforms (Snowflake in 2024, Salesforce in 2025-2026) with traditional database exfiltration. Notable victim list includes AT&T (70M wireless subscribers, 2021 theft / 2024 disclosure), Tokopedia, Microsoft GitHub, Pixlr, the 2024 Snowflake-customer wave (Ticketmaster, Santander, Neiman Marcus, Advance Auto Parts, Pure Storage, Cylance), and the 2026 Salesforce-customer wave (McGraw Hill, plus others). Operators arrested in France, Morocco, Turkey, and Canada — Sébastien Raoult sentenced to three years (2024); Connor Riley Moucka ('Judische') arrested Ontario Oct 2024; John Erin Binns arrested Turkey May 2024; four additional members arrested in France Jun 2025. Mandiant tracks the Snowflake-wave subset as UNC5537.

Aliases

ShinyCorpOtherUNC5537Mandiant

Motivations

financial gain

Target sectors

technologyfinancialeducationretailtelecommunications

Target countries

USGBESCLUYFRAUCA

Lineage & relationships

full graph →
Collaborates withShinyHuntersthis actorScattered Spi…??eCrime

Diamond Model

Caltagirone / Pendergast / Betz 2013 — four-vertex attribution framework.

Adversary
  • ShinyHunters
  • Unknown
  • financial gain
Infrastructure
  • 45.27.26.205
Victim
  • technology
  • financial
  • education
  • US
  • GB
  • +1 more

MITRE ATT&CK techniques

Timeline

3 events
  1. CompromiseHigh2026-04-16·The Register

    ShinyHunters extorts McGraw Hill via Salesforce misconfiguration

    ShinyHunters leaked 13.5 million McGraw Hill user accounts after exploiting a misconfigured Salesforce-hosted webpage to extract internal data. The leak — totalling 100GB+ of PII across customer-account records — followed the same operational pattern as the group's mid-2024 Snowflake-customer wave: credential-replay or misconfiguration exploitation against a cloud-data platform, mass exfiltration, and public extortion via leak-forum posting. McGraw Hill is one of several confirmed 2026 Salesforce-platform victims; researchers assess the broader campaign as ongoing.

    salesforcemisconfigurationextortioneducation
  2. AnnouncementCritical2025-10-06·BleepingComputer

    ShinyHunters launches 'Trinity of Chaos' Salesforce leak site, 39 victims listed

    Operators self-styling as 'Scattered Lapsus$ Hunters' — an explicit cross-brand merger of ShinyHunters, Scattered Spider, and Lapsus$ — launched a Salesforce-themed data- leak site naming 39 victim companies and claiming 1B+ stolen records in aggregate. Confirmed names on the site included Disney/Hulu, Toyota, Adidas, FedEx, Marriott, Google, Cisco, McDonald's, Walgreens, Instacart, HBO Max, Cartier, Air France-KLM, IKEA, TransUnion (4.4M consumer records), and others. Initial access vectors split between malicious-OAuth-app social engineering and exploitation of misconfigured public-facing Salesforce sites. The U.S. government later seized the leak-site domain; victim additions continued through Q1 2026.

    salesforceoauth-abuseextortionleak-sitebrand-merge
  3. CompromiseCritical2024-05-30·Google Cloud / Mandiant

    ShinyHunters / UNC5537 Snowflake-customer mass-extortion wave

    Mandiant documented a sustained credential-stuffing campaign — tracked as UNC5537 with significant overlap to ShinyHunters — against Snowflake customer tenants lacking MFA. Credentials were harvested from prior infostealer infections on contractor and employee laptops, then replayed against ~165 Snowflake instances. The campaign produced the year's biggest data-breach headlines: Ticketmaster (560M records), Santander (30M customers across Spain / Chile / Uruguay), AT&T (call/SMS metadata for ~109M subscribers), Neiman Marcus, Advance Auto Parts, Pure Storage, and others. Alleged ringleader Connor Riley Moucka ('Judische') was arrested in Ontario on 30 October 2024.

    credential-stuffingcloud-data-platformmass-extortioninfostealer-supply-chain

Indicators of compromise

3 indicators
csv
TypeValueFirst seenSource
Name
shinysp1d3r
family · ShinySp1d3r
RaaS brand launched on a Scattered Lapsus$ Hunters Telegram channel in August 2025, marketed alongside the Trinity of Chaos data-leak site that went live on the TOR network on 3 October 2025 listing 39 Salesforce/Salesloft victims.
Aug 7, 2025Resecurity
IPv4
45[.]27[.]26[.]205
Sample VPS exfiltration IP (ALEXHOST SRL, AS200019) used by UNC5537 to stage stolen Snowflake-customer data. Listed in Mandiant's June 2024 disclosure.
May 21, 2024Mandiant (Google Cloud)
Name
FROSTBITE
family · FROSTBITE
Custom Snowflake reconnaissance utility (.NET and Java variants, attacker-named 'rapeflake') deployed by UNC5537 / ShinyHunters during the 2024 Snowflake-customer extortion campaign disclosed by Mandiant in June 2024.
Apr 13, 2024Mandiant (Google Cloud)

Related actors

shared ATT&CK techniques

References

cite this page

Threat Intel Tracker. (2026-05-19). ShinyHunters — actor profile. Retrieved from https://threatintel.local/actors/shinyhunters

latest cited activity · 2026-04-16 · 3 cataloged indicators