Insurance giant Allianz Life disclosed a data breach affecting approximately 2.8 million records after threat actors compromised a Salesforce-hosted CRM system through social engineering on July 16, 2025. The attack has been attributed to a collaboration between Scattered Spider and ShinyHunters, who are conducting a broader campaign targeting Salesforce instances across major enterprises.

Incident overview

AttributeDetails
VictimAllianz Life Insurance Company
Records exposed2.8 million
Unique email addresses1.1 million
Attack vectorSalesforce OAuth social engineering
Threat actorsScattered Spider + ShinyHunters (UNC6040)
Third-party platformSalesforce CRM
Detection time~24 hours
Campaign scope91 organizations claimed

Timeline

DateEvent
July 16, 2025Threat actor gains unauthorized access via social engineering
July 17, 2025Allianz security teams detect intrusion, begin containment
August 2025ShinyHunters leaks stolen Salesforce databases
January 2026Public disclosure; class action lawsuit filed
January 2026Have I Been Pwned adds dataset

The breach was detected within 24 hours—fast by industry standards—but the attackers had already exfiltrated the complete CRM database.

What was exposed

The leaked files include complete Salesforce “Accounts” and “Contacts” database tables:

Personal data

Data TypeAffected
NamesYes
AddressesYes
Phone numbersYes
Dates of birthYes
Social Security numbersYes
Tax identification numbersYes
Email addresses1.1 million unique

Professional data

Data TypeAffected
Professional licensesYes
Firm affiliationsYes
Product approvalsYes
Marketing classificationsYes
Business partner recordsYes

Have I Been Pwned analysis found 72% of exposed email addresses already appeared in prior breaches—common for business professionals who frequently appear in corporate data sets.

What was NOT compromised

Allianz confirmed its internal IT and policy administration systems were not affected:

SystemStatus
Internal IT systemsNot compromised
Policy administrationNot compromised
Claims systemsNot compromised
Customer login credentialsNot compromised
Investment account detailsNot compromised

The breach was limited to the third-party Salesforce CRM environment.

Attack methodology

Threat actor collaboration

ShinyHunters told BleepingComputer that “ShinyHunters and Scattered Spider are now one and the same”:

“They provide us with initial access and we conduct the dump and exfiltration of the Salesforce CRM instances. Just like we did with Snowflake.”

The attack chain

PhaseAction
1. ReconnaissanceIdentify target employees with Salesforce access
2. Social engineeringVoice phishing (vishing) and helpdesk impersonation
3. OAuth exploitationConvince employees to authorize malicious “Connected Apps”
4. Token captureCapture OAuth tokens that bypass MFA controls
5. API accessUse Salesforce API with legitimate tokens
6. Data exfiltrationExport large volumes of CRM data via API

The attackers didn’t exploit technical vulnerabilities in Salesforce itself—they exploited human trust and OAuth’s design to gain legitimate API access.

Why OAuth bypass is effective

FactorImpact
MFA bypassOAuth tokens work without additional MFA
Legitimate accessAPI calls appear authorized
PersistenceTokens remain valid until revoked
Detection difficultyNormal-looking API activity

Part of a larger campaign

The Allianz breach is one incident in a coordinated campaign targeting enterprise Salesforce instances. In ransom messages, the threat actors claimed the campaign had compromised data from 91 organizations worldwide.

Known campaign targets

TargetIndustryStatus
Google (corporate Salesforce)TechnologyClaimed
QantasAirlinesConfirmed
Allianz LifeInsuranceConfirmed
LVMHLuxury goodsClaimed
ChanelLuxury goodsClaimed
CartierLuxury goodsClaimed
Tiffany & Co.Luxury goodsClaimed
Louis VuittonLuxury goodsClaimed
DiorLuxury goodsClaimed
WorkdayEnterprise softwareClaimed
AdidasRetailClaimed
CiscoTechnologyClaimed
Air France/KLMAirlinesClaimed
PandoraJewelryClaimed

The same Scattered Spider + ShinyHunters collaboration is behind these attacks, using consistent social engineering techniques across targets.

Threat actor profile

Scattered Spider + ShinyHunters merger

AttributeDetails
Also tracked asUNC6040, UNC3944
SpecializationSocial engineering, vishing, helpdesk impersonation
TechniqueOAuth token capture, SSO abuse
MonetizationData theft, extortion, dark web sales
Previous campaignsSnowflake (165+ organizations), MGM, Caesars

ScatteredLapsuSp1d3rHunters channel

The groups created a Telegram channel called “ScatteredLapsuSp1d3rHunters” to taunt cybersecurity researchers, law enforcement, and journalists while claiming credit for high-profile breaches.

This collaboration mirrors the 2024 Snowflake campaign, where the same threat actors compromised over 165 organizations by stealing credentials and bypassing MFA through social engineering.

A class action lawsuit was filed against Allianz Life alleging:

AllegationDetails
Failure to protect dataInadequate safeguards for customer information
NIST non-compliancePractices fell short of Cybersecurity Framework standards
CIS Controls failureNon-compliance with Critical Security Controls
Delayed notificationInsufficient timely notice to affected individuals

The lawsuit seeks damages, restitution, and court-ordered improvements to Allianz’s data security systems.

Allianz’s response

ActionDetails
Law enforcement notificationFBI and regulatory authorities informed
Credit monitoringTwo years free identity theft restoration and monitoring
Internal reviewSecurity assessment underway
ContainmentBreach contained within 24 hours of detection

Risk assessment for affected individuals

SSN exposure severity

RiskLikelihoodMitigation
Identity theftHighCredit freeze, fraud alerts
Tax fraudHighIRS Identity Protection PIN
Account takeoverMediumMFA on all accounts
Targeted phishingHighVerify all communications

Professional data risks

RiskConcern
Business impersonationProfessional license data enables fraud
Targeted social engineeringFirm affiliations inform attack vectors
Competitive intelligenceBusiness relationships exposed

Recommendations

For organizations using Salesforce

PriorityAction
CriticalImplement phishing-resistant MFA (hardware keys, passkeys)
CriticalRequire admin approval for new OAuth app connections
HighMonitor for bulk data exports via API
HighTrain help desk staff on vishing tactics
HighAudit OAuth tokens regularly—revoke unnecessary Connected Apps
MediumImplement Salesforce Shield for enhanced monitoring

For affected individuals

PriorityAction
CriticalEnroll in offered credit monitoring
CriticalPlace fraud alerts or credit freezes (SSN exposure is serious)
HighRequest IRS Identity Protection PIN
HighWatch for targeted phishing using leaked professional information
OngoingMonitor financial accounts for unauthorized activity

Detection indicators

IndicatorMeaning
New OAuth Connected AppsPotential unauthorized access
Bulk API data exportsData exfiltration
Unusual login locationsCompromised credentials
Help desk impersonation reportsActive social engineering

Context

The Scattered Spider + ShinyHunters collaboration represents an evolution in cybercrime operations. By combining Scattered Spider’s social engineering expertise with ShinyHunters’ data exfiltration and monetization capabilities, the groups have created an efficient pipeline for compromising enterprise SaaS platforms.

The campaign’s success against 91 claimed organizations demonstrates that OAuth-based access and social engineering remain highly effective against enterprises with traditional security controls. Organizations should assume that sophisticated vishing attacks targeting help desks and OAuth abuse are now standard threats requiring dedicated defenses.

The Allianz breach specifically highlights the risks of third-party SaaS platforms holding sensitive customer data—even when an organization’s own systems remain secure, their data can be compromised through vendor relationships.