What information was compromised in the Workday data breach?
Commonly available business contact information, such as names, email addresses, and phone numbers.
News / Security
Human resources giant Workday has disclosed a data breach affecting a third-party customer relationship management (CRM) platform. Attackers accessed business contact information, potentially for use in social engineering scams. This incide...
Workday, a major HR technology provider, disclosed that it was targeted in a social engineering campaign that compromised a third-party CRM platform. The attackers gained access to commonly available business contact information, such as names, email addresses, and phone numbers. Workday has stated that there is no indication that customer tenant data was accessed.
This incident is believed to be part of a broader campaign by the ShinyHunters extortion group, which is known for targeting Salesforce CRM instances through social engineering and voice phishing attacks. The attackers trick employees into linking malicious OAuth apps to their company's Salesforce instances, allowing them to download and steal databases. Other high-profile companies, including Adidas, Qantas, Allianz Life, Louis Vuitton, Dior, Tiffany & Co., Chanel, and Google, have also been affected.
**How to Prepare:**
**Who This Affects Most:**
Commonly available business contact information, such as names, email addresses, and phone numbers.
Workday says there is no indication of access to customer tenants or the data within them.
The attack is believed to be linked to the ShinyHunters extortion group.
Do you think this trend of attacks targeting CRM platforms will continue? Let us know!
Share this article with others who need to stay ahead of this trend!
This article was compiled by Yanuki using publicly available data and trending information. The content may summarize or reference third-party sources that have not been independently verified. While we aim to provide timely and accurate insights, the information presented may be incomplete or outdated.
All content is provided for general informational purposes only and does not constitute financial, legal, or professional advice. Yanuki makes no representations or warranties regarding the reliability or completeness of the information.
This article may include links to external sources for further context. These links are provided for convenience only and do not imply endorsement.
Always do your own research (DYOR) before making any decisions based on the information presented.