Wednesday, February 25, 2026
Cyber Safety Canada | Scam Shield Digest
  • Login
  • Register
  • Home
  • Latest Scam Alerts
  • Fraud Prevention News
    hacker in a dark room sitting in front of a monitor and keyboard from a side view

    Salesforce Extortion Threats: What Happened This Week & How to Protect Yourself

    lock and key as symbol for Privacy and General Data Protection Regulation on a notebook computer

    Passkeys Are Phishing-Resistant—But Not Magic: Where They Break in the Real World

    Portrait of young bearded computer programmer looking at camera near the computer monitor with software in dark office

    How Attackers Use Code Signing and Social Proof to Trick You — Why a Certificate Isn’t Enough

    Six young adult friends using smartphones and digital tablets in park

    What to Do If Apple Says You’ve Been Targeted by Spyware

    Male web designer working late at night

    3 Things You’ll Need Most If a Cyberattack Hits You

    What to Do if a DDoS Attack Disrupts Your Online Service

    What to Do if a DDoS Attack Disrupts Your Online Service

    Trending Tags

    • romance investment fraud Canada
    • crypto romance scam
    • Chinese State-Sponsored Hacking
  • Cybersecurity Trends
    hacker in a dark room sitting in front of a monitor and keyboard from a side view

    Salesforce Extortion Threats: What Happened This Week & How to Protect Yourself

    lock and key as symbol for Privacy and General Data Protection Regulation on a notebook computer

    Passkeys Are Phishing-Resistant—But Not Magic: Where They Break in the Real World

    Portrait of young bearded computer programmer looking at camera near the computer monitor with software in dark office

    How Attackers Use Code Signing and Social Proof to Trick You — Why a Certificate Isn’t Enough

    Six young adult friends using smartphones and digital tablets in park

    What to Do If Apple Says You’ve Been Targeted by Spyware

    Male web designer working late at night

    3 Things You’ll Need Most If a Cyberattack Hits You

    What to Do if a DDoS Attack Disrupts Your Online Service

    What to Do if a DDoS Attack Disrupts Your Online Service

    Above view of young social media marketers sitting on floor and using computers while analyzing marketing tools

    How to Review and Revoke Connected Apps in 2025: Complete Security Guide

    How the “Pig-Butchering” Crypto Romance Scam Works—And How to Protect Yourself

    senior women hand using smart phone close up

    Text Phishing Scam Costs Long Island Senior $15,000 — How Not to be a Victim

    Trending Tags

    • Nation-State Cyber Threats
    • China Telecom Hack
    • Chinese State-Sponsored Hacking
    • Salt Typhoon China Hack
  • Investment & Retirement Scams
    senior women hand using smart phone close up

    Text Phishing Scam Costs Long Island Senior $15,000 — How Not to be a Victim

    hacker in the shadows on their laptop that has a figure of a closed lock glowing on it. The background is a dark city scape that is raining with orange digital letters and numbers

    🚨 Orange Belgium Hack 2025: 850,000 Customers Impacted in SIM Data Breach – Protect Yourself

    African american photo designer retouching images next to green screen on dual screens in a tech driven environment, representing modern digital media. Male graphic artist uses software tools.

    Beware the Deepfake Investment Scam Surge: What Kiwis Must Know

    Cheerful senior couple enjoying a Ferris wheel by the Santa Monica pier

    🛑 How Scammers Target Your Retirement: Inside Pre-Approved Scams & New Tactics

    Trending Tags

    • protect retirement savings online
    • investment scam prevention
    • Nation-State Cyber Threats
    • romance investment fraud Canada
  • Protection Guides
No Result
View All Result
  • Home
  • Latest Scam Alerts
  • Fraud Prevention News
    hacker in a dark room sitting in front of a monitor and keyboard from a side view

    Salesforce Extortion Threats: What Happened This Week & How to Protect Yourself

    lock and key as symbol for Privacy and General Data Protection Regulation on a notebook computer

    Passkeys Are Phishing-Resistant—But Not Magic: Where They Break in the Real World

    Portrait of young bearded computer programmer looking at camera near the computer monitor with software in dark office

    How Attackers Use Code Signing and Social Proof to Trick You — Why a Certificate Isn’t Enough

    Six young adult friends using smartphones and digital tablets in park

    What to Do If Apple Says You’ve Been Targeted by Spyware

    Male web designer working late at night

    3 Things You’ll Need Most If a Cyberattack Hits You

    What to Do if a DDoS Attack Disrupts Your Online Service

    What to Do if a DDoS Attack Disrupts Your Online Service

    Trending Tags

    • romance investment fraud Canada
    • crypto romance scam
    • Chinese State-Sponsored Hacking
  • Cybersecurity Trends
    hacker in a dark room sitting in front of a monitor and keyboard from a side view

    Salesforce Extortion Threats: What Happened This Week & How to Protect Yourself

    lock and key as symbol for Privacy and General Data Protection Regulation on a notebook computer

    Passkeys Are Phishing-Resistant—But Not Magic: Where They Break in the Real World

    Portrait of young bearded computer programmer looking at camera near the computer monitor with software in dark office

    How Attackers Use Code Signing and Social Proof to Trick You — Why a Certificate Isn’t Enough

    Six young adult friends using smartphones and digital tablets in park

    What to Do If Apple Says You’ve Been Targeted by Spyware

    Male web designer working late at night

    3 Things You’ll Need Most If a Cyberattack Hits You

    What to Do if a DDoS Attack Disrupts Your Online Service

    What to Do if a DDoS Attack Disrupts Your Online Service

    Above view of young social media marketers sitting on floor and using computers while analyzing marketing tools

    How to Review and Revoke Connected Apps in 2025: Complete Security Guide

    How the “Pig-Butchering” Crypto Romance Scam Works—And How to Protect Yourself

    senior women hand using smart phone close up

    Text Phishing Scam Costs Long Island Senior $15,000 — How Not to be a Victim

    Trending Tags

    • Nation-State Cyber Threats
    • China Telecom Hack
    • Chinese State-Sponsored Hacking
    • Salt Typhoon China Hack
  • Investment & Retirement Scams
    senior women hand using smart phone close up

    Text Phishing Scam Costs Long Island Senior $15,000 — How Not to be a Victim

    hacker in the shadows on their laptop that has a figure of a closed lock glowing on it. The background is a dark city scape that is raining with orange digital letters and numbers

    🚨 Orange Belgium Hack 2025: 850,000 Customers Impacted in SIM Data Breach – Protect Yourself

    African american photo designer retouching images next to green screen on dual screens in a tech driven environment, representing modern digital media. Male graphic artist uses software tools.

    Beware the Deepfake Investment Scam Surge: What Kiwis Must Know

    Cheerful senior couple enjoying a Ferris wheel by the Santa Monica pier

    🛑 How Scammers Target Your Retirement: Inside Pre-Approved Scams & New Tactics

    Trending Tags

    • protect retirement savings online
    • investment scam prevention
    • Nation-State Cyber Threats
    • romance investment fraud Canada
  • Protection Guides
No Result
View All Result
Cyber Safety Canada | Scam Shield Digest
No Result
View All Result
Home Fraud Prevention News

Salesforce Extortion Threats: What Happened This Week & How to Protect Yourself

by Stacey
October 9, 2025
in Fraud Prevention News, Latest Scam Alerts, Ransomware & Extortion
Reading Time: 4 mins read
0 0
A A
0
hacker in a dark room sitting in front of a monitor and keyboard from a side view
0
SHARES
10
VIEWS
Share on FacebookShare on LinkedInShare on XShare on PinterestShare Via Email

Updated: October 9, 2025    ⏱️ Reading time: ~7 minutes

✅ TL;DR – Quick Action Items

  • Not a Salesforce core hack—criminals abused a connected app and stolen OAuth tokens last August.
  • Extortion site set public “leak” threats for early–mid October; expect phishing even if no data is posted.
  • Do now: turn on 2FA (email/airline/bank), place a credit freeze (U.S.), review & revoke stale connected apps, rotate reused passwords, and ignore refund/bonus‑miles links.

Table of Contents

  • What happened (plain English)
  • This week’s timeline
  • Who’s most affected (and why)
  • What to do now (5 steps)
  • FAQ
  • Sources

What happened (plain English)

Criminals are trying to pressure companies by threatening to publish customer data they say came from Salesforce customer environments. This is not a bug in Salesforce’s platform. In August, attackers abused a connected app that organizations had linked to Salesforce using OAuth (app tokens), then ran large data exports. This week they launched an extortion site and posted a deadline to force payment. Salesforce has told customers it will not negotiate or pay.

This week’s timeline

  1. Oct 3: Group claims mass theft of Salesforce‑related records and starts naming dozens of organizations.
  2. Oct 6–8: Leak/pressure site appears; outlets note a public “leak” deadline promoted by the group. Airlines (e.g., Qantas) issue warnings.
  3. Oct 7–9: Salesforce reiterates it will not pay; analysts emphasize the access came via a third‑party connected app (OAuth tokens), not Salesforce core.

Why this matters: Whether or not a leak happens, publicity triggers targeted phishing that reuses real details from customer records (names, loyalty numbers, past support issues).

Who’s most affected (and why)

  • Travelers & loyalty members: Expect “bonus miles” or “account lock” lures that look real and name your airline or status.
  • Customers who opened support tickets: Support text sometimes contains sensitive info (order numbers, even passwords/keys). Criminals mine that data for follow‑on attacks.
  • Anyone reusing passwords: If your email password equals your airline/shopping password, one compromise enables takeover.

What to do now (5 steps)

  1. Turn on 2‑factor authentication (2FA) for email, airline, bank, investing apps. Prefer an authenticator app over SMS. 🍏 Enable 2FA guides
  2. Freeze your credit (U.S.) or use the strongest bureau protections in Canada/Mexico. 🧊 Freeze how‑to • 🍁 Canada options • 🇲🇽 Mexico alerts
  3. Ignore “refund,” “rebooking,” and “bonus miles” links in email/text. Go to the brand’s app/site directly. 🎣 Spot travel phishing
  4. Review & revoke old connected‑app permissions for Google/Microsoft/Apple and social accounts; remove what you don’t use. 🧩 Revoke access guides
  5. Rotate reused passwords and turn on 2FA everywhere you can (password manager recommended). 🔒 Password manager help

FAQ

Was Salesforce itself hacked?
No. Current evidence points to abuse of a third‑party connected app and stolen OAuth tokens in August—not a Salesforce platform bug.

Why are airlines like Qantas mentioned?
Airlines hold valuable contact and loyalty data that can be reused in phishing. Legal steps may limit publication, but scams often follow the headlines.

Should I pay a “data deletion” fee if I’m contacted?
Never. That’s part of the scam. Stick to the steps above and watch for official notices posted on a company’s website (not links sent to you).

Sources

  • 📰 Salesforce won’t pay ransom (news search)
  • 📰 Qantas warnings & deadline (news search)
  • 🧪 Technical background on connected‑app/OAuth abuse
  • 🔐 Salesforce trust/advisory search

This guide is editorial, not legal advice.

Related Posts

  • Narrow Width
  • The businesswoman standing near the blue monitor
    Signs You Might Be a Hidden Victim of Brickstorm: Red Flags & What to Do If You Suspect It

  • Article Archive
  • Left Sidebar

  • Thank You

  • Grandparent Phone Scam: How to Spot and Stop It in Canada
  • Male web designer working late at night
    3 Things You’ll Need Most If a Cyberattack Hits You

  • Columns Block
Stacey

Stacey

Recommended

Communist China military personnel in a high tech government hacking room work on stealing state secrets from rival countries in hybrid war. Chinese communist criminals and army exploit advanced technology, inflict fear. Camera B.

Communist China’s Telecom Hack with Salt Typhoon That Shook the World

6 months ago
Six young adult friends using smartphones and digital tablets in park

What to Do If Apple Says You’ve Been Targeted by Spyware

5 months ago
Portrait of young bearded computer programmer looking at camera near the computer monitor with software in dark office

How Attackers Use Code Signing and Social Proof to Trick You — Why a Certificate Isn’t Enough

5 months ago

How the “Pig-Butchering” Crypto Romance Scam Works—And How to Protect Yourself

6 months ago
Chinese anonymous criminal recording himself asking for ransom, hacking intelligence systems and spreading false information, misleading. Autocracy communism doctrine in hybrid war.

⚠️ Top 5 Cyber Hacks of 2025 (So Far) — What You Need to Know to Stay Safe

8 months ago
What to Do if a DDoS Attack Disrupts Your Online Service

What to Do if a DDoS Attack Disrupts Your Online Service

5 months ago

Popular News

  • hacker in a dark room sitting in front of a monitor and keyboard from a side view

    Salesforce Extortion Threats: What Happened This Week & How to Protect Yourself

    0 shares
    Share 0 Tweet 0
  • Passkeys Are Phishing-Resistant—But Not Magic: Where They Break in the Real World

    0 shares
    Share 0 Tweet 0
  • Signs You Might Be a Hidden Victim of Brickstorm: Red Flags & What to Do If You Suspect It

    0 shares
    Share 0 Tweet 0
  • How Attackers Use Code Signing and Social Proof to Trick You — Why a Certificate Isn’t Enough

    0 shares
    Share 0 Tweet 0
  • What to Do if a DDoS Attack Disrupts Your Online Service

    0 shares
    Share 0 Tweet 0

Connect with us

Newsletter

Stay one step ahead of scammers. Get our free weekly ScamShield Digest with the latest alerts and simple safety tips for seniors and families.

Category

  • Critical Infrastructure Security
  • Cybersecurity Trends
  • Fraud Prevention News
  • Investment & Retirement Scams
  • Latest Scam Alerts
  • Nation State Cyber Threats
  • Protection Guides
  • Ransomware & Extortion
  • Romance & Dating Scams
  • Tech Support Scams
  • Telecommunications Security

About Us

ScamShield Digest is part of the Shield IT Training Foundation. We believe online safety is for everyone — especially seniors and families. Our blog, guides, and newsletter are here to inform, protect, and empower.

  • About
  • Advertise
  • Careers
  • Contact

© 2025 ScamShield Digest

Welcome Back!

OR

Login to your account below

Forgotten Password? Sign Up

Create New Account!

OR

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Home
  • Cybersecurity Trends
  • Latest Scam Alerts
  • Tech Support Scams
  • Romance & Dating Scams
  • Investment & Retirement Scams

© 2025 ScamShield Digest