Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity NewswireCybersecurity News

McGraw Hill Data Breach Caused by Salesforce Misconfiguration

By Jordyn Alger, Managing Editor
Student desks in a room
Allen Y via Unsplash
April 15, 2026

McGraw Hill announced a breach of its data, stating the incident was connected to a Salesforce database misconfiguration. This data breach has been claimed by the cybercriminal group known as ShinyHunters, who claimed to have taken 45 million records and threatened to release them if the organization doesn't meet their demands. 

Pete Luban, Field CISO at AttackIQ, remarks, “This most recent attack lines up with the recent uptick in activity seen from ShinyHunters, where ‘breaking in’ is often less about exotic malware and more about abusing the messy state of modern environments. ShinyHunters have taken advantage of this reality to conduct similar successful campaigns against Rockstar Games and the European Commission in just the last couple of weeks, exploiting cloud environments to gain access and exfiltrate data. The business model is the same, and so are the results: move fast, grab data, and monetize through extortion pressure.

“ShinyHunters keeps winning where identity, configuration, and third-party controls are treated like set-and-forget tasks. Organizations need to protect their environments with the understanding that modern attackers can use vulnerabilities in any part of a cybersecurity ecosystem to launch attacks and cause chaos. ShinyHunters’ playbooks should be treated as testable, not theoretical. Validating defenses against realistic abuse paths can help security teams identify where gaps in security lie, and patch them in order to prevent outsider access and data exfiltration, rather than just alerting after the fact.”

Upon discovery of the incident, McGraw Hill secured the impacted webpages and launched an investigation.

“This activity appears to be part of a broader issue involving a misconfiguration within Salesforce’s environment that has impacted multiple organizations that work with Salesforce,” a spokesperson for McGraw Hill stated. “Importantly, this did not involve unauthorized access to McGraw Hill’s Salesforce accounts, customer databases, courseware, or internal systems.”

A Salesforce spokesperson said there is no evidence the platform was compromised or that the incident was caused by a known vulnerability of the platform. 

Upon reviewing the impacted data, the organization determined it was limited to non-sensitive information. At this time, it is unknown how many were impacted by this breach. 

Ross Filipek, CISO at Corsica Technologies, remarks, “McGraw-Hill says attackers abused a Salesforce misconfiguration to access a limited, “non-sensitive” dataset, while ShinyHunters is publicly claiming far more, including tens of millions of Salesforce records with personally identifiable information. In an education context, even “boring” CRM-style data can be rocket fuel: staff and faculty directories, emails, roles, support case notes, school or district identifiers, and contact records can be stitched into high-confidence phishing and account-takeover campaigns.

“ShinyHunters has no shortage of options for potential follow-up campaigns. They can target instructors with convincingly branded messages, pivot into downstream tools, and even impersonate trusted contacts to push payment redirection or harvest credentials. For students and families, the fallout can range from identity fraud attempts to harassment and doxxing, plus the quieter, longer-term damage of having educational affiliation and contact details circulating in criminal markets.

“This situation feels eerily familiar. Last year’s PowerSchool breach demonstrated how attackers can monetize education data at scale through extortion. Both attacks exploited weak points in SaaS configurations and pressured the victims through a leak website with the goal of being paid a hefty ransom. Educational institutions and learning platforms should tighten their third-party and contractor access with least privilege access controls and strong multi-factor authentication. Further, they should back that up with centralized, continuously managed monitoring and response plus automated configuration and vulnerability governance to eliminate risky access paths and ensure misconfigurations are identified, prioritized, and remediated quickly, before attackers can turn them into leverage.”

McGraw Hill has stated it is working alongside Salesforce to strengthen security and address the issue. 

KEYWORDS: cybercrime data breach data protection

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jordynalger

Jordyn Alger is the managing editor for Security magazine. Alger writes for topics such as physical security and cyber security and publishes online news stories about leaders in the security industry. She is also responsible for multimedia content and social media posts. Alger graduated in 2021 with a BA in English – Specialization in Writing from the University of Michigan. Image courtesy of Alger

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Top Cybersecurity Leaders
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Police lights

Security Team Member Dies in Standoff with Dallas Police

Man walking with briefcase

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Four people in suits

Mexico Security Crisis: Never Waste a Crisis

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 15, 2026

How AI is Closing the Decision Gap in Leading GSOCs

Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.

April 21, 2026

The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • Gavel and block

    Data breach costs: Geico and Travelers fined $11.3M by New York State

    See More
  • Computer and laptop

    1.1M Impacted by Farmers Insurance Data Breach, Security Leaders Discuss

    See More
  • Silhouette of woman at computer

    Data breach victims increased by 490% since the first half of 2023

    See More

Related Products

See More Products
  • 9780128147948.jpg

    Effective Security Management, 7th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing