Close Menu
The Politics
    What's Hot

    Hobart Hurricanes Academy v Northern Territory Strike

    August 16, 2025

    Tilly Corteen-Coleman's four downs Rockets

    August 16, 2025

    'Show off more' – Conrad tell his players after last-over defeat in final T20I

    August 16, 2025
    Facebook X (Twitter) Instagram
    • Demos
    • Politics
    • Buy Now
    Facebook X (Twitter) Instagram
    The Politics
    Subscribe
    Saturday, August 16
    • Home
    • Breaking
    • World
      • Africa
      • Americas
      • Asia Pacific
      • Europe
    • Sports
    • Politics
    • Business
    • Entertainment
    • Health
    • Tech
    • Weather
    The Politics
    Home»Tech»ShinyHunters breach Google using voice phishing attack
    Tech

    ShinyHunters breach Google using voice phishing attack

    Justin M. LarsonBy Justin M. LarsonAugust 16, 2025No Comments7 Mins Read
    Share Facebook Twitter Pinterest Copy Link LinkedIn Tumblr Email VKontakte Telegram
    Share
    Facebook Twitter Pinterest Email Copy Link


    NEWYou can now listen to Fox News articles!

    When a hospital or nonprofit falls victim to a cyberattack, it’s hard to place blame. Cybersecurity isn’t their strength, and many lack the budget for a dedicated security team, let alone a chief technology officer.

    But when a tech giant like Google experiences a data breach, it raises serious questions. Is data security slipping down the company’s priority list? Or are today’s cybercriminals so advanced that even Google’s top engineers are struggling to keep up?

    Here’s what happened: Google recently confirmed that hackers stole customer data by breaching one of its internal databases. The breach targeted a system that used Salesforce, a popular cloud-based platform companies use to manage customer relationships, store business contact information and track interactions. The attack has been linked to a known threat group.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER

    DIOR DATA BREACH EXPOSES US CUSTOMERS’ PERSONAL INFORMATION

    google hackers 1

    A Google sign on the side of a building (Kurt “CyberGuy” Knutsson)

    What you need to know about Google data breach

    Google has confirmed that a hacking group known as ShinyHunters stole customer data from one of its internal Salesforce databases used to manage business client relationships. The company disclosed the breach in a blog post published in early August, noting that the stolen data included “basic and largely publicly available business information, such as business names and contact details.”

    WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

    The breach was carried out by ShinyHunters, a well-known cybercriminal group formally tracked as UNC6040. The group has recently been linked to a string of high-profile incidents involving companies such as AT&T, Ticketmaster, Allianz Life and Pandora. In this case, the attackers targeted Google’s corporate Salesforce system, which the company uses to store contact information and notes about small and medium-sized businesses.

    According to Google’s Threat Intelligence Group, the attackers relied on voice phishing, or “vishing,” impersonating company employees in phone calls to IT support and persuading them to reset login credentials. This technique has proven effective against multiple organizations in recent months.

    google hackers 2

    A man using the Google search engine on his laptop   (Kurt “CyberGuy” Knutsson)

    No company is safe from cyberattacks

    Google did not specify how many customers were affected by the breach. When asked for comment, a company spokesperson pointed CyberGuy back to the blog post and declined to elaborate. It is also unclear whether Google has received any sort of ransom demand from the group.

    Cisco, Qantas and Pandora have all reported similar breaches in recent months, which now appear to be part of a broader campaign targeting cloud-based customer relationship management tools.

    In its blog post, Google warned that ShinyHunters may be preparing a public leak site. Ransomware gangs often use this tactic to extort companies, threatening to publish stolen data. The group reportedly shares infrastructure and personnel with other cybercriminal collectives, including The Com, which runs extortion campaigns and has, in some cases, issued threats of physical violence. 

    google hackers 3

    Google search engine (Kurt “CyberGuy” Knutsson)

    9 ways to stay safe from voice phishing and social engineering attacks

    While organizations like Google may be prime targets, individuals are often the weakest link that attackers exploit. But with a few smart practices, you can dramatically reduce your risk.

    1. Never share login credentials over the phone

    The Google breach happened because employees gave up sensitive information over a phone call. No legitimate IT team will ever ask you to share your password or 2FA codes over the phone. If someone does, it’s a major red flag.

    2. Always verify who’s calling

    If someone claims to be from your company’s IT department or a service provider, hang up and call back using an official number. Never trust the number displayed on caller ID.

    3. Enable two-factor authentication (2FA)

    Even if credentials are compromised, two-factor authentication (2FA) can block unauthorized access by adding an extra layer of security. It ensures that a password alone isn’t enough to break into your accounts.

    GET FOX BUSINESS ON THE GO BY CLICKING HERE

    4. Beware of phishing links too

    Phishing emails and messages often include links that take you to fake websites designed to steal your login credentials or personal information. These messages usually create a sense of urgency, asking you to verify an account, reset a password or claim a reward. Instead of clicking the link, take a moment to inspect the message.

    The best way to safeguard yourself from malicious links is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at CyberGuy.com/LockUpYourTech

    5. Use a data removal service

    Attackers are able to carry out phishing, smishing and vishing attacks because your personal data is readily available online. The less of it that’s publicly accessible, the harder it becomes for them to craft convincing scams.

    While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/Delete

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan

    6. Keep your software and browsers up to date

    Attackers often exploit outdated software with known vulnerabilities. Make sure your operating system, browsers, plugins and apps are always running the latest version. Enable auto updates wherever possible to avoid missing critical patches.

    7. Use a password manager with phishing detection

    A good password manager doesn’t just store strong, unique passwords; it can also alert you if you’re on a suspicious site. If your password manager refuses to autofill your login, it could mean the site is fake.

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com/Passwords

    8. Monitor your accounts for unusual activity

    If you suspect a breach, watch your accounts for unauthorized logins, password reset emails or other suspicious behavior. Set up alerts when possible. Many online services offer login notifications or dashboards that show recent access history.

    9. Report phishing attempts

    If you receive a vishing or phishing attempt, report it to your organization’s IT/security team or the appropriate government agency (like reportfraud.ftc.gov in the U.S.). Reporting helps shut down these scams faster and can protect others.

    CLICK HERE TO GET THE FOX NEWS APP

    Kurt’s key takeaway

    While the data exposed in Google’s case may be limited, the breach highlights a persistent vulnerability in corporate systems: people. ShinyHunters seems to be getting more effective at exploiting that weakness. What’s even more concerning is the rise of vishing, also known as voice phishing. Vishing isn’t new, but its growing success shows just how fragile even well-defended systems can be when human error is involved.

    How confident are you in your company’s cybersecurity awareness training? Let us know by writing to us at Cyberguy.com/Contact

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER 

    Copyright 2025 CyberGuy.com.  All rights reserved.  

    Kurt “CyberGuy” Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on “FOX & Friends.” Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.



    Source link

    Related

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Telegram Copy Link
    Justin M. Larson
    • Website

    Related Posts

    Tech

    Trump admin unveils groundbreaking tool ‘supercharging’ gov’t efficiency in AI

    August 16, 2025
    Tech

    Scientists recycle cigarette butts into stronger asphalt for roads

    August 16, 2025
    Tech

    Google Gemini hacked by Mozilla researchers to hide phishing prompts

    August 15, 2025
    Tech

    At least 176 dead after flash floods hit India and Pakistan | World News

    August 15, 2025
    Tech

    Dubai’s Woohoo restaurant uses AI Chef Aiman to design futuristic menu

    August 15, 2025
    Tech

    Steves & Sons partners with Bot Auto for driverless freight in Texas

    August 14, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    • Africa
    • Americas
    • Asia Pacific
    • Breaking
    • Business
    • Economy
    • Entertainment
    • Europe
    • Health
    • Politics
    • Politics
    • Sports
    • Tech
    • Top Featured
    • Trending Posts
    • Weather
    • World
    Economy News

    Hobart Hurricanes Academy v Northern Territory Strike

    Justin M. LarsonAugust 16, 20250

    Hobart Hurricanes Academy v Northern Territory Strike Source link

    Tilly Corteen-Coleman's four downs Rockets

    August 16, 2025

    'Show off more' – Conrad tell his players after last-over defeat in final T20I

    August 16, 2025
    Top Trending

    Hobart Hurricanes Academy v Northern Territory Strike

    Justin M. LarsonAugust 16, 20250

    Hobart Hurricanes Academy v Northern Territory Strike Source link

    Tilly Corteen-Coleman's four downs Rockets

    Justin M. LarsonAugust 16, 20250

    Left-arm spinner removed half of the top six as Brave triumphed to…

    'Show off more' – Conrad tell his players after last-over defeat in final T20I

    Justin M. LarsonAugust 16, 20250

    “Sometimes we can be too humble. We don’t show off to the…

    Subscribe to News

    Get the latest sports news from NewsSite about world, sports and politics.

    Advertisement
    Demo
    Editors Picks

    Review: Record Shares of Voters Turned Out for 2020 election

    January 11, 2021

    EU: ‘Addiction’ to Social Media Causing Conspiracy Theories

    January 11, 2021

    World’s Most Advanced Oil Rig Commissioned at ONGC Well

    January 11, 2021

    Melbourne: All Refugees Held in Hotel Detention to be Released

    January 11, 2021
    Latest Posts

    Queen Elizabeth the Last! Monarchy Faces Fresh Demand to be Axed

    January 20, 2021

    Review: Russia’s Putin Sets Out Conditions for Peace Talks with Ukraine

    January 20, 2021

    Review: Implications of San Francisco Govts’ Green-Light Nation’s First City-Run Public Bank

    January 20, 2021
    Advertisement
    Demo
    Editors Picks

    Hobart Hurricanes Academy v Northern Territory Strike

    August 16, 2025

    Tilly Corteen-Coleman's four downs Rockets

    August 16, 2025

    'Show off more' – Conrad tell his players after last-over defeat in final T20I

    August 16, 2025

    Brandon Blackstock’s Secret Romance With Kelly Clarkson’s Ex-Assistant Exposed: Report

    August 16, 2025
    Latest Posts

    Queen Elizabeth the Last! Monarchy Faces Fresh Demand to be Axed

    January 20, 2021

    Review: Russia’s Putin Sets Out Conditions for Peace Talks with Ukraine

    January 20, 2021

    Review: Implications of San Francisco Govts’ Green-Light Nation’s First City-Run Public Bank

    January 20, 2021
    Advertisement
    Demo
    Facebook X (Twitter) Pinterest Vimeo WhatsApp TikTok Instagram

    News

    • World
    • US Politics
    • EU Politics
    • Business
    • Opinions
    • Connections
    • Science

    Company

    • Information
    • Advertising
    • Classified Ads
    • Contact Info
    • Do Not Sell Data
    • GDPR Policy
    • Media Kits

    Services

    • Subscriptions
    • Customer Support
    • Bulk Packages
    • Newsletters
    • Sponsored News
    • Work With Us

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    © 2025 The Politics Designed by The Politics.
    • Privacy Policy
    • Terms
    • Accessibility

    Type above and press Enter to search. Press Esc to cancel.