Human assets large Workday has disclosed a data breach after attackers gained entry to a third-party buyer relationship administration (CRM) platform in a current social engineering assault.
Headquartered in Pleasanton, California, Workday has over 19,300 staff in places of work throughout North America, EMEA, and APJ. Workday’s buyer listing includes over 11,000 organizations throughout a various vary of industries, together with greater than 60% of the Fortune 500 corporations.
As the corporate revealed in a Friday weblog, the attackers gained entry to a few of the info saved on the compromised CRM techniques, including that no buyer tenants have been impacted.
“We need to let you already know a couple of current social engineering marketing campaign focusing on many giant organizations, together with Workday,” the HR large mentioned.
“We not too long ago recognized that Workday had been focused and risk actors have been in a position to entry some info from our third-party CRM platform. There is no such thing as a indication of entry to buyer tenants or the information inside them.”
Nonetheless, some enterprise contact info was uncovered within the incident, together with buyer knowledge that might be utilized in subsequent assaults.
“The kind of info the actor obtained was primarily generally out there enterprise contact info, like names, electronic mail addresses, and cellphone numbers, doubtlessly to additional their social engineering scams,” it added.
In a separate notification despatched to doubtlessly affected prospects and seen by BleepingComputer, the corporate added that the breach was found virtually two weeks in the past, on August 6.
Workday added that the attackers contact staff by way of textual content or cellphone, pretending to be from Human Sources or IT, in an try and trick them into revealing account entry or private info.
Salesforce data-theft assaults
Whereas Workday did not instantly verify it, the one “current social engineering marketing campaign focusing on many giant organizations” is a wave of security breaches linked to the ShinyHunters extortion group, which targets Salesforce CRM situations by social engineering and voice phishing assaults.
A number of different high-profile corporations worldwide have been additionally not too long ago breached on this marketing campaign, together with Adidas, Qantas, Allianz Life, Louis Vuitton, Dior, Tiffany & Co., Chanel, and, most not too long ago, Google.
These assaults are believed to have begun initially of the yr, with the risk actors tricking the targets’ staff into linking a malicious OAuth app to their firm’s Salesforce situations by social engineering assaults.
As soon as linked, the attackers use the connection to obtain and steal the businesses’ databases, with the stolen knowledge later getting used to extort the victims by way of electronic mail.
The extortion calls for have been signed as coming from ShinyHunters, a infamous extortion group linked to quite a few high-profile assaults over time, together with the Snowflake assaults and people in opposition to AT&T and PowerSchool.
Workday did not reply to a request for remark when BleepingComputer reached out earlier at present.
46% of environments had passwords cracked, almost doubling from 25% final yr.
Get the Picus Blue Report 2025 now for a complete take a look at extra findings on prevention, detection, and knowledge exfiltration developments.




