Loading...
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

ShinyHunters Lists New Victims Including Zara, 7-Eleven, and Pitney Bowes in Alleged Data Release

ShinyHunters leak site listing alleged breaches of Carnival, Zara, 7-Eleven, and other companies with downloadable datasets
ShinyHunters leak site listing newly added victims, including Carnival, Zara, and 7-Eleven, with claimed data releases after failed negotiations.

The threat actor group ShinyHunters has allegedly released data tied to multiple organizations, including Carnival Corporation, Zara, 7-Eleven, Pitney Bowes, and others, marking a significant escalation in an ongoing extortion campaign linked to large-scale data theft operations. The latest post follows earlier breach claims and appears to represent a shift from listing victims to actively publishing datasets.

Multiple organizations added to expanding victim list

According to the group’s latest update, the affected organizations include Mytheresa, Zara, 7-Eleven, Carnival Corporation & plc, Pitney Bowes, and The Canada Life Assurance Company. Each listing is accompanied by claims that negotiations failed, prompting the release of allegedly stolen data.

The datasets are described as containing a mix of personally identifiable information, transactional records, and internal corporate data. In several cases, ShinyHunters specifically referenced Salesforce-related records, continuing a pattern observed across earlier campaigns tied to misconfigured cloud environments.

Carnival claim escalates from breach allegation to alleged data leak

The update builds on prior claims involving Carnival Corporation, where the group previously alleged the theft of millions of records. ShinyHunters now claims that data has been released after negotiations broke down. BreachNews previously reported on the initial Carnival breach claim involving approximately 8.7 million records, which had not been independently verified at the time of publication.

Carnival Corporation had not issued any public statement at time of publication regarding either the original claim or the alleged data release.

Salesforce data exposure pattern continues across new listings

Several of the newly listed organizations are associated with claims of compromised Salesforce environments. The actor alleges access to large volumes of records, including more than 25 million entries in one case and over 600,000 records in another. These datasets are described as containing customer information alongside internal business data.

The repeated reference to Salesforce aligns with a broader campaign that has been active since late 2025, in which threat actors have targeted misconfigured cloud environments to extract data at scale. Previous incidents attributed to ShinyHunters have similarly involved Salesforce datasets, often tied to guest access misconfigurations or exposed data interfaces.

In the case of Zara, the group attributed access to a third-party platform, though no technical evidence has been provided to support the claim or clarify the role of external systems in the alleged breach.

Extortion messaging follows established ShinyHunters pattern

The language used in the latest post closely mirrors prior extortion campaigns, with the group claiming that organizations were given multiple opportunities to negotiate before data was released. Similar messaging has been observed in earlier victim listings, where deadlines were set and followed by partial or full data publication.

A previous wave of listings covered by BreachNews included Amtrak, McGraw Hill, and Kemper Corporation, several of which were later followed by alleged data releases after deadlines passed. In at least some cases, datasets were published despite ongoing investigations or disputes over the scope of the breach.

Campaign scale and attribution remain difficult to verify

ShinyHunters has claimed responsibility for breaching hundreds of organizations as part of its broader campaign, though the accuracy of those figures remains unclear. The group has previously linked its activity to cloud misconfigurations rather than traditional intrusion techniques, focusing on accessible data rather than system compromise.

At this stage, none of the newly listed organizations have publicly confirmed the alleged breaches or data releases. As with earlier claims, verification remains limited to threat actor statements, and it is not yet known whether the datasets described are authentic, complete, or previously undisclosed.

Ongoing investigation and potential downstream risk

If the claims are accurate, the exposure of large volumes of customer and corporate data could introduce long-term risks, including targeted phishing campaigns, identity fraud, and follow-on attacks against affected organizations. Data tied to CRM systems is often structured and detailed, increasing its value in social engineering scenarios.

For a broader overview of the group’s activity and history, see the BreachNews profile on ShinyHunters.

Further developments are likely as affected organizations investigate the claims or as additional datasets are analyzed and verified.

Picture of m00s3c

m00s3c

Moose (@m00s3c) is the author of BreachNews, focusing on data breach intelligence, dark web monitoring, and threat analysis. His work involves analyzing breach claims, reviewing leaked datasets, and tracking threat actor activity to provide clear, factual reporting.

Related Posts

Newsletter signup

Get the latest data breach and security news.

Please wait...

Thank you for signing up!

Search & Monitoring Tools

Free Data Breach Search Tool

Check your email against 12 billion+ leaked records — then set up alerts so you're the first to know if you appear in a new breach.

Instant breach lookup
Real-time monitoring & alerts
12 billion+ leaked records
Check now Set up monitoring

Powered by BreachNews