Site icon Cybercory

Air France & KLM Hit in Supply-Chain CRM Breach; ShinyHunters Behind Salesforce Attacks on Global Giants

Air France and KLM have confirmed that hackers accessed customer data via a third-party contact-center platform during the week of 28 July 2025, prompting regulator notifications. At the same time, the extortion-oriented ShinyHunters group (UNC6040) is behind recent social-engineering breaches of Salesforce CRM systems at Qantas, Allianz Life, LVMH and others – highlighting the sharp rise in supply-chain and human-centric cyber threats.

Why It Matters

This incident underscores persistent supply-chain vulnerabilities, especially in customer-facing systems managed by third-parties. For travelers across the MEA, Europe, and beyond, this serves as a warning of potential phishing risks exploiting even non-sensitive, but contextual, customer data.

Global CRM-Focused Campaign: ShinyHunters Strike Salesforce Users

Confirmed Activity

Extortion-Driven Tactics

Expert Insight

“ShinyHunters is exploiting human trust to hijack cloud CRM systems, not platform vulnerabilities,” explains GTIG leadership .
Cyber-threat analysts warn that social engineering remains the Achilles’ heel of even enterprise-grade SaaS platforms .

MEA Perspective & Broader Context

Actionable Takeaways for CISOs & Security Leaders

  1. Review and harden connected-app configurations in SaaS platforms to minimize abuse via OAuth.
  2. Implement strict identity-verification protocols before allowing staff to run IT support calls or access sensitive setup pages.
  3. Enable and monitor MFA and apply the principle of least privilege for SaaS and contact-center integrations.
  4. Conduct phishing and vishing awareness training, especially targeting customer-service and helpdesk teams.
  5. Audit third-party contact-center and CRM vendors, ensuring incident response plans include vendor systems.
  6. Establish Zero Trust practices for external-facing service systems across operations.
  7. Offer breach-response tools to affected users (e.g., identity monitoring), as done by Allianz Life.
  8. Prepare for phishing scams—attacks could leverage exposed contextual data.
  9. Coordinate with regulators proactively for cross-border data protection compliance.
  10. Review and tighten supply-chain security to reduce exposure through external service providers.

Conclusion

These incidents mark a turning point: cyber adversaries increasingly combine social engineering with supply-chain compromise to bypass advanced tech defenses. From Air France-KLM’s third-party leak to ShinyHunters’ Salesforce-powered extortions, the message is clear — the perimeter has shifted. Organizations must reinforce human and vendor risk controls to safeguard critical data assets and customer trust.

Sources

Exit mobile version