Hackers Stole Google Business Data and Are Using It for Scams
Others are reading now
Online scams and cyberattacks are becoming more common every year. Hackers are finding new ways to trick people, and sometimes even the biggest companies in the world are caught off guard.
The latest case involves Google, which confirmed that criminals managed to get access to data stored on a Salesforce platform earlier this summer.
Skilled Hackers
The breach happened in June and was carried out by a group of hackers connected to ShinyHunters, known for running voice phishing campaigns, reports El Economista.
These criminals often pretend to be technical support workers. They call employees at large companies and convince them to hand over their login details.
After getting the credentials, they use them to dig into databases. In some cases, they contact the victims again and demand money.
Also read
Google said that one of its Salesforce databases was compromised in this way. The database stored information about small and medium-sized businesses that use Google services.
According to the company, no passwords or financial information were taken. What the hackers got was basic contact and business data.
While that type of information may not sound serious, it is now being used to target people with scams.
Messages That Look Like They Come From Google
Reports suggest that over 2.5 billion email addresses are at risk. Cybercriminals are sending fake messages that look like they come from Google.
In these emails, they warn about supposed account problems or security breaches. The goal is to trick people into handing over their real Google passwords.
Also read
Security experts say that even simple information can be dangerous in the wrong hands.
With a name, an email address, and a convincing story, hackers can pressure someone into giving away sensitive details. That is why scams like these can spread so quickly.
Google has advised users to stay cautious. People should never share verification codes with anyone.
Suspicious emails or calls should be treated with care, especially if they create a sense of urgency.
Enabling two-factor authentication is also strongly recommended, as it adds a layer of security that makes accounts much harder to break into.
Also read
This case shows how a single breach can ripple out and put millions of people at risk, even if the stolen information seems harmless at first glance.