سامي
سامي الغامدي
مستشار Fyntralink · متاح الآن
مدعوم بالذكاء الاصطناعي · Fyntralink

ShinyHunters Vishing-to-Salesforce Attack Chain: What SAMA Banks Must Know

ShinyHunters breached 500K+ Salesforce records via vishing and OAuth hijacking. Saudi financial institutions face the same attack pattern — here's how to defend under SAMA CSCC and NCA ECC.

F
FyntraLink Team

A single phone call compromised over 500,000 Salesforce records at global real estate giant Cushman & Wakefield this month. The attacker was ShinyHunters — and their repeatable vishing-to-OAuth-hijack playbook poses a direct threat to every SAMA-regulated institution running Salesforce CRM or third-party SaaS integrations.

How ShinyHunters Weaponized Voice Phishing Against Enterprise SaaS

On May 1, 2026, ShinyHunters executed a vishing (voice phishing) attack against Cushman & Wakefield employees. Unlike traditional email phishing, vishing bypasses email security gateways, DMARC enforcement, and sandbox analysis entirely. The attackers impersonated internal IT staff or a trusted vendor, convincing a target employee to hand over credentials or approve an OAuth consent flow. Once inside, ShinyHunters pivoted to Salesforce-connected third-party integrations and hijacked OAuth tokens — gaining persistent, credential-independent access to the company's entire Salesforce environment.

The stolen dataset totalled approximately 50 GB covering more than 500,000 records containing PII, internal corporate data, and client information. When ransom negotiations collapsed by May 6, ShinyHunters dumped the full dataset publicly, and a second ransomware group — Qilin — also listed Cushman & Wakefield on its leak site, compounding reputational and legal exposure.

The OAuth Token Hijack: A Repeatable Attack Pattern

What makes this incident particularly alarming is ShinyHunters' acknowledgment that this is a refined, repeatable method. The attack chain follows a predictable sequence: initial access via vishing, credential or session token theft, enumeration of connected OAuth apps within Salesforce, hijack of third-party integration tokens, and bulk exfiltration of CRM data through legitimate API calls that evade traditional DLP controls.

OAuth tokens are especially dangerous because they persist beyond password resets. Unless the compromised tokens are explicitly revoked and the connected apps are audited, attackers maintain silent access even after the initial breach is contained. Many organizations discover months later that exfiltration continued through a forgotten third-party connector.

Why SAMA-Regulated Financial Institutions Are Prime Targets

Saudi banks, insurance companies, and fintech firms under SAMA supervision rely heavily on Salesforce and similar CRM platforms for customer relationship management, onboarding workflows, and regulatory reporting. These environments store sensitive customer PII — national ID numbers, financial records, contact details — making them high-value targets under Saudi Arabia's Personal Data Protection Law (PDPL).

SAMA's Cyber Security Framework (CSCC) mandates controls around third-party risk management (Domain 3.3), identity and access management (Domain 3.4), and data loss prevention (Domain 3.7). An OAuth token compromise of the type ShinyHunters executed would violate multiple CSCC sub-controls simultaneously, particularly those requiring monitoring of third-party API access and enforcement of least-privilege principles on SaaS integrations.

Additionally, the NCA Essential Cybersecurity Controls (ECC) require organizations to implement controls against social engineering attacks (ECC 2-6) and to maintain continuous monitoring of external connections and data flows (ECC 2-13). A vishing attack that bypasses all technical email controls exposes gaps in the human-layer security that both SAMA and NCA frameworks explicitly address.

Five Defensive Measures for Saudi Financial Institutions

  1. Conduct vishing simulation exercises quarterly. Most Saudi financial institutions run email phishing simulations but neglect voice-based social engineering. SAMA CSCC Domain 3.2 (Security Awareness) requires training that covers all social engineering vectors — not just email. Engage a specialized provider to test helpdesk, IT support, and executive assistant roles via realistic vishing scenarios.
  2. Audit and restrict Salesforce Connected Apps and OAuth scopes. Enumerate every OAuth-connected application in your Salesforce environment today. Remove any that are unused or that hold excessive API permissions. Enforce the principle of least privilege: no third-party app should have full-object read access unless operationally justified and documented.
  3. Implement OAuth token monitoring and anomaly detection. Deploy Salesforce Shield Event Monitoring or a third-party CASB to detect abnormal API call volumes, off-hours data exports, and access from unfamiliar IP ranges or geolocations. Pipe these alerts into your SOC with playbooks that trigger immediate token revocation upon anomaly confirmation.
  4. Enforce phishing-resistant MFA across all SaaS platforms. Hardware security keys (FIDO2/WebAuthn) are the only MFA method that cannot be bypassed through vishing or real-time phishing proxies like Evilginx. SMS and TOTP codes can be socially engineered during a live call — exactly the vector ShinyHunters exploits. PCI-DSS v4.0 Requirement 8.4.2 now mandates phishing-resistant authentication for all access to the cardholder data environment.
  5. Establish a SaaS-specific incident response playbook. Your IR plan likely covers endpoint compromise and network intrusion, but does it address OAuth token revocation, Salesforce session invalidation, connected app quarantine, and API log forensics? Build and rehearse a SaaS-specific IR playbook that maps directly to SAMA CSCC Domain 3.9 (Incident Management) requirements.

Conclusion

The ShinyHunters attack on Cushman & Wakefield is not an isolated incident — it is a blueprint. The combination of vishing and OAuth token hijacking represents a mature, scalable attack methodology that specifically targets the trust relationships between employees, SaaS platforms, and third-party integrations. For SAMA-regulated institutions holding millions of customer records in Salesforce and similar platforms, the question is not whether this attack pattern will reach the Saudi financial sector, but when.

Is your organization prepared? Contact Fyntralink for a complimentary SAMA Cyber Maturity Assessment covering SaaS security posture, OAuth governance, and social engineering resilience.