ShinyHunters

ShinyHunters is a notorious data-theft and breach-focused group that rose to prominence in 2020 by leaking and selling millions of user records from companies worldwide.

Is Your Organization Safe from ShinyHunters Ransomware Attacks?

The Origin of ShinyHunters

Unlike ransomware groups, ShinyHunters does not encrypt systems. Instead, their operations focus on breaching networks, stealing data, and monetizing it via underground forums or Telegram channels. They have been linked to high-profile leaks from Microsoft’s GitHub repositories, Tokopedia, Tokopedia, Bonobos, and dozens of smaller organizations.

The group is known for high-volume breaches, with databases containing tens of millions of records regularly appearing on underground marketplaces. ShinyHunters’ operational style blends financial extortion, brand damage, and reputation building—making them a persistent threat to enterprises across multiple industries.

In August 2025, ShinyHunters entered into an operational partnership with LAPSUS$ and Scattered Spider, forming the extortionist collective Scattered LAPSUS$ Hunters. In this alliance, ShinyHunters provides a pipeline of massive stolen databases and breach infrastructure, complementing LAPSUS$’s public spectacle-driven extortion model and Scattered Spider’s sophisticated social engineering and SaaS intrusion skills. This collaboration expands ShinyHunters’ influence beyond underground markets into the mainstream media spotlight, allowing them to amplify ransom pressure and reputation damage while accelerating monetization.

Countries targeted by ShinyHunters

Global, with victims across:

  • United States
  • India & Southeast Asia
  • Europe (France, Germany, UK)
  • Latin America

Industries targeted by ShinyHunters

ShinyHunters’ breaches span a wide spectrum, typically focused on data-rich industries:

  • Retail & e-commerce (Tokopedia, Wattpad, Bonobos)
  • Technology & SaaS (Microsoft GitHub repositories)
  • Financial services (various fintech and banking-related databases)
  • Food & Beverage (home delivery platforms, restaurant apps)
  • Healthcare and consumer platforms with PII-rich datasets

Known Victims

  • GitHub: Stolen source code repositories
  • Tokopedia: 91M user records leaked
  • Wattpad: 270M records stolen and leaked
  • Bonobos: 7M customer records sold online
  • Numerous food delivery & e-commerce platforms globally
Attack Method

ShinyHunters' Attack Method

A shadowy figure casting a wide net over a digital landscape filled with various devices such as computers, smartphones, and tablets. The net symbolizes the attacker's attempts to find vulnerabilities or use phishing techniques to gain unauthorized access.

Exploits misconfigured applications, weak credentials, or acquires access via dark web brokers.

A digital ladder extending upwards from a basic user icon towards a crown symbolizing administrative privileges. This represents the attacker's efforts to gain higher-level access within the system.

Uses publicly available exploits or misconfigurations in web applications and databases.

A chameleon blending into a digital background, with zeroes and ones flowing around it. This represents the attacker's ability to avoid detection by security measures, changing tactics to blend in with normal network traffic.

Relies on stealth, often blending in with legitimate traffic or exploiting weak cloud security.

A thief with a lockpick toolkit working on a giant keyhole shaped like a login form, representing the attacker's efforts to steal user credentials to gain unauthorized access.

Targets GitHub, cloud storage, and internal databases; harvests user credentials.

A magnifying glass moving over a digital map of a network, highlighting files, folders, and network connections. This image represents the phase where attackers explore the environment to understand the structure and where valuable data resides.

Maps accessible databases and internal repositories.

A series of interconnected nodes with a shadowy figure moving stealthily between them. This illustrates the attacker's movements within the network, seeking to gain control of additional systems or spread malware.

Expands access from web apps into backend databases and code repositories.

A large vacuum sucking up files, data icons, and folders into a bag held by a shadowy figure. This image symbolizes the process of gathering valuable data from the target network.

Exfiltrates large-scale datasets containing PII, financial information, and source code.

A command prompt window open in front of a digital background, with malicious code being typed out. This represents the phase where attackers execute their malicious payload within the compromised system.

Executes simple data extraction scripts and automated crawlers to maximize data theft.

A series of files being funneled through a covert channel out of a computer to a cloud labeled with a skull, symbolizing the unauthorized transfer of data to a location controlled by the attacker.

Transfers stolen datasets to underground forums and Telegram channels.

A cracked screen with a digital cityscape in chaos behind it, symbolizing the destructive impact of the cyberattack, such as service disruption, data destruction, or financial loss.

Causes reputational damage via mass leaks, extortion attempts, and the sale of data dumps.

A shadowy figure casting a wide net over a digital landscape filled with various devices such as computers, smartphones, and tablets. The net symbolizes the attacker's attempts to find vulnerabilities or use phishing techniques to gain unauthorized access.
Initial Access

Exploits misconfigured applications, weak credentials, or acquires access via dark web brokers.

A digital ladder extending upwards from a basic user icon towards a crown symbolizing administrative privileges. This represents the attacker's efforts to gain higher-level access within the system.
Privilege Escalation

Uses publicly available exploits or misconfigurations in web applications and databases.

A chameleon blending into a digital background, with zeroes and ones flowing around it. This represents the attacker's ability to avoid detection by security measures, changing tactics to blend in with normal network traffic.
Defense Evasion

Relies on stealth, often blending in with legitimate traffic or exploiting weak cloud security.

A thief with a lockpick toolkit working on a giant keyhole shaped like a login form, representing the attacker's efforts to steal user credentials to gain unauthorized access.
Credential Access

Targets GitHub, cloud storage, and internal databases; harvests user credentials.

A magnifying glass moving over a digital map of a network, highlighting files, folders, and network connections. This image represents the phase where attackers explore the environment to understand the structure and where valuable data resides.
Discovery

Maps accessible databases and internal repositories.

A series of interconnected nodes with a shadowy figure moving stealthily between them. This illustrates the attacker's movements within the network, seeking to gain control of additional systems or spread malware.
Lateral Movement

Expands access from web apps into backend databases and code repositories.

A large vacuum sucking up files, data icons, and folders into a bag held by a shadowy figure. This image symbolizes the process of gathering valuable data from the target network.
Collection

Exfiltrates large-scale datasets containing PII, financial information, and source code.

A command prompt window open in front of a digital background, with malicious code being typed out. This represents the phase where attackers execute their malicious payload within the compromised system.
Execution

Executes simple data extraction scripts and automated crawlers to maximize data theft.

A series of files being funneled through a covert channel out of a computer to a cloud labeled with a skull, symbolizing the unauthorized transfer of data to a location controlled by the attacker.
Exfiltration

Transfers stolen datasets to underground forums and Telegram channels.

A cracked screen with a digital cityscape in chaos behind it, symbolizing the destructive impact of the cyberattack, such as service disruption, data destruction, or financial loss.
Impact

Causes reputational damage via mass leaks, extortion attempts, and the sale of data dumps.

MITRE ATT&CK Mapping

TTPs Used By ShinyHunters

TA0001: Initial Access
T1190
Exploit Public-Facing Application
T1078
Valid Accounts
TA0002: Execution
No items found.
TA0003: Persistence
T1078
Valid Accounts
TA0004: Privilege Escalation
T1078
Valid Accounts
TA0005: Defense Evasion
T1078
Valid Accounts
TA0006: Credential Access
T1555
Credentials from Password Stores
T1552
Unsecured Credentials
TA0007: Discovery
No items found.
TA0008: Lateral Movement
No items found.
TA0009: Collection
T1213
Data from Information Repositories
TA0011: Command and Control
No items found.
TA0010: Exfiltration
T1567
Exfiltration Over Web Service
TA0040: Impact
T1486
Data Encrypted for Impact

FAQs

Does ShinyHunters deploy ransomware?

How do ShinyHunters make money?

What kind of data do they steal?

Are their breaches targeted or opportunistic?

Do they work with insiders?

What is their relationship to other groups?

How can organizations detect their presence?

Which industries are most at risk?

How damaging are their leaks?

What is the best defense strategy?