News
August 21st, 2025
🔍 What:
• On Friday August 15th, Human Resources giant Workday disclosed a data breach targeting their third-party Customer Relationship Management (CRM) platform.
• Attackers gained access using social engineering techniques, most prominently impersonation via. vishing and smishing. Most likely, attackers impersonated HR or IT and tricked users into linking a malicious OAuth application to their CRM instance.
• Workday is just the latest company to have their CRM platform breached in an on-going campaign targeting companies that utilize Salesforce as their CRM platform. The group behind the attack, ShinyHunters, has conducted several successful attacks targeting major companies like Adidas, Qantas, Allianz Life, and Louis Vuitton, to name a few.
⚠️ Impact:
• Data Breach: Workday did not disclose the amount of data that was exfiltrated, and asserts that no customer tenants were impacted and stolen data was mostly commonly available business contact information, such as names, phone numbers, email addresses, etc. However, it goes without saying that some of the customer data involved in the breach could be leveraged for subsequent attacks.
• Third-Party Risk Factor: This breach emphasizes the need for organizations to remain diligent in vetting their third-party (and fourth-party) vendors. Since vendors providing third-party services can be seen as an attack vector to accessing the organizations they provide services to, these types of attacks are becoming increasingly more common.
• Credibility & Trust: Despite Workday asserting that no sensitive data was compromised or exfiltrated, data containing customer and contact information was exfiltrated. This data can be harvested and used for future targeted attacks. Any compromise of systems and/or data, regardless of the classification of data involved, can be detrimental to reputation, and be a catalyst for the erosion of trust.
💡 Recommendations:
1. Strengthen Employee Awareness & Phishing Defense
• Provide training on phishing and social engineering tactics, Include emphasis that your organization will never request passwords or secure credentials via unsolicited calls or texts.
• Encourage employees to verify requests through official, trusted channels.
2. Enforce Robust Access Controls (MFA & PLP)
• Apply stringent permission models, implement multi-factor authentication (MFA) wherever possible, and ensure granular access rights are in place across both primary and third-party systems.
3. Assess Third-Party Providers
• Conduct regular assessments and audits of third-party service providers, ensuring their adherence to security best-practices.
• Adopt a Third-Party Risk Management (TPRM) platform to streamline the management process and increase visibility on organizational attack surface.
4. Incident Preparedness
• Document and standardize response procedures for attacks involving the compromise of systems and data.
• Regularly review and update your organizations Incident Response Plan (IRP), and conduct tabletops and simulated attacks to cultivate a proactive security approach.
Read the full article HERE
Like