.ai-align-left * {margin: 0 auto 0 0; text-align: left;} .ai-align-right * {margin: 0 0 0 auto; text-align: right;} .ai-center * {margin: 0 auto; text-align: center; }

Site icon Nksbco

Google Data Breach Exposes 2.5 Billion Gmail Users to Scam Risks

Google Data Breach Exposes 2.5 Billion Gmail Users to Scam Risks

Google Data Breach Exposes 2.5 Billion Gmail Users to Scam Risks

Over 2.5 billion Gmail users may be at risk after a significant cyberattack that targeted a Google database managed through Salesforce’s cloud platform. Security experts are calling it one of the largest breaches in Google’s history. The attack is linked to the hacker group ShinyHunters.

How the Breach Happened

The breach began in June 2025 using social engineering tactics. Scammers impersonated IT staff during phone calls and convinced a Google employee to approve a malicious Salesforce-connected application. This allowed attackers to access contact details, business names, and notes.

Important: No user passwords were stolen, but the stolen data is being misused in phishing emails, spoofed calls, and fraudulent texts. Scammers often impersonate Google to trick users into sharing login codes or resetting passwords, which could lead to full account takeovers.

Risks for Users

Even without password exposure, hackers can use the stolen details to:

How to Protect Yourself

  1. Check exposure – Use ID Protection’s Data Leak Checker and Dark Web Monitoring.
  2. Strengthen security – Update passwords, use unique strong passwords, and enable MFA.
  3. Block scams – Use Trend Micro ScamCheck for call blocking, SMS filtering, and scam detection.
  4. Verify emails – Upload suspicious messages to ScamCheck to confirm authenticity.
  5. Use passkeys – Google encourages fingerprint or face recognition login, resistant to phishing.
  6. Run Google Security Checkup – Review and strengthen account protections.

Google’s Response

Affected users were notified on August 8, 2025. Google stated the compromised data was mostly publicly available business information, though even basic details can aid scammers.

About ShinyHunters

ShinyHunters (also tracked as UNC6040) often impersonates IT support to infiltrate systems and extract massive datasets. Sometimes another related group, UNC6240, uses the stolen data for bitcoin extortion. Security experts warn that future attacks may escalate

Exit mobile version