Infinite Campus warns of breach after ShinyHunters claims data theft
Recorded: March 24, 2026, 4 p.m.
| Original | Summarized |
Infinite Campus warns of breach after ShinyHunters claims data theft News Featured TeamPCP deploys Iran-targeted wiper in Kubernetes attacks Microsoft Azure Monitor alerts abused for callback phishing attacks Crunchyroll probes breach after hacker claims to steal 6.8M users' data Microsoft Exchange Online service change causes email access issues Microsoft fixes bug causing Classic Outlook sync issues with Gmail Zero Trust: Bridging the Gap Between Authentication and Trust HackerOne discloses employee data breach after Navia hack Infinite Campus warns of breach after ShinyHunters claims data theft Tutorials Latest How to access the Dark Web using the Tor Browser How to enable Kernel-mode Hardware-enforced Stack Protection in Windows 11 How to use the Windows Registry Editor How to backup and restore the Windows Registry How to start Windows in Safe Mode How to remove a Trojan, Virus, Worm, or other Malware How to show hidden files in Windows 7 How to see hidden files in Windows Webinars Latest Qualys BrowserCheck STOPDecrypter AuroraDecrypter FilesLockerDecrypter AdwCleaner ComboFix RKill Junkware Removal Tool Deals Categories eLearning IT Certification Courses Gear + Gadgets Security VPNs Popular Best VPNs How to change IP address Access the dark web safely Best VPN for YouTube Forums Virus Removal Guides HomeNewsSecurityInfinite Campus warns of breach after ShinyHunters claims data theft Infinite Campus warns of breach after ShinyHunters claims data theft By Bill Toulas March 24, 2026 Infinite Campus, a widely used K-12 student information system, is warning customers of a data breach following an extortion attempt by a threat actor. ShinyHunters lists Infinite Campus on its dark web siteSource: BleepingComputer Infinite Campus breach notification to customersSource: Reddit Red Report 2026: Why Ransomware Encryption Dropped 38% Related Articles: Data Breach Bill Toulas Previous Article Post a Comment Community Rules You need to login in order to post a comment You may also like: Popular Stories Microsoft Azure Monitor alerts abused for callback phishing attacks Trivy vulnerability scanner breach pushed infostealer via GitHub Actions VoidStealer malware steals Chrome master key via debugger trick Sponsor Posts AI is a data-breach time bomb: Read the new report Cyber resilience without the complexity. Join Zero Networks to stop lateral movement fast. Are refund fraud methods targeting your brand? You can monitor the underground for these threats. Overdue a password health-check? Audit your Active Directory for free Overdue a password health-check? Audit your Active Directory for free Follow us: Main Sections News Community Forums Useful Resources Welcome Guide Company About BleepingComputer Terms of Use - Privacy Policy - Ethics Statement - Affiliate Disclosure Copyright @ 2003 - 2026 Bleeping Computer® LLC - All Rights Reserved Login Username Password Remember Me Sign in anonymously Sign in with Twitter Not a member yet? Register Now Help us understand the problem. What is going on with this comment? Spam Abusive or Harmful Inappropriate content Strong language Other Read our posting guidelinese to learn what content is prohibited. Submitting... |
Infinite Campus, a prominent provider of student information systems (SIS) utilized by over 3,200 school districts across the United States managing data for 11 million students, is currently addressing a data breach following an extortion attempt by the threat actor group ShinyHunters. The incident centers on a compromised Salesforce account, revealing details that were largely publicly accessible. According to an internal notification disseminated to customers, the breach stemmed from unauthorized access to the Infinite Campus Salesforce instance, primarily exposing names and contact information for school staff, and directory data typically found on school websites. ShinyHunters, a known group specializing in targeting Salesforce accounts, claimed responsibility for the breach and issued a final warning to Infinite Campus, demanding a ransom to prevent the release of the stolen data. The group has a documented history of targeting companies leveraging Salesforce, exemplified by past incidents like the 1.5 billion records stolen in the Salesforce Aura campaign and the Sailboat Hack. The nature of this breach mirrors previous attacks, notably the 2024 PowerSchool hack, though the scope of impact appears significantly less extensive. This similarity in targeting Salesforce instances raises concerns about potential vulnerabilities within the platform and the broader education technology sector. In response to the notification, Infinite Campus has taken precautionary steps, including disabling certain customer-facing services for users without IP address restrictions and initiating a comprehensive scan of the Salesforce data. Furthermore, the firm has engaged in direct contact with potentially impacted school districts to provide guidance and mitigate any potential risks associated with the exposure of staff contact information. This proactive approach demonstrates an attempt to control the narrative and minimize the impact of the breach. The incident underscores the ongoing threat landscape faced by organizations reliant on cloud-based services like Salesforce. While Infinite Campus asserts that no customer databases were accessed, the compromise of a Salesforce account highlights the potential for attackers to leverage compromised credentials and access data that is publicly discoverable. The response by Infinite Campus, including the scanning of data and communication with impacted districts, showcases typical crisis management strategies employed following such incidents. The similarities to the 2024 PowerSchool hack, though with a different scale of impact, serve as a cautionary reminder of the importance of robust security practices and vigilance against persistent threat actors like ShinyHunters. The firm’s decision not to engage with the attacker represents a common strategy aimed at preventing further extortion attempts and securing the breach’s containment. |