Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

HR Giant Workday's Data Breach Exposes Millions to Social Engineering Scams


HR Giant Workday has suffered a data breach, exposing millions of users to potential social engineering scams. The attack is linked to ShinyHunters, a group responsible for numerous high-profile breaches in recent years. While the exact extent of the breach is unclear, it's clear that attackers obtained sensitive information using common business contact information.

  • Workday announced a data breach compromising personal data of some users, including names, email addresses, and phone numbers.
  • No indication that customer tenant data or sensitive information within databases was accessed.
  • Social engineering scams are being used to target employees using compromised business contact information.
  • ShinyHunters, a prolific threat group, is linked to the attack.
  • The breach highlights the need for greater transparency and communication from companies on cybersecurity issues.


  • Workday, a company that provides human resources technology to over 11,000 corporations and 70 million users worldwide, has recently announced that it suffered a data breach. The company did not disclose how much information was stolen by the hackers, but did reveal that personal data, including names, email addresses, and phone numbers, of some users was compromised.

    According to Workday's own blog post announcing the breach, there is no indication that customer tenant data or any other sensitive information within those databases was accessed. However, the company has warned its customers about the possibility of social engineering scams being used against them by the hackers. This warning comes as part of a larger attack on Salesforce Customer Relationship Management systems, which have been linked to a hacking group known as ShinyHunters.

    ShinyHunters is a prolific threat that has been responsible for numerous high-profile breaches in recent years. The extortion group has stolen data from companies such as AT&T and PowerSchool, compromising the information of millions of customers and students respectively. In the case of Workday's breach, it appears that the hackers obtained primarily common business contact information, such as names, email addresses, and phone numbers.

    The reason for this type of data being sought after by ShinyHunters is to facilitate social engineering attacks. Social engineering scams are a type of cyberattack in which attackers use psychological manipulation to trick victims into divulging sensitive information or performing certain actions that compromise their security. By obtaining common business contact information, the hackers can use this data to target and scam employees of companies using Workday's services.

    It is worth noting that Workday took some time before disclosing the breach, which has raised concerns about transparency and communication from the company. A "noindex tag" was found in the source code of Workday's blog post announcing the breach, which signals to search engine crawlers not to index the page and thus avoid being discovered. While this may be a legitimate decision from a reputation protection standpoint, it does not exactly scream "We're doing our best to keep our customers informed and safe."

    In terms of broader implications, the Workday breach is part of a larger attack on Salesforce databases that has caught several companies in its crossfire. Companies such as Adidas, Google, Qantas Airways, and Cisco have all been hit by these attacks.

    The investigation into these breaches suggests that ShinyHunters used social engineering and voice phishing to gain access to the compromised data. Social engineering is a type of attack in which attackers use psychological manipulation to trick victims into divulging sensitive information or performing certain actions that compromise their security. Voice phishing, also known as "vishing," is a type of attack in which attackers make phone calls impersonating legitimate sources and trick victims into divulging sensitive information.

    These types of attacks are becoming increasingly sophisticated and can have devastating consequences for companies and individuals alike. As such, it's essential for companies like Workday to take proactive steps to secure their systems and inform customers about potential threats.

    In conclusion, the data breach at Workday highlights the need for greater transparency and communication from companies when it comes to cybersecurity issues. While the exact extent of the breach is unclear, it is clear that the attackers were able to obtain sensitive information using social engineering tactics. As companies and individuals navigate this complex and ever-evolving threat landscape, it's essential to stay vigilant and take proactive steps to protect ourselves against these types of attacks.



    Related Information:
  • https://www.ethicalhackingnews.com/articles/HR-Giant-Workdays-Data-Breach-Exposes-Millions-to-Social-Engineering-Scams-ehn.shtml

  • https://gizmodo.com/hr-giant-workday-got-hacked-2000644474

  • https://techcrunch.com/2025/08/18/hr-giant-workday-says-hackers-stole-personal-data-in-recent-breach/


  • Published: Mon Aug 18 15:35:52 2025 by llama3.2 3B Q4_K_M













    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us