Education publishing giant McGraw-Hill has confirmed a data breach after the extortion group ShinyHunters listed the company on its dark-web portal and threatened to leak stolen data by April 14 unless a ransom was paid. The company disclosed to BleepingComputer that attackers exploited a Salesforce misconfiguration to access internal data. ShinyHunters claims to hold 45 million Salesforce records containing personally identifiable information, a figure McGraw-Hill disputes, stating the exposed data is limited and non-sensitive.

What Happened

McGraw-Hill identified unauthorized access to a limited set of data hosted on a webpage within its Salesforce environment. The company attributes the incident to a broader misconfiguration within Salesforce's platform that has impacted multiple organizations. Upon detection, McGraw-Hill secured the affected webpages and engaged external cybersecurity experts to investigate the scope of the breach. The company is now working closely with Salesforce to harden protections and fully remediate the issue.

ShinyHunters, the extortion group behind the attack, posted McGraw-Hill to its leak site and set an April 14 deadline for ransom payment before releasing stolen data publicly. This tactic is consistent with ShinyHunters' established playbook of exfiltrating data from third-party platforms and leveraging public pressure to coerce payment.

What Was Taken

The two sides present sharply different accounts of what was compromised. McGraw-Hill states its investigation found no exposure of Social Security numbers, financial account information, or student data from its educational platforms. The company also asserts that its Salesforce accounts, customer databases, courseware, and internal systems were not accessed.

ShinyHunters, however, claims possession of 45 million Salesforce records containing PII. The true scope likely falls somewhere between these two positions. Organizations in the education sector should treat any data associated with Salesforce-hosted pages as potentially exposed until independent verification is available.

Why It Matters

McGraw-Hill is a major force in education publishing with $2.2 billion in annual revenue, serving K-12 schools, universities, and corporate learning environments. Even if the breach is confined to non-sensitive metadata, the sheer volume of records claimed by ShinyHunters raises concerns about downstream phishing, social engineering, and identity correlation attacks against students and educators.

More critically, this incident highlights a systemic risk. McGraw-Hill's own statement acknowledges the Salesforce misconfiguration "has impacted multiple organizations." This is not an isolated failure. It points to a class of vulnerability in how enterprises configure and expose data through SaaS platforms, where the shared responsibility model often leaves gaps that neither the vendor nor the customer adequately monitors.

The Attack Technique

The attack vector was a misconfiguration in Salesforce-hosted webpages, not a direct compromise of McGraw-Hill's internal infrastructure. Salesforce environments expose various web-facing components, including Experience Cloud sites, public-facing APIs, and guest user access controls, that can leak data when improperly configured. Overly permissive guest user profiles, exposed Aura endpoints, and misconfigured sharing rules are well-documented attack surfaces in Salesforce deployments.

ShinyHunters has a track record of targeting third-party platform misconfigurations rather than breaching primary infrastructure directly. Their 2026 campaign has already hit Rockstar Games and Hims & Hers through similar SaaS platform exploitation, indicating a systematic approach to harvesting data from misconfigured cloud environments at scale.

Threat Actor Profile: ShinyHunters

ShinyHunters is a prolific data extortion group that has been active since 2020 and has escalated operations significantly in 2026. The group specializes in exploiting third-party service misconfigurations, exposed cloud storage, and SaaS platform vulnerabilities. Rather than deploying ransomware, ShinyHunters focuses on data theft and extortion, threatening public leaks to pressure victims into payment. Confirmed 2026 breaches attributed to the group include Rockstar Games and Hims & Hers, both involving third-party platform exploitation.

What Organizations Should Do

Sources: McGraw-Hill confirms data breach following extortion threat