- Working Day has been targeted in a data violation
- The violation was part of a campaign for attacks on social technical
- The campaign also has targeted Google, Dior and Adidas
Popular HR -Platform Workday has revealed that it was hit by a data violation derived from a social engineering campaign.
“We will tell you about a recent campaign for Social Engineering Campaign aimed at many major organizations, including the working day,” the company confirmed in a statement.
“In this campaign, threat actors contact employees via text or phone pretending to be from human resources or that. Their goal is to trick employees into giving up account access or their personal information.”
Additional phishing -risks
Fortunately, Workday says so far that there has been no indication of access to the customer’s tenants or the data within them ‘and the company has added extra protective measures to mitigate the risk of similar incidents in the future.
The statement adds the information that the threat actor obtained was ‘primarily commonly available business contact information, such as names, e -mail addresses and telephone numbers, potentially to promote their social technical scams.’
It seems that this violation may be part of a wave of security breaches targeting Salesforce CRM deposits through phishing and social technical attacks. These attacks have used these tactics to break Google, Adidas, Dior and more.
The hackers have probably used these phishing -attacks to associate malicious OAuth -Apps with the company’s Salesforce -then download and steal databases before using the information to pressure victims, Bleeping computer Reports.
“Since this type of violation is technically easier to perform, yet very effective, we could see even more threat actors adopt these tactics” Senior Manager for Cyber and Head of Secops at Immersive, Kevin Marriott told told told told Techradar Pro.
“CRM tools are often a key target of threat players as they typically store limited but valuable information that threat actors can either use themselves or sell, with databases full of information that is useful, such as E email addresses and other personal information.
“If this attack is actually linked to the wider campaigns targeting Salesforce deposits, it highlights how threat players like Shinyhunters focus their efforts on SaaS platforms that keep valuable customer data from a variety of organizations.”
Users need to make sure they remain vigilant online after the incident and are skeptical of unsolicited incoming messages, especially those who require urgent action or threaten a disaster.
These are and will continue to be the largest red flag in phishing attacks.



