Threat Actor Claims NordVPN Salesforce Data Leak

Related

Depthfirst Secures $40M to Advance AI-Driven Vulnerability Management

What happened Cybersecurity startup Depthfirst has raised $40 million in...

Critical Cal.com Authentication Bypass Lets Attackers Take Over User Accounts

What happened A critical Cal.com authentication bypass lets attackers take...

International Takedown Disrupts RedVDS Cybercrime Platform Driving Phishing and Fraud

What happened International takedown disrupts RedVDS cybercrime platform driving phishing...

Share

What happened

Threat actor claims NordVPN Salesforce data leak after an individual using the alias “1011” posted alleged Salesforce development database source code, API keys, and internal tokens on a dark web forum. The actor claims access was obtained via a misconfigured development server in Panama, exposing over ten databases and credentials tied to NordVPN’s internal tooling and project management systems.

Who is affected

NordVPN’s internal systems and development environments are directly affected. The exposure of credentials could impact integrated services if not fully rotated.

Why CISOs should care

The case reinforces how misconfigured development assets and exposed credentials remain common initial access vectors for attackers.

3 practical actions

  1. Audit non-production systems: Secure dev and staging environments.

  2. Rotate exposed secrets: Revoke and replace all potentially compromised credentials.

  3. Enforce least privilege: Limit access scope for development tokens.