{"id":45390,"date":"2026-04-15T00:14:50","date_gmt":"2026-04-14T16:14:50","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/15\/mcgraw-hill-confirms-data-breach-following-extortion-threat\/"},"modified":"2026-04-15T00:14:50","modified_gmt":"2026-04-14T16:14:50","slug":"mcgraw-hill-confirms-data-breach-following-extortion-threat","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/15\/mcgraw-hill-confirms-data-breach-following-extortion-threat\/","title":{"rendered":"McGraw-Hill confirms data breach following extortion threat"},"content":{"rendered":"\n<p style=\"text-align:center\"><img loading=\"lazy\" decoding=\"async\" height=\"900\" src=\"https:\/\/www.bleepstatic.com\/content\/hl-images\/2026\/04\/14\/McGraw-Hill_Education_wordmark.svg.jpg\" width=\"1600\" alt=\"McGraw-Hill confirms data breach following extortion threat\"><\/p>\n<p>Education company McGraw-Hill has confirmed in a statement to BleepingComputer that hackers exploited a Salesforce misconfiguration and accessed its internal data.<\/p>\n<p>The company assured that the breach did not affect its Salesforce accounts, customer databases, or internal systems, and that the amount of exposed data is limited and non-sensitive.<\/p>\n<p>&ldquo;McGraw-Hill recently identified unauthorized access to a limited set of data from a webpage hosted by Salesforce on its platform. This activity appears to be part of a broader issue involving a misconfiguration within Salesforce&rsquo;s environment that has impacted multiple organizations that work with Salesforce,&#8221; a McGraw-Hill spokesperson told BleepingComputer.<\/p>\n<div align=\"center\" style=\"width:98%; margin:0 auto; text-align:center; padding:4px; background:#f0f0f0; border:1px solid #ccc; border-radius:6px;\">  <a href=\"https:\/\/www.adaptivesecurity.com\/demo\/security-awareness-training?utm_source=display_network&amp;utm_medium=paid_display&amp;utm_campaign=2026_04_display_bleepingcomputer&amp;utm_id=701Rd00000fE8REIA0&amp;utm_content=970x250\" rel=\"nofollow noopener\" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/www.bleepstatic.com\/c\/a\/as-tour-the-platform-970-x250.jpg\" style=\"margin-top: 0px;\" alt=\"McGraw-Hill confirms data breach following extortion threat\"><\/a> <\/div>\n<p>&#8220;Importantly, this did not involve unauthorized access to McGraw-Hill&rsquo;s Salesforce accounts, customer databases, courseware, or internal systems,&rdquo; the company representative added.<\/p>\n<p>McGraw-Hill further states that its investigation, with help from external cybersecurity experts, revealed that the exposed information does not contain Social Security numbers (SSNs), financial account information, or student data from its educational platforms.<\/p>\n<p>A global education company focused on learning content and platforms, McGraw-Hill offers textbooks, digital learning platforms, and K-12 school and university systems. The company is a major player in education publishing, with an annual revenue of $2.2 billion.<\/p>\n<p>The statement about the cyberattack comes in response to the extortion group ShinyHunters announcing McGraw-Hill as a victim on its dark-web portal and threatening to leak stolen data by April 14 unless a ransom is paid.<\/p>\n<p>The notorious threat actor claims to hold 45 million Salesforce records containing personally identifiable information (PII), contradicting the company&rsquo;s statement that the compromised data is not sensitive in nature.<\/p>\n<div style=\"text-align:center\">\n<figure style=\"display:inline-block\"><img loading=\"lazy\" decoding=\"async\" height=\"337\" src=\"https:\/\/www.bleepstatic.com\/images\/news\/u\/1220909\/2026\/April\/mcgraw.jpg\" width=\"317\" alt=\"McGraw-Hill confirms data breach following extortion threat\"><figcaption><strong>McGraw-Hill on ShinyHunters&#8217; extortion portal<\/strong><br \/><em>Source: BleepingComputer<\/em><\/figcaption><\/figure>\n<\/div>\n<p>McGraw-Hill also told BleepingComputer that the affected webpages were secured immediately after detecting the unauthorized activity, and that it is working closely with Salesforce to further strengthen protections and ensure that the issue is fully addressed.<\/p>\n<p>The ShinyHunters data extortion group has carried out several confirmed high-profile security breaches since the start of the year, including those against <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/stolen-rockstar-games-analytics-data-leaked-by-extortion-gang\/\" rel=\"nofollow noopener\">Rockstar Games<\/a>, <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/hims-and-hers-warns-of-data-breach-after-zendesk-support-ticket-breach\/\" rel=\"nofollow noopener\">Hims &amp; Hers<\/a>, the <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/cert-eu-european-commission-hack-exposes-data-of-30-eu-entities\/\" rel=\"nofollow noopener\">European Commission<\/a>, <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/telus-digital-confirms-breach-after-hacker-claims-1-petabyte-data-theft\/\" rel=\"nofollow noopener\">Telus Digital<\/a>, <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/wynn-resorts-confirms-employee-data-breach-after-extortion-threat\/\" rel=\"nofollow noopener\">Wynn Resorts<\/a>, <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/canada-goose-investigating-as-hackers-leak-600k-customer-records\/\" rel=\"nofollow noopener\">Canada Goose<\/a>, <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/match-group-breach-exposes-data-from-hinge-tinder-okcupid-and-match\/\" rel=\"nofollow noopener\">Match Group<\/a>, <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/panera-bread-data-breach-impacts-51-million-accounts-not-14-million-customers\/\" rel=\"nofollow noopener\">Panera Bread<\/a>, and <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/cargurus-data-breach-exposes-information-of-124-million-accounts\/\" rel=\"nofollow noopener\">CarGurus<\/a>.<\/p>\n<p>In March, the threat group also breached the American firm <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/infinite-campus-warns-of-breach-after-shinyhunters-claims-data-theft\/\" rel=\"nofollow noopener\">Infinite Campus<\/a>, which also operates a K-12 student information system.<\/p>\n<style> .ia_ad {     background-color: #f0f6ff;     width: 95%;     max-width: 800px;     margin: 15px auto;     border-radius: 8px;     border: 1px solid #d6ddee;     display: flex;     align-items: stretch;     padding: 0;     overflow: hidden; }  .ia_lef {     flex: 1;     max-width: 200px;     height: auto;     display: flex;     align-items: stretch; }  .ia_lef a {     display: flex;     width: 100%;     height: 100%; }   .ia_lef a img {     width: 100%;     height: 100%;          border-radius: 8px 0 0 8px;     margin: 0;     display: block; }  .ia_rig {     flex: 2;     padding: 10px;     display: flex;     flex-direction: column;     justify-content: center; }  .ia_rig h2 {     font-size: 17px !important;     font-weight: 700;     color: #333;     line-height: 1.4;     font-family: Georgia, \"Times New Roman\", Times, serif;     margin: 0 0 14px 0; }  .ia_rig p {     font-weight: bold;     font-size: 14px;     margin: 0 0 clamp(6px, 2vw, 14px) 0; }  .ia_button {     background-color: #FFF;     border: 1px solid #3b59aa;     color: black;     text-align: center;     text-decoration: none;     border-radius: 8px;     display: inline-block;     font-size: 16px;     font-weight: bold;     cursor: pointer;     padding: 10px 20px;     width: fit-content; }  .ia_button a {     text-decoration: none;     color: inherit;     display: block; }  @media (max-width: 600px) {     .ia_ad {         flex-direction: column;         align-items: center;     }      .ia_lef {         max-width: 100%;     }      .ia_lef a img {         border-radius: 8px 8px 0 0;     }       .ia_rig {         padding: 15px;         width: 100%;     }      .ia_button {         width: 100%; \tmargin: 0px auto;     } } <\/style>\n<div>\n<div>         <a href=\"https:\/\/hubs.li\/Q048zztN0\" target=\"_blank\" rel=\"noopener sponsored\">             <img decoding=\"async\" src=\"https:\/\/www.bleepingcomputer.com\/news\/security\/mcgraw-hill-confirms-data-breach-following-extortion-threat\/data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" data-src=\"https:\/\/www.bleepstatic.com\/c\/p\/picus-whitepaper.jpg\" alt=\"McGraw-Hill confirms data breach following extortion threat\"><\/a>     <\/div>\n<div>\n<h2><a href=\"https:\/\/hubs.li\/Q048zztN0\" target=\"_blank\" rel=\"noopener sponsored\">Automated Pentesting Covers Only 1 of 6 Surfaces.<\/a><\/h2>\n<p>Automated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the other.<\/p>\n<p>This whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic questions for any tool evaluation.<\/p>\n<p>           <button><a href=\"https:\/\/hubs.li\/Q048zztN0\" target=\"_blank\" rel=\"noopener sponsored\">Get Your Copy Now<\/a><\/button>     <\/div>\n<\/p><\/div>\n<div>\n<h3>Related Articles:<\/h3>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/infinite-campus-warns-of-breach-after-shinyhunters-claims-data-theft\/\">Infinite Campus warns of breach after ShinyHunters claims data theft<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/european-commission-confirms-data-breach-after-europaeu-hack\/\">European Commission confirms data breach after Europa.eu hack<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/shinyhunters-starts-leaking-data-stolen-in-salesforce-attacks\/\">ShinyHunters launches Salesforce data leak site to extort 39 victims<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/stolen-rockstar-games-analytics-data-leaked-by-extortion-gang\/\">Stolen Rockstar Games analytics data leaked by extortion gang<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/snowflake-customers-hit-in-data-theft-attacks-after-saas-integrator-breach\/\">Snowflake customers hit in data theft attacks after SaaS integrator breach<\/a><\/p>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Education company McGraw-Hill has confirmed in a statem [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[28],"tags":[],"class_list":["post-45390","post","type-post","status-publish","format-standard","hentry","category--bleepingcomputer"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45390","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=45390"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45390\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=45390"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=45390"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=45390"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}