Amtrak has reportedly had customer data added to the Have I Been Pwned (HIBP) database following claims by the ShinyHunters that it breached the company’s systems. This development comes shortly after the group alleged it had exfiltrated millions of records, potentially exposing sensitive customer information.
According to the attackers, more than 9.4 million records were obtained from a Salesforce environment, including personally identifiable information (PII) and internal corporate data. However, after reviewing the leaked dataset, Troy Hunt, the operator of HIBP, identified approximately 2.1 million unique email addresses within the data. In addition to email addresses, the dataset reportedly includes names, physical addresses, and customer support ticket details.
While the data appears credible based on multiple validation checks, it is important to note that inclusion in HIBP does not serve as official confirmation of a breach by Amtrak. As of now, the organization has not released any public statement acknowledging or verifying the incident.
The difference between the 9.4 million records claimed by the attackers and the 2.1 million unique email addresses identified likely stems from duplicate entries or multiple records linked to the same individuals. This pattern is commonly observed in Salesforce-related data leaks. Furthermore, HIBP noted that nearly 80% of the exposed data had already been seen in previous breaches, suggesting that some information may not be entirely new.
National Railroad Passenger Corporation, widely known as Amtrak, serves over 30 million passengers annually across the United States. Given the scale of its operations, the company manages large volumes of customer data, including travel and support-related information. Consequently, any potential breach could have wide-reaching implications.
Meanwhile, ShinyHunters has established a reputation for targeting cloud-based CRM platforms, particularly Salesforce environments. The group typically exploits vulnerabilities such as misconfigurations, compromised credentials, or insecure third-party integrations. Once access is gained, attackers extract large datasets and attempt to extort organizations. If negotiations fail, they often release the stolen data on public forums or leak sites.
As a result, the exposure of such data increases the risk of targeted phishing and social engineering attacks. Cybercriminals can use the information to craft convincing messages that reference travel history or customer service interactions, making them more difficult to detect.
Therefore, users should remain vigilant. It is advisable to avoid clicking on suspicious links or downloading attachments from unknown sources, especially if the communication references Amtrak-related activity. Additionally, monitoring accounts for unusual activity and enabling security measures such as multi-factor authentication can help reduce potential risks.
Overall, this incident highlights the growing threat posed by cybercriminal groups targeting enterprise platforms and the importance of proactive cybersecurity measures to protect sensitive customer data.
Recommended Cyber Technology News :
- PowMix Botnet Targets Czech Workers With Stealthy C2 Tactics
- KPMG and INSEAD Launch Framework for Board-Level AI Governance
- OVHcloud, S2GRUPO Partner To Boost EU Cyber Sovereignty
To participate in our interviews, please write to our CyberTech Media Room at info@intentamplify.com
🔒 Login or Register to continue reading




