There you have it! Amtrak just got breached. Not through their own servers. Not through a zero-da…
May 2, 2026 · 0 likes · 0 comments
AI Cybersecurity
There you have it! Amtrak just got breached. Not through their own servers. Not through a zero-day. Through Salesforce.
ShinyHunters — the same crew that has hit target after target this year — walked into Amtrak's cloud CRM and walked out with up to 9.4 million customer records.
Names. Email addresses. Physical addresses. Dates of birth. Last four digits of Social Security numbers. Tax IDs. And the worst part — full customer support records. Every complaint you filed. Every refund you requested. Every trip you took.
Let that sink in.
A government-subsidized national railroad trusted millions of Americans' most sensitive data to a third-party cloud CRM — and never locked the door.
This is not a sophisticated nation-state attack. This is weak access controls. Misconfigured settings. Compromised credentials. The basics. The stuff I have been screaming about for a decade.
A DISGRACE.
You can spend $100 million on your perimeter. Firewalls. Endpoint detection. Zero trust policies. Doesn't matter. If your CRM vendor has one misconfigured API key or one employee reusing a password — you are done.
Third-party cloud is your weakest link. Always has been. Always will be — until companies start treating vendor security like it is their own security. Because it is.
And here is the question nobody is asking — how many other federal agencies and government-funded organizations are sitting on the same ticking time bomb right now? How many have Salesforce instances with default configurations and no MFA on admin accounts?
I walked those halls. I know exactly how bad it is.
The attackers are automated now. Your defenses better be too.
Join me LIVE Monday May 5 at 1 PM ET for Episode 2 of "Inside My AI Kingdom" — where I show you exactly how I run 13 AI agents 24/7 and what that means for your security posture.
LinkedIn: https://lnkd.in/eZNmtQNW
YouTube: https://lnkd.in/e_6wSkKC
What are your thoughts?
ShinyHunters — the same crew that has hit target after target this year — walked into Amtrak's cloud CRM and walked out with up to 9.4 million customer records.
Names. Email addresses. Physical addresses. Dates of birth. Last four digits of Social Security numbers. Tax IDs. And the worst part — full customer support records. Every complaint you filed. Every refund you requested. Every trip you took.
Let that sink in.
A government-subsidized national railroad trusted millions of Americans' most sensitive data to a third-party cloud CRM — and never locked the door.
This is not a sophisticated nation-state attack. This is weak access controls. Misconfigured settings. Compromised credentials. The basics. The stuff I have been screaming about for a decade.
A DISGRACE.
You can spend $100 million on your perimeter. Firewalls. Endpoint detection. Zero trust policies. Doesn't matter. If your CRM vendor has one misconfigured API key or one employee reusing a password — you are done.
Third-party cloud is your weakest link. Always has been. Always will be — until companies start treating vendor security like it is their own security. Because it is.
And here is the question nobody is asking — how many other federal agencies and government-funded organizations are sitting on the same ticking time bomb right now? How many have Salesforce instances with default configurations and no MFA on admin accounts?
I walked those halls. I know exactly how bad it is.
The attackers are automated now. Your defenses better be too.
Join me LIVE Monday May 5 at 1 PM ET for Episode 2 of "Inside My AI Kingdom" — where I show you exactly how I run 13 AI agents 24/7 and what that means for your security posture.
LinkedIn: https://lnkd.in/eZNmtQNW
YouTube: https://lnkd.in/e_6wSkKC
What are your thoughts?