Overview
- Attackers used phone and text phishing, posing as HR or IT to trick employees into granting access to an unnamed third-party CRM platform
- Workday discovered the compromise on August 6, immediately cut off access, implemented extra safeguards and notified potentially affected customers
- The stolen information was limited to names, email addresses and phone numbers, which can be leveraged for follow-on phishing and extortion attempts
- Security analysts link the incident to a broader ShinyHunters-style campaign targeting Salesforce-hosted CRMs at firms like Google, Adidas and Qantas
- Workday has not identified the breached CRM vendor, disclosed the volume of records taken or explicitly confirmed attribution to any threat actor