Protect your data security with Hexnode
Enable SaaS security with stronger authentication, encryption, and device-level control to protect business data
Get fresh insights, pro tips, and thought starters–only the best of posts for you.
The ShinyHunters Follett Software breach claim has put another Salesforce-linked extortion deadline in the spotlight.
On April 30, 2026, ShinyHunters reportedly listed Follett Software LLC,a leader in U.S. education software, as an alleged victim, claiming access to more than 4 million Salesforce records containing personally identifiable information (PII) and internal corporate data. The group issued a May 4 deadline, threatening a public leak and additional disruption if demands were not met. These claims remain unverified, with no public confirmation from Follett, Salesforce, or law enforcement.
Still, the alleged Follett incident reflects a broader pattern of ShinyHunters-linked SaaS extortion. Threat intelligence and FBI advisories have warned that attackers are targeting environments through social engineering, compromised credentials, malicious connected apps, and API-driven data theft, rather than exploiting traditional software vulnerabilities.
For IT leaders, the message is clear: attackers are increasingly targeting identities, tokens, integrations, and SaaS workflows—where enterprise data actually resides.
What makes incidents like the Follett claim particularly concerning is not just the scale, but the method. Recent threat intelligence shows that attackers targeting Salesforce environments are not exploiting platform vulnerabilities, they are exploiting access itself.
The result is what can be described as “industrialized” data theft, where high-volume exfiltration is executed through trusted workflows, rather than noisy malware or lateral movement.
These attack patterns show that identities, connected apps, and trusted integrations now define enterprise security just as much as devices and network boundaries. This means a secure endpoint alone is not enough if attackers can still gain access through compromised credentials, over-permissioned apps, or unvetted third-party tools. As recent investigations have shown, trusted SaaS access paths can be abused without triggering traditional alerts. Securing the modern enterprise now requires visibility and control across devices, identities, tokens, and integrations.
If the modern attack path is built on compromised identities and trusted access, then the defense must focus on verifying every access attempt. Hexnode approaches this by combining endpoint visibility, identity-aware access control, and centralized policy enforcement into a unified security model.
A key weakness in SaaS attacks is that access is often granted based on credentials alone.
Hexnode IdP strengthens this by enforcing device-aware authentication, where access decisions consider both the user’s identity and the device’s real-time compliance status. This enables organizations to:
In practical terms, even if credentials are compromised, access can be restricted if the device does not meet security requirements or falls out of compliance.
Since many SaaS attacks originate from compromised endpoints or unsafe browser activity, controlling devices becomes critical. Hexnode UEM provides centralized control over:
This allows IT teams to:
By reducing unmanaged or risky endpoints, organizations can limit the exposure of SaaS sessions and credentials.
Identity-based attacks often avoid traditional malware signals, making detection more challenging. Hexnode XDR enhances visibility by:
While SaaS-level monitoring may require additional tools, endpoint-level telemetry still plays a critical role in identifying abnormal behavior associated with compromised accounts or devices.
Download the White paper to enhance your organization's access management methods and ensure device and data security.
Featured Resource
IAM using Hexnode – The complete guide to manage access
After a SaaS breach or exposure, recovery is not just about restoring systems. It’s about ensuring attackers no longer have leverage.
Control connected apps, strengthen identity-based access, and reduce SaaS exposure before attackers exploit trusted access paths with Hexnode
SIGNUP NOW