Cushman & Wakefield Breach: 310K Records Exposed (2026)
In May 2026, the real estate services firm Cushman & Wakefield was the target of a "pay or leak" extortion campaign by the ShinyHunters group . Following the threat, the group publicly published data they alleged had been obtained from the firm, consisting mostly of C&W email addresses along with te...
Overview
In May 2026, the real estate services giant Cushman & Wakefield became the target of a “pay or leak” extortion campaign orchestrated by the ShinyHunters threat group. Following the threat, the group publicly published a dataset allegedly obtained from the firm. The leaked records - totaling 310,431 - consist primarily of corporate contact information, including email addresses, names, job titles, and phone numbers. While no financial data or Social Security numbers were exposed, the scale and the nature of the breach - targeting a firm that handles sensitive commercial real estate transactions - raises significant concern over the company’s security posture and the risks posed to its employees and business partners.
What Was Exposed
The leaked data is almost entirely business-oriented but still carries material risk. The exposed fields include:
- Email Addresses: Both Cushman & Wakefield internal addresses and tens of thousands of external email addresses belonging to clients, vendors, and partners.
- Names and Job Titles: Full names paired with specific job roles, enabling highly targeted spear-phishing campaigns.
- Phone Numbers: Direct lines and mobile numbers for many individuals.
Because the data is current and verified (many entries likely belong to active employees and external contacts), it is an ideal resource for social engineering attacks. The presence of job titles allows attackers to craft emails that appear to come from a senior executive, requesting urgent wire transfers or credential resets.
How the Breach Happened
ShinyHunters is known for exploiting exposed credentials, misconfigured cloud storage, and third-party vendor vulnerabilities. While Cushman & Wakefield has not released a full post-mortem, the group’s playbook typically involves leveraging compromised credentials - often found on underground forums - to access corporate cloud services or email systems. The “pay or leak” demand suggests the attackers had exfiltrated the data before making their extortion demand, indicating either an unpatched vulnerability or a weak authentication policy that allowed initial access.
Account Takeover and Spear-Phishing Risks
The greatest short-term risk from this breach is not direct financial fraud but account takeover and targeted phishing. With email addresses and names in hand, attackers can:
- Attempt credential-stuffing attacks on other services where affected individuals reuse passwords.
- Send highly personalized phishing emails that appear to come from a colleague or a C&W executive.
- Use job titles to identify high-value targets like finance managers or legal counsel for business email compromise (BEC) attacks.
Anyone whose email appears in this dataset should assume their inbox may become a target for sophisticated phishing campaigns.
Who’s Actually Affected
The breach affects not just Cushman & Wakefield employees but also a significant number of external contacts - clients, contractors, and even former partners whose email addresses were stored in Cushman & Wakefield’s systems. If you have ever done business with the firm, corresponded with a C&W employee, or had your email listed in their CRM, you may be in the leaked dataset. This third-party exposure is a classic supply-chain risk: you can be impacted by a breach at a company you don’t directly work for.
How to Check If You’re Affected
The best way to confirm exposure is to check Have I Been Pwned. Enter the email address you used when communicating with Cushman & Wakefield. If your data appears, consider every piece of exposed information - your name, phone number, and job title - now public. For ongoing coverage of similar breaches, follow our cybersecurity news.
Recommendations
- Enforce MFA on all corporate email and communication systems. Even if a password is compromised, multi-factor authentication blocks most credential-stuffing attacks.
- Conduct phishing simulations for any individual whose email appears in the leak. They are now a higher-risk target.
- Update contact details for any accounts that use the exposed phone number as a recovery method. Attackers may attempt SIM-swapping.
- For Cushman & Wakefield: Conduct a full audit of access logs for any systems accessible with the exposed credentials. Assume initial access was gained through a compromised email account.
Security Insight
This breach underscores a persistent failing in enterprise security: the over-reliance on single-factor authentication for business-critical communication channels. Cushman & Wakefield, like many firms in the real estate sector, handles sensitive transaction data but appears to have lacked basic controls like role-based access and credential monitoring. The “pay or leak” model has become the default for data extortion because it works - and it works because too many organizations still treat email as a secure channel rather than a primary attack surface.
Further Reading
Investigate Breaches Safely with NordVPN
Researching exposed data, paste sites, or threat actor infrastructure? Route your OSINT traffic through a VPN to avoid attribution and keep your investigation IP separate from your corporate network.
Get NordVPN for ResearchAffiliate link — we may earn a commission at no extra cost to you.
Never miss a data breach report
Get real-time security alerts delivered to your preferred platform.
Related Breach Reports
In April 2026, the commercial real estate brokerage firm Marcus & Millichap was named as one of multiple alleged victims of the ShinyHunters hacking and extortion group . Data alleged to have been obtained from the company was subsequently released publicly and included 1.8M unique email addresses, ...
In April 2026, the hacking collective ShinyHunters claimed to have obtained data from Pitney Bowes as part of a broader extortion campaign that also named several other organisations. After negotiations allegedly failed, the group publicly released the data which included 8.2M unique email addresses...
In March 2026, the AI-driven merchant data platform Woflow was named as a victim by the ShinyHunters data extortion group . The group subsequently published tens of thousands of files allegedly obtained from the company, comprising more than 2TB of data. The trove included hundreds of thousands of e...
In March 2026, the hacker and extortion group "ShinyHunters" claimed to have obtained a substantial corpus of data from ZenBusiness , a business formation and compliance platform. The group claimed the data had been exfiltrated from platforms including Snowflake, Mixpanel and Salesforce, and threate...