High

Cushman & Wakefield Breach: 310K Records Exposed (2026)

In May 2026, the real estate services firm Cushman & Wakefield was the target of a "pay or leak" extortion campaign by the ShinyHunters group . Following the threat, the group publicly published data they alleged had been obtained from the firm, consisting mostly of C&W email addresses along with te...

Overview

In May 2026, the real estate services giant Cushman & Wakefield became the target of a “pay or leak” extortion campaign orchestrated by the ShinyHunters threat group. Following the threat, the group publicly published a dataset allegedly obtained from the firm. The leaked records - totaling 310,431 - consist primarily of corporate contact information, including email addresses, names, job titles, and phone numbers. While no financial data or Social Security numbers were exposed, the scale and the nature of the breach - targeting a firm that handles sensitive commercial real estate transactions - raises significant concern over the company’s security posture and the risks posed to its employees and business partners.

What Was Exposed

The leaked data is almost entirely business-oriented but still carries material risk. The exposed fields include:

  • Email Addresses: Both Cushman & Wakefield internal addresses and tens of thousands of external email addresses belonging to clients, vendors, and partners.
  • Names and Job Titles: Full names paired with specific job roles, enabling highly targeted spear-phishing campaigns.
  • Phone Numbers: Direct lines and mobile numbers for many individuals.

Because the data is current and verified (many entries likely belong to active employees and external contacts), it is an ideal resource for social engineering attacks. The presence of job titles allows attackers to craft emails that appear to come from a senior executive, requesting urgent wire transfers or credential resets.

How the Breach Happened

ShinyHunters is known for exploiting exposed credentials, misconfigured cloud storage, and third-party vendor vulnerabilities. While Cushman & Wakefield has not released a full post-mortem, the group’s playbook typically involves leveraging compromised credentials - often found on underground forums - to access corporate cloud services or email systems. The “pay or leak” demand suggests the attackers had exfiltrated the data before making their extortion demand, indicating either an unpatched vulnerability or a weak authentication policy that allowed initial access.

Account Takeover and Spear-Phishing Risks

The greatest short-term risk from this breach is not direct financial fraud but account takeover and targeted phishing. With email addresses and names in hand, attackers can:

  • Attempt credential-stuffing attacks on other services where affected individuals reuse passwords.
  • Send highly personalized phishing emails that appear to come from a colleague or a C&W executive.
  • Use job titles to identify high-value targets like finance managers or legal counsel for business email compromise (BEC) attacks.

Anyone whose email appears in this dataset should assume their inbox may become a target for sophisticated phishing campaigns.

Who’s Actually Affected

The breach affects not just Cushman & Wakefield employees but also a significant number of external contacts - clients, contractors, and even former partners whose email addresses were stored in Cushman & Wakefield’s systems. If you have ever done business with the firm, corresponded with a C&W employee, or had your email listed in their CRM, you may be in the leaked dataset. This third-party exposure is a classic supply-chain risk: you can be impacted by a breach at a company you don’t directly work for.

How to Check If You’re Affected

The best way to confirm exposure is to check Have I Been Pwned. Enter the email address you used when communicating with Cushman & Wakefield. If your data appears, consider every piece of exposed information - your name, phone number, and job title - now public. For ongoing coverage of similar breaches, follow our cybersecurity news.

Recommendations

  1. Enforce MFA on all corporate email and communication systems. Even if a password is compromised, multi-factor authentication blocks most credential-stuffing attacks.
  2. Conduct phishing simulations for any individual whose email appears in the leak. They are now a higher-risk target.
  3. Update contact details for any accounts that use the exposed phone number as a recovery method. Attackers may attempt SIM-swapping.
  4. For Cushman & Wakefield: Conduct a full audit of access logs for any systems accessible with the exposed credentials. Assume initial access was gained through a compromised email account.

Security Insight

This breach underscores a persistent failing in enterprise security: the over-reliance on single-factor authentication for business-critical communication channels. Cushman & Wakefield, like many firms in the real estate sector, handles sensitive transaction data but appears to have lacked basic controls like role-based access and credential monitoring. The “pay or leak” model has become the default for data extortion because it works - and it works because too many organizations still treat email as a secure channel rather than a primary attack surface.

Further Reading

Investigate Breaches Safely with NordVPN

Researching exposed data, paste sites, or threat actor infrastructure? Route your OSINT traffic through a VPN to avoid attribution and keep your investigation IP separate from your corporate network.

Get NordVPN for Research

Affiliate link — we may earn a commission at no extra cost to you.

Share:

Never miss a data breach report

Get real-time security alerts delivered to your preferred platform.

Related Breach Reports

Related Across Yazoul

Never Miss a Critical Alert

CVE advisories, breach reports, and threat intel — delivered daily to your inbox.