Towerpoint Wealth Ransomware by ShinyHunters (May 2026)
Unverified dark web claim. This report is based on a post observed on a dark web forum. Yazoul Security has not independently verified the authenticity of this claim.
Claim Summary
On April 30, 2026, the ransomware group ShinyHunters allegedly added Towerpoint Wealth, LLC (towerpointwealth.com) to their dark web leak site. The group claims to have compromised Salesforce records containing personally identifiable information (PII) and other internal corporate data. According to the leak site post, this is a “final warning” for the US-based financial services firm to initiate contact by May 4, 2026, before the data is leaked. The threat actor also warned of “several annoying (digital) problems” that will follow the leak. The data volume has not been disclosed. This report is based solely on the group’s unverified claims.
Threat Actor Profile
ShinyHunters is a threat actor group that has been active since at least 2020, primarily known for data extortion and selling stolen databases on underground forums. The group has historically targeted a wide range of industries, including financial services, technology, and e-commerce. Their tactics often involve exploiting misconfigured cloud services, credential stuffing, and SQL injection to gain initial access. While they have been linked to several high-profile breaches, their operational security and tooling remain poorly documented in public research. Notably, ShinyHunters has a reputation for exaggerating the scale of their breaches to pressure victims into paying ransoms. No YARA rules or specific detection guidance for ShinyHunters is publicly available at this time, though organizations should monitor for unusual Salesforce API activity and unauthorized data exports.
Alleged Data Exposure
According to the leak site, the compromised data allegedly includes Salesforce records containing PII and internal corporate data. While no specific data samples or volume have been provided, the mention of Salesforce suggests that customer relationship management data, which may include names, contact details, financial information, and transaction histories, could be at risk. The group has not confirmed the exact nature of the PII, but financial services firms typically store sensitive client data in such systems. The threat actor’s claim of “internal corporate data” further implies that employee records, internal communications, or proprietary business information may also be exposed.
Potential Impact
If the claim is verified, Towerpoint Wealth could face significant regulatory scrutiny under US data protection laws, including potential fines from state attorneys general or the SEC for failure to safeguard client data. Client trust may be eroded, leading to account closures and reputational damage. The alleged leak of Salesforce records could expose clients to identity theft, phishing attacks, and financial fraud. Additionally, the threat actor’s warning of “digital problems” suggests possible follow-on attacks, such as credential stuffing or targeted phishing campaigns against affected individuals. For the financial services sector, such an incident could also trigger mandatory breach notifications to clients and regulators.
What to Watch For
- Leak Site Activity: Monitor ShinyHunters’ leak site for any data publication on or after May 4, 2026.
- Phishing Campaigns: Clients and employees of Towerpoint Wealth should be alert to targeted phishing emails referencing the breach.
- Salesforce Audit: Organizations using Salesforce should review access logs for unusual activity, particularly bulk data exports or API calls from unrecognized IP addresses.
- Regulatory Filings: Watch for any public statements or breach notifications from Towerpoint Wealth or relevant US financial regulators.
Disclaimer
This report is based on unverified claims made by the ransomware group ShinyHunters on their dark web leak site. Yazoul Security has not independently verified the authenticity of the alleged breach, the data volume, or the identity of the victim. Ransomware groups routinely exaggerate or fabricate claims to pressure victims into paying ransoms. No PII, download links, or access credentials are provided in this report. Organizations should treat this information as preliminary and conduct their own due diligence before taking action. For more intelligence on ransomware threats, visit Yazoul Security’s intel section at /intel/.
CTI Research? Separate Your Traffic
Investigating dark web forums, threat actor infrastructure, or malware C2 panels? A VPN isolates your research traffic from your corporate IP. Layer it under Tor or route your sandbox egress through it for clean attribution separation.
Get NordVPN for CTIAffiliate link — we may earn a commission at no extra cost to you.
Never miss a threat intelligence alert
Get real-time security alerts delivered to your preferred platform.
Related Claims
Adelante Soluciones Financieras (Addi.com) — shinyhunters
Entire list of affected schools by Instructure breach — shinyhunters
Instructure Holdings, Inc. (Canva LMS, instructure.com) — shinyhunters
Cushman & Wakefield Inc. — shinyhunters