Your email could be compromised.
Scan it on the dark web for free – no signup required.
In this edition of Dark Web Digest, we break down a high-impact cyberattack targeting Coca-Cola Europacific Partners (CCEP) – the bottling giant responsible for distributing Coca-Cola products across 29 countries.
Hackers reportedly accessed Salesforce database credentials, exfiltrating over 23 million sensitive records, making it one of the largest known corporate breaches of the year so far.
This attack not only raises alarms for multinational brands but also highlights a growing trend: business-critical platforms like Salesforce are becoming lucrative entry points for cybercriminals.
Key Takeaways
- Scale of the Breach: To be exact, 23,083,391 customer and internal records were allegedly exfiltrated by the hacker group “ShinyHunters.”
- What Was Exposed: Leaked data includes full names, job titles, email addresses, phone numbers, user IDs, internal company notes, and more.
- Root Cause: Attackers exploited CCEP’s access to Salesforce using compromised login credentials, likely via phishing or token theft.
- Security Gap: The breach emphasizes vulnerabilities in third-party SaaS platforms, especially when MFA (multi-factor authentication) is not enforced consistently.
- Protection Tip: Users can run a free PureVPN Dark Web Exposure Scan to see if their email addresses were found in this or related breaches.
Coca-Cola Data Breach – What Happened?
In May 2025, multiple cybersecurity watchdogs began reporting a large-scale breach involving Coca-Cola Europacific Partners, the world’s largest Coca-Cola bottling company. The threat actor – ShinyHunters, a group infamous for high-profile corporate breaches – claimed responsibility for the attack.
They posted evidence of the breach on a dark web forum, showcasing a Salesforce database containing over 23 million records, allegedly stolen from Coca-Cola’s CRM systems.
Cybersecurity experts believe the credentials were either phished or stolen from insecure devices or token caches, highlighting a major concern for companies that rely heavily on cloud services like Salesforce.
In this case, the group claims the Salesforce data was accessed without detection for a prolonged period, suggesting possible weaknesses in real-time monitoring or anomaly detection systems.
What Data Was Leaked?
According to samples reviewed by Hackread, the breach appears to affect Coca-Cola’s operations in the Middle East, with several files indicating that the Dubai office at the Dubai Airport Free Zone (DAFZ) may have been the specific target.
The Everest ransomware gang has released samples that contain employee identification details and documents that typically circulate within HR departments. The nature of the leaked files indicates that personally identifiable information (PII) is involved.
While investigations are still ongoing, initial analyses of the leaked database suggest it includes:
- Account details
- Sales cases
- Contact entries
- Customer service cases
- Product records
- Customer addresses
- Phone numbers
- Visa and passport scans
- Employee salary data
- Order Ids
- Summaries
This mix of internal and customer-facing data poses a significant threat, not only to Coca-Cola’s partners and clients but also to individuals whose data may now be traded or sold on the dark web.
Who Is Behind the Attack?
The Everest ransomware gang says it has breached Coca-Cola’s systems, while another group named Gehenna (aka GHNA) is offering what it claims is a massive database stolen from CCEP’s Salesforce environment.
Reportedly, the Gehenna hacking group claims to have breached CCEP’s Salesforce dashboard, exfiltrated more than 23 million records. It also claimed responsibility for previous incidents affecting Samsung Germany and Royal Mail, adding weight to the seriousness of their statement.
On the contrary, the Everest ransomware group has listed Coca-Cola as a victim on its dark web leak site, sharing screenshots that suggest access to internal documents and personal information.
Interestingly, it’s the second time the Coca-Cola brand has gotten hacker attention this month. Last week, nearly a thousand soft drink makers’ employees had their details exposed alongside confidential internal documents. The attack was claimed by the Everest ransomware cartel.
The tactics used by Everest and Gehenna reflect different approaches, ransomware extortion, and data leak-based pressure, but the goal is similar: to make money out of stolen information.
Coca-Cola’s Response
While CCEP has not issued a detailed public statement, initial reports indicate the company is:
- Conducting a full-scale forensic investigation
- Working with cybersecurity firms and Salesforce to identify breach vectors
- Notifying affected partners and customers
- Reviewing access logs and permission protocols across its SaaS platforms
Whether customer notifications or identity protection services will be offered remains unclear as of May 26, 2025.
Why This Matters – A Wake-Up Call for SaaS Security
This breach serves as a stark reminder that even enterprise-grade platforms like Salesforce can become major points of failure if access controls and identity protections are not rigorously enforced.
- SaaS Exploits Are Rising:
As companies adopt cloud-first tools for CRM, finance, and operations, attackers are increasingly targeting single sign-on credentials, browser tokens, and unattended access points. - Third-Party Tools Need First-Class Security:
Your CRM is only as secure as the device or employee using it. Companies must treat platforms like Salesforce as critical infrastructure, not just productivity tools. - Wider Impact Beyond Coca-Cola:
Salesforce-based breaches have ripple effects. If integrations, partners, or shared environments are involved, the threat surface grows exponentially.
What Can You Do To Stay Safe?
Whether you’re a business professional, employee, or customer, this breach reinforces the need for proactive cybersecurity hygiene:
Check If Your Email Is Exposed
Use PureVPN’s free Dark Web Exposure Scan (also linked above) to check if your data has been leaked. The tool scans known breaches and provides:
- Number of breaches detected
- Recency of data exposure
- Severity level (High / Medium / Low)
Just enter your email and get results in under 30 seconds.
Cyber Hygiene Tips for Individuals
- Use Strong, Unique Passwords: Especially for work-related platforms.
- Enable MFA: Add an extra layer of security to Salesforce and other accounts.
Update Devices & Software: Keep browsers, extensions, and OS fully patched. - Avoid Reused Tokens & Auto-Login: Clear browser sessions and disable “remember me” on sensitive apps.
Use a VPN: A premium VPN like PureVPN encrypts traffic and masks IP to limit potential data leaks.
🛡️ Recommendations for Businesses
- Audit SaaS Access Logs: Monitor for anomalous logins or credential abuse.
- Enforce MFA Everywhere: Across CRM, collaboration tools, and email.
- Invest in SaaS Security Tools: Look into platforms that provide identity, access management, and threat detection for cloud apps.
- Train Teams: Social engineering remains one of the easiest ways in – employee training is key.
- Integrate VPN Solutions: Organizations can create secure, encrypted access to company networks via PureVPN for Teams, safeguarding remote workforces from potential intrusions.
Final Thoughts
The Coca-Cola breach via Salesforce isn’t just a headline – it’s a warning. Even the most trusted business tools can become liabilities when access is compromised.
Whether you’re a global enterprise or a small team using SaaS, visibility, access control, and real-time monitoring are no longer optional; they’re essential.
Stay informed. Stay protected. And always know where your data is going.
Note: The information in this report is based on publicly available data as of May 26, 2025. For the latest updates, consult official statements from CCEP and cybersecurity news platforms.