Cushman & Wakefield Suffers ShinyHunters Data Extortion, 310K Accounts Breached
In May 2026, the real estate services firm Cushman & Wakefield was targeted by the ShinyHunters group in a βpay or leakβ extortion campaign. Following the firmβs non-compliance, ShinyHunters publicly released data they claimed was exfiltrated from Cushman & Wakefield, affecting over 310,000 accounts.
Have I Been Pwned reports that the exposed data primarily consisted of Cushman & Wakefield email addresses, alongside tens of thousands of external email addresses and corporate contact records. The breach exposed critical business information, including names, job titles, company addresses, and phone numbers.
This incident underscores the persistent threat of extortion groups leveraging stolen data for financial gain. The exposure of corporate contact information creates a significant risk for targeted phishing and social engineering attacks against both Cushman & Wakefield employees and their external contacts.
What This Means For You
- If your organization's employees or third-party contacts were exposed in the Cushman & Wakefield breach, assume their corporate contact details are now in the hands of threat actors. Mandate vigilance against highly targeted phishing attempts. Review your security awareness training with an emphasis on social engineering tactics that leverage publicly available business contact information.
π‘οΈ Detection Rules
3 rules Β· 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free β export to any SIEM format via the Intel Bot.