Ransomware victim disclosure
← All victimsMcGraw Hill, Inc. (mheducation.com)
Claimed by shinyhunters · listed 1 month ago
Status timeline
- Listed
Apr 12, 2026
- Data leaked
At a glance
- Group
- shinyhunters
- Status
- Data leaked
- Country
- US
- Sector
- Education
- Listed on leak site
- Apr 12, 2026
About the victim
AI dossier — public-source company profileMcGraw Hill, Inc. (mheducation.com) is a leading American educational publisher and digital learning company serving PreK–12, higher education, and medical markets across North America and internationally. The company offers a broad portfolio of digital platforms, textbooks, and adaptive learning tools including Connect, ALEKS, and SIMnet. It operates at significant scale, supporting millions of students and educators globally.
- Industry
- Educational Publishing & EdTech
- Employees
- 1001-5000
- Founded
- 1888
Attack summary
Severity: critical — Claimed exfiltration of 45 million Salesforce records containing PII at massive scale from an educational platform serving students and educators, constituting a critical-scale regulated data breach.ShinyHunters claims to have exfiltrated over 45 million Salesforce records containing personally identifiable information (PII) from McGraw Hill, issuing a final warning deadline of 14 April 2026 to pay or face public data release and additional unspecified 'digital problems.'
Data the group says was taken
AI dossier — extracted from the leak post- Salesforce CRM records
- Personally identifiable information (PII)
- Customer/user account data
What the group claims
Over 45M Salesforce records containing PII data have been compromised. Pay or leak. This is a final warning to reach out by 14 Apr 2026 before we leak along with several annoying (digital) problems that'll come your way. Make the right decision, don't be the next headline. | Updated: 11 Apr 2026 | Warning: FINAL WARNING PAY OR LEAK
Sources
- Victim sitemheducation.com
Source
Indexed 1 month agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
