In April 2026, ShinyHunters claimed to have breached Amtrak, the U.S. national passenger rail service, by compromising the company's Salesforce instance. The group threatened to leak over 9 million records and, after extortion demands were not met, published the dataset publicly.
The released data contains over 2 million unique email addresses along with customer names, physical addresses, and customer support records. The support records reportedly include travel habits and preferences, raising the social-engineering value of the dataset well beyond a standard contact-info dump.
This is Amtrak's third publicly disclosed customer-data incident in six years, following credential-stuffing attacks against Amtrak Guest Rewards accounts in 2020 and 2024. The 2026 incident differs structurally — it involves a direct compromise of Amtrak systems rather than reuse of credentials previously stolen elsewhere.
The data is now indexed and searchable across breach intelligence platforms.
Amtrak (officially the National Railroad Passenger Corporation) is the U.S. national passenger rail operator, founded in 1971 and headquartered in Washington, D.C. The platform supports:
If you have purchased an Amtrak ticket, registered for Guest Rewards, contacted Amtrak customer support, or used the platform to plan travel — your data may be included in this breach.
If reporting is accurate, this breach follows ShinyHunters' established 2025–2026 playbook used across at least 15 organizational compromises.
The method:
Public reporting attributes the Amtrak compromise specifically to a Salesforce instance breach, matching the exfiltration phase of this pattern.
Other organizations breached via the same model in this window include CarGurus, Betterment, Panera, Figure, Optimizely, Crunchbase, and Canada Goose.
This breach carries elevated risk due to travel pattern data tied to identifiable individuals, high-value customer support history usable as pretexting material, a long-tenured rail customer base including frequent business and government travelers, and email + physical address pairing useful for both digital phishing and physical mail-based fraud.
Travel and loyalty platforms intersect with payment, identity, and physical-location data. That increases exploitation value.
⚠️ Do not assume this is low sensitivity.
As of late April 2026, Amtrak has not issued a comprehensive public statement specifically addressing the 2026 Salesforce breach (per available reporting at time of writing).
Context from prior incidents:
The 2026 incident is materially different: it involves a direct compromise of an Amtrak-controlled platform (Salesforce) rather than credential reuse.
A formal Amtrak statement on the 2026 breach is expected as the investigation progresses.
May 2024: Amtrak Guest Rewards credential-stuffing attack. Disclosed to Massachusetts AG on June 14, 2024. Compromised data included names, contact info, Guest Rewards account numbers, dates of birth, partial credit card numbers and expirations, gift card numbers and PINs, and trip/transaction information. In some cases attackers changed account emails and passwords to lock users out before being reverted by Amtrak.
2020: Amtrak Guest Rewards breach in which "some personal information may have been viewed." Threat actor reportedly removed from systems within hours; password resets issued.
The repeated Amtrak victimization (2020, 2024, 2026) reflects elevated targeting of travel and loyalty platforms.
This incident fits a broader campaign targeting SSO and CRM infrastructure through social engineering rather than technical exploitation. Organizations with heavy reliance on centralized identity providers and Salesforce as a customer-data backbone are currently high-value targets. Threat actors have publicly noted the resale value of loyalty program data, and travel metadata remains useful for targeting long after the initial leak.
This was not a stealth scrape. It was a coordinated identity compromise campaign.
© 2026 ObscureIQ. All Rights Reserved.