HIGH SEVERITY

UPS Data Breach

UPS Logistics Company Breach (Salesforce, 2025): 29.6 Million Customer Contact Records Including Home Address Exposed

Global logistics and delivery company.

Verified by ObscureIQ Intelligence

7.0Severity
29.6MRecords
4Fields
2025Year

ObscureIQ Breach Intelligence Scores
0.0
Breach Risk Index
10
Data Value
0
Market Recency
0
days
Since Breach

Risk Interpretation

Exposure enables package scams, delivery impersonation, phishing, and household or business targeting. Shipping data is highly actionable because it is time-sensitive and easy to weaponize.

🎯 Impact & Downstream Threats

The 2025 incident was part of the Scattered LAPSUS$ Hunters campaign against Salesforce customer environments, in which the group exploited OAuth token abuse and social engineering to access CRM data across dozens of major organizations. UPS was listed among approximately 39 named victims on the group's dark web leak site, with a sample of customer records including names, email addresses, phone numbers, and home addresses published in October 2025. Salesforce stated the incidents related to pas

Primary downstream threats:
  • SIM swap attacks where phone numbers are present
  • Targeted phishing campaigns using exposed email addresses
  • Doxxing risk from physical address exposure

🔓 Threat Vectors

Phishing, credential stuffing & account takeover
Name-based social engineering
SIM swapping, vishing & SMS phishing
Physical stalking, mail fraud & identity verification
Home targeting, stalking & physical threat

📋 Breach Intelligence

EntityUPS
OrganizationPublic Company • USA / Global
Breach Date2025-10-10
DBC Added2025-10-03
Records~29.6M (29,618,000 records)
Attack VectorUnknown
Threat ActorScattered Lapsus$ Hunters
Data SubjectsCustomer: Direct
Breach PathwaySupply_Chain:Platform
Supply ChainSalesforce
SourceDataBreach.com / ObscureIQ
SensitivityStandard
Breach ID1400.0
StatusConfirmed

📝 Executive Summary

UPS, one of the world's largest package delivery companies, was caught up in a supply chain breach targeting Salesforce customer environments in late 2025. A threat group calling itself "Scattered LAPSUS$ Hunters" exploited OAuth token abuse and social engineering to access CRM (customer relationship management) data across dozens of major organizations. UPS was listed among roughly 39 named victims on the group's dark web leak site. The attackers released a sample of the stolen UPS database on October 3, 2025, and claimed the full dataset, affecting an estimated 29.6 million records, would be released the following week. Salesforce attributed the incidents to past or customer-side security lapses rather than a compromise of its core platform. The exposed data includes full names, email addresses, phone numbers, and mailing addresses, including street, city, state, ZIP code, and country. For some records, precise geolocation coordinates tied to shipping addresses were also present. Internal UPS account details, such as account numbers, customer segments, and business unit information, were found in the sample as well. For a package delivery company, this combination of data is especially dangerous. Home addresses tied to a known delivery relationship make affected individuals vulnerable to package interception fraud, delivery impersonation scams, and targeted phishing attacks that convincingly mimic UPS communications. The same risk pattern was observed in a parallel breach affecting FedEx from the same campaign. UPS has not issued detailed public statements about the scope of its exposure or its specific response. Salesforce has similarly declined to characterize the incidents as a platform-level failure. No regulatory action or class action litigation has been publicly confirmed as of the time of this writing. Affected individuals should treat any delivery-related messages, whether by email, phone, or text, with heightened suspicion. They should verify communications directly through the official UPS website rather than clicking links or calling numbers provided in unsolicited messages.

🏢 About UPS

UPS is one of the world's largest package delivery and supply chain management companies, operating a global network of ground and air transportation, logistics, and freight services. Headquartered in Atlanta, Georgia, the company is publicly traded on the NYSE and serves businesses and consumers across more than 200 countries and territories. Its operations span e-commerce fulfillment, international freight, customs brokerage, and healthcare logistics.

Company | Logistics and package delivery | Transportation and supply chain network | Global
Public CompanyUSA / Globalups.com

🗂 Why They Hold Your Data

Transportation and supply-chain networks collect shipper and recipient identity, addresses, phone numbers, shipment history, delivery instructions, and business logistics records.

📰 Recent Developments

UPS has been navigating a period of volume and revenue pressure following the pandemic-era delivery surge. The company executed significant workforce reductions in 2023 and 2024 as part of a cost restructuring program, including a major reduction following renegotiated terms with its largest customer Amazon. It reached a new five-year contract with the Teamsters union in 2023 following strike threats. The Scattered LAPSUS$ Hunters Salesforce campaign in late 2025 was the primary data security event of the period.

🔍 Data Points Exposed

4 verified field types:
Email
Phone Number
Name
Home Address

Exposure Categories

LocationPHYS ADDR

Canonical Fields

email_address, full_name, phone_number, physical_address:home

🌐 Dark Web Verification

Confirmed
  • Dataset containing ~29.6M records identified in breach intelligence sources
  • Data indexed and searchable across breach notification platforms
  • Source: ups-salesforce-2025

🛡 Recommended Actions

⚠️ Do not assume this is low sensitivity.

1Freeze Your Credit
Place a credit freeze with Equifax, Experian, and TransUnion.
2Expect Targeted Phishing
Watch for emails referencing this breach. Verify through official channels.
3Enable MFA Everywhere
Enable multi-factor authentication on all accounts.
4Monitor Accounts
Watch for unauthorized activity on financial and personal accounts.
5Check Your Exposure
ObscureIQ clients: this breach is indexed in your profile.

Protect Yourself

Check If You’re Affected

Enter your email to check if your data appears in this breach.

Get Free Breach Alerts

Be the first to know when new breaches are disclosed.

High-Risk? Get an Exposure Audit

Full-spectrum exposure audits for executives and public figures.

Request Consultation

ObscureIQ Advisory

We combine proprietary dark web access with commercial and restricted breach intelligence to verify exposure and assess real-world risk.

If you are:
  • A public-facing individual
  • A high-profile executive
  • A customer of UPS
  • Or concerned about credential reuse
Services
AuditsWipesThreat MonitoringTraining

Classification Tags

EmailPhoneAddress

Powered by the ObscureIQ Breach Intelligence Database

© 2026 ObscureIQ · All Rights Reserved · Data Licensing

Latest from ObscureIQ

Credit

What Is Credit Monitoring? And Do I Want It? (Answer: Not Really)

July 14, 2025
Every time there’s a major data breach, companies scramble to offer “free” credit monitoring. It sounds like a responsible move.…
breach economycredit freezecredit scoreequifaxexperian
Credible Threats

Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars.

September 2, 2025
Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars. Over 80% of security incidents now start in the browser. Chrome.…
brave browserbreachesbrowser exploitbrowserschrome
Analysis

Sextortion Spam

May 10, 2025
Sextortion scams aren’t new, but they remain one of the most effective forms of cyber-enabled fraud. These scams don’t rely…
bitcoindeadlinefeargoogle maps apiransom