7-Eleven has confirmed a data breach affecting its internal systems, with the attack traced back to April 8, 2026. The 7-Eleven data breach exposed documents tied to the company’s franchise application process, and the group behind it wasted no time making demands. ShinyHunters, one of the most active cybercrime groups operating today, claimed responsibility and threatened to publish stolen data unless a ransom was paid.
What Was Stolen
ShinyHunters claimed to have pulled over 600,000 Salesforce records from 7-Eleven’s systems. The group described the haul as containing personally identifiable information and internal corporate data. In its post on a dark web leak site, the group stated the company had refused to negotiate despite being given multiple chances.
The breach notification letter 7-Eleven filed with the Maine Attorney General’s Office on May 15 tells a more specific story. The exposed files came from systems used to store franchisee documents, specifically information submitted during the franchise application process. The company confirmed it launched an investigation immediately after discovering the intrusion.
At this point, the total number of affected individuals remains unclear. 7-Eleven has not confirmed how many franchisees were impacted. The company is notifying those affected and offering two years of free credit monitoring as part of its response.
How ShinyHunters Got In
The attackers gained entry through 7-Eleven’s Salesforce environment. Salesforce is a customer relationship management platform that businesses use for sales data, marketing automation, and customer service operations. It holds large volumes of sensitive records, which makes it a high-value target.
ShinyHunters has been running a sustained campaign against Salesforce environments since mid-2025. The intrusions are not the result of flaws in Salesforce’s own software. Instead, the group exploits weak points around the platform — including voice phishing attacks targeting IT workers, misconfigurations, and abuse of third-party integrations. This is a people-and-process problem, not a product vulnerability.
The attack on 7-Eleven fits directly into that pattern.
The Extortion Timeline
ShinyHunters listed 7-Eleven on its dark web leak site on April 17, giving the company until April 21 to pay. When no agreement was reached, the group published what it described as 9.4 GB of compressed 7-Eleven records on April 22. The group also offered to sell the data for $250,000 on a popular hacker forum.
“The company failed to reach an agreement with us despite our incredible patience, all the chances and offers we made. They don’t care,” ShinyHunters wrote when dumping the data.
This follow-through is consistent with how ShinyHunters operates. The group sets a deadline, waits, and publishes if the ransom is not paid. It is a pressure tactic designed to maximize urgency and embarrassment.
Why Franchise Systems Are a Weak Point
7-Eleven operates nearly 13,000 franchise locations across the US and Canada, with over 85,000 stores worldwide. That scale means its internal systems interact with a large and diverse network of franchisees, each submitting documents, applications, and operational data.
Ensar Seker, CISO at SOCRadar, explained that franchise ecosystems carry a different risk profile than centralized businesses. Even when customer-facing systems are untouched, franchisee portals often hold sensitive operational, financial, legal, and identity-related documentation. That data can be used for fraud, extortion, social engineering, or supply chain attacks. The breach of a franchisee portal is not a minor incident — it can expose a wide range of people who interacted with the business at a structural level.
ShinyHunters Is Not Slowing Down
This breach does not stand alone. ShinyHunters has named Zara, Carnival, Pitney Bowes, Canada Life, Medtronic, Instructure, Vimeo, Vercel, and Rockstar Games as victims in recent months. The group has claimed to have hit over 700 organizations through Salesforce-linked campaigns, with billions of records allegedly stolen across all operations.
French authorities arrested four alleged ShinyHunters members in June 2025, but the group has continued operating. Security researchers note that either the arrests failed to reach the group’s core operators, or other actors have taken on the ShinyHunters identity and continued its methods.
The campaign shows no signs of stopping. The group has a consistent playbook — target cloud platforms that aggregate data across multiple organizations, then extort each victim individually. It has proven effective, and the 7-Eleven breach is the latest proof.
Final Thoughts
The 7-Eleven data breach is a clear example of what happens when large organizations rely on cloud platforms without hardening the access points around them. ShinyHunters did not break Salesforce. It broke the trust, process, and access controls that surrounded it. Franchisees who submitted personal and business information during the application process now face exposure they had no reason to anticipate.
The full scope of the breach is still being determined. If you received a notification from 7-Eleven, take the credit monitoring offer seriously and review your financial accounts for any unusual activity.