NordVPN Investigates Alleged Salesforce and Jira Data Leak Following Hacker Claims

Thuranira John Kobia  - Tech Journalist
Last updated: January 5, 2026
Share
NordVPN Investigates Alleged Salesforce & Jira Data Leak Following Hacker Claims
  • A bad actor going by 1011 claimed to have used a brute-force attack to gain unauthorized access into NordVPN’s internal development & operations infrastructure through a  misconfigured development server.
  • The compromised server was said to have been a gateway to sensitive data belonging to Salesforce and Jira including 10+ database source codes, Jira Tokens, Salesforce API keys, and SQL tables.
  • Nord Security investigated and debunked the claims assuring users that no such breach occurred and the paraded information belongs to a third-party site.

NordVPN recently investigated the announcement of a bad actor by the alias “1011” claiming to be responsible for a leak related to its internal Salesforce and development data on a dark web platform.

Based on cybersecurity monitoring reports, the hacker claimed to have accessed the internal systems linked to Salesforce & Jira. As of today January 5, NordVPN confirmed that the breach was false and there hasn’t been any evidence suggesting that its customers browsing activities or VPN data was exposed.

Threat actor posts many sample SQL dumps & screenshots

To prove the claims, the threat actor had exposed screenshots and SQL dumps online. According to reports by security monitoring sites, the samples had data tables such as salesforce api step details and api keys. This was to show that access to backend schema structures and data related to integration actually happened as the hacker “1011” claimed.

It also showed that the exposed environment contained multiple database source codes, authentication records, and configuration details. To further confirm the claims the threat actor revealed that it exfiltrated over 10 database source code files from the environment it breached.

Attackers also exposed other sensitive data, including Jira tokens, Salesforce API keys, and credentials used for automation and internal system communication. On January 4, 2026, researchers on cybersecurity that monitor the activities on the dark web confirmed the existence of the listing.

However, they’re yet to confirm if the data listed is legit because there’s no evidence of any impact on NordVPN’s customer information or production infrastructure.

This incident underscores the critical role of dark web monitoring in early threat detection, even as the tools available for the public to perform such scans are shifting, highlighted by the news that millions will lose free dark web scans as google retires key privacy tool.

Data leak through misfigured development server

In a report of the incident, CyberPress disclosed that the bad actor claimed to have exploited a misconfigured development server vulnerable to brute-force access. After gaining access, 1011 claimed to have accessed and taken database backups and stored configuration files.

According to security researchers at CyberPress, development environments are usually more susceptible to attacks because they house sensitive credentials but lack the same level of monitoring and access controls usually present in production systems. If confirmed, the exploit could enable unauthorized integration access when internal development data links to live systems.

This particular breach is even more concerning because any leak of API keys & Schema linked to Salesforce will expose workflow designs, user access flows and automation scripts. The exposure of such core integration and user data blueprints represents a significant privacy and security failure, precisely the type of systemic risk that is drawing increased scrutiny from regulators (as seen in the recent move where the US’s FTC seeks privacy information from video streaming and social media giants).

Also, security experts believe that even if the bad actors don’t sell the stolen data, exposing such credentials can enable other threat actors to attack the site. Amidst the claims by the bad actor and speculations, of the alleged data breach, NordVPN remained silent but continued its investigations. Finally on January 5, NordVPN released a statement debunking the claims and revealing there was no data breach.

NordVPN confirmed that attackers did not breach its internal Salesforce development servers

On January 5, the head of public relations at Nord Security debunked the claims of exploitation on NordVPN’s internal Salesforce development servers. As reported by, Laura Tyrylyte made the statement and further disclosed the steps which the company took after discovering the actor’s allegations on a forum website on January 4.

Tyrylyte stated that the Nord Security started investigations immediately and has now confirmed that there’s no sign of such compromise. Further, she disclosed that the data in the claim did not originate from the internal Salesforce environment or any of the services the hacker mentioned. Instead, the investigation revealed that the configuration files were linked to a third-party site.

Share this article

About the Author

Thuranira is a privacy expert who is always excited about security empowerment through technology. He loves sharing his tech expertise with everyday users so that they can enjoy a better life online.

More from Thuranira John Kobia

Comments

No comments.