VERIFIED — Claim 1: The web search confirms: "The breach, which was initially disclosed by the university in November 2025" and "November 18, 2025" with "1,160,707 rows" — though the infostealers.com article cites "approximately 115,000 sensitive records" while DataBreach.com states "1,160,707 rows" and "1,781,261 Full Names" in the published data. There's a discrepancy in record counts across sources. I should cite the specific figures found.
Claim 2: McGraw-Hill April 12, 45M records, 100GB
From my search results: "@TMRansomMon... dark web monitoring on 2026-04-12" and "@DailyDarkWeb... McGraw-Hill... exposing approximately 45 million records and 100GB of data."
VERIFIED — Claim 2: The tool output confirms the date (April 12), the record count (45 million), and the data volume (100GB).
Claim 3: April 17 mega-campaign, April 21 deadline, nine organizations, 100M+ records
From my search results: "@VECERTRadar... ShinyHunters threat group conducted a massive global extortion campaign targeting major corporations with a deadline of April 21, 2026... at least nine major organizations, exfiltrating over 100 million records collectively... Marcus & Millichap (30M records), Pitney Bowes (25M), Medtronic (9M), Carnival (8.7M)."
VERIFIED — Claim 3: The tool output confirms the date (VECERTRadar post April 17), the deadline (April 21), the number of organizations (nine), the total records (over 100 million), and the named victims.
Claim 4: ADT April 20 breach via Okta vishing, April 27 deadline
From my search results: "@Xploitzone_01... ShinyHunters extortion group breached ADT Inc. on April 20, 2026... vishing attack targeting an employee's Okta SSO account... extortion demands by April 27, 2026."
VERIFIED — Claim 4: The tool output confirms the date (April 20), the method (vishing → Okta), and the deadline (April 27).
Claim 5: Rockstar Games, Anodot third-party token compromise → Snowflake access
From my search results: "Rockstar Games suffered a data breach through compromised authentication tokens from Anodot, a third-party SaaS analytics platform integrated with their Snowflake data warehouse."
VERIFIED — Claim 5: The tool output confirms Anodot as the third-party, tokens as the compromise vector, and Snowflake as the downstream target.
All five claims have tool support. However, I need to correct the Harvard record count discrepancy. The sources show conflicting figures: 115,000 vs. 1,160,707 vs. 1,781,261. I should acknowledge this or use the range.
Here are the specific changes I'm making to my prior response:
Harvard record count correction: Replace "1.16M" with "1,160,707 rows (per DataBreach.com) though other sources cite approximately 115,000 sensitive records" to reflect the discrepancy across sources.
Harvard disclosure date precision: Confirm "November 18, 2025" as the disclosure date per DataBreach.com source.
No other changes required — Claims 2-5 are fully supported by exact tool output figures.
The core analysis stands: ShinyHunters' credibility is high based on consistent execution, the attack vector is identity-layer/SaaS integration abuse, and the TeamPCP credential ecosystem connection remains a moderate-confidence assessment pending further technical analysis.