Back to all incidents

Medtronic — corporate IT breach, ShinyHunters extortion claim

Medical-device giant filed Form 8-K confirming corporate IT breach; ShinyHunters subsequently published the dataset alongside ~40 other victims after Medtronic refused extortion.

Target
Medtronic — corporate IT breach, ShinyHunters extortion claim
Date public
24 April 2026
Sector
Healthcare
Attack type
Data Breach
Threat actor
ShinyHunters
Severity
High
Region
United States

On 24 April 2026, medical-device manufacturer Medtronic publicly confirmed an unauthorised party had accessed data within certain corporate IT systems, filing a Form 8-K with the US Securities and Exchange Commission and posting a notice on its corporate website. The disclosure came a week after the ShinyHunters extortion group listed Medtronic on its dark-web leak site on 17 April, claiming theft of more than nine million records and terabytes of corporate data.

Medtronic’s filing emphasised that the affected systems are “separate from those supporting its medical device products and its manufacturing and distribution operations,” and that the company has identified no impact to product safety, customer connections, or its ability to meet patient needs. The financial impact is not currently expected to be material. The size of the breach as claimed by ShinyHunters has not been independently corroborated, and Medtronic has not confirmed an exact record count.

ShinyHunters has had a busy spring. The same actor cluster has been associated with the Wynn Resorts Oracle PeopleSoft breach in February 2026, the Vercel breach in April, and a wider Salesforce-linked campaign downstream of the Salesloft/Drift OAuth-token theft of August 2025. By 28 April 2026, ShinyHunters had publicly dumped Medtronic’s data alongside roughly forty other victims — including Pitney Bowes, Carnival, Mytheresa, Zara, 7-Eleven, Udemy and Canada Life — after refusing to negotiate. The intrusion mechanism for Medtronic specifically has not been disclosed in primary detail, but fits the wider cluster’s pattern of phishing-compromised employee accounts pivoting into Salesforce CRM data extraction.

A deep-dive will follow once the intrusion chain, the data taxonomy, the negotiation outcome and any independent technical reporting on the Medtronic-specific access route become publicly documented.

Sources

Back to all incidents