Close Menu
The CISO Brief
  • Home
  • Cyberattacks
    • Ransomware
    • Cybercrime
    • Data Breach
  • Emerging Tech
  • Threat Intelligence
    • Vulnerabilities
    • Cyber Risk
  • Expert Insights
  • Careers and Learning
  • Compliance

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

Unveiling the Dark Side: Spyware, Hacks, and Hidden Threats

June 16, 2025

"Anubis Ransomware: The Wiper That Erases Your Files Forever"

June 16, 2025

WestJet Faces Cyberattack: A Major Disruption

June 16, 2025
Facebook X (Twitter) Instagram
The CISO Brief
  • Home
  • Cyberattacks
    • Ransomware
    • Cybercrime
    • Data Breach
  • Emerging Tech
  • Threat Intelligence
    • Vulnerabilities
    • Cyber Risk
  • Expert Insights
  • Careers and Learning
  • Compliance
The CISO Brief
Home » Vishing Crew Targets Salesforce Data
Cyber Risk

Vishing Crew Targets Salesforce Data

Staff WriterBy Staff WriterJune 4, 2025No Comments4 Mins Read0 Views
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest WhatsApp Email


Members of a financially motivated threat group are impersonating IT support staff in convincing phone calls and talking employees into granting access to their organization’s Salesforce environments.

Over the past several months, the threat actor, whom Google’s threat intelligence group is tracking as UNC6040, has breached multiple organizations in this fashion and stolen large volumes of data from within their Salesforce platforms with a view to extort them later. Many of the victims have been within English-speaking branches at large multinational companies.

No Hack Attacks

“A prevalent tactic in UNC6040’s operations involves deceiving victims into authorizing a malicious connected app to their organization’s Salesforce portal,” Google said in a blog post this week. “This application is often a modified version of Salesforce’s Data Loader, not authorized by Salesforce.”

UNC6040’s approach in the campaign, according to Google, is simple but effective. It relies entirely on vishing — or voice-based social engineering — rather than on vulnerability exploits or other technical tricks. In such scams, bad actors use phone calls and voice messages to interact directly with targets and smooth-talk them into taking unsafe actions, like disclosing credentials and sensitive data, authorizing malicious apps, and enabling remote access to their systems. The pretexts for the calls and messages can range widely — such as calls impersonating CISA staff, bank employees, or IT support staff.

Related:Vibe Coding Changed the Development Process

Though low-tech, voice phishing has proven so effective that multiple threat groups have incorporated it into their attack playbooks.

In the UNC6040 campaign that Google is tracking, the scam begins with the victim receiving a phone call ostensibly from their organization’s IT department on some support-related pretext. During the call, the threat actor prompts the employee into visiting their Salesforce instance’s connected app setup page and approve a malicious version of Salesforce’s Data Loader app. In doing so, the victim unwittingly grants the threat actor the ability to access, query, and exfiltrate data from the organization’s now-compromised Salesforce environment.

Salesforce Data Loader is an app that allows organizations to bulk import, export, update, or delete Salesforce records using either a command-line option or a user interface. Salesforce has previously warned of attackers increasingly scamming users into adding a malicious version of Data Loader to their Salesforce instance or using vishing to steal credentials and multifactor authentication (MFA) tokens to their Salesforce accounts. Concerns over the trend prompted the company into issuing guidance in March for protecting their Salesforce environments against social engineering threats.

Related:From Code Red to Rust: Microsoft’s Security Journey

Lag Between Data Access and Extortion

Google said it has observed UNC6040 begin to exfiltrate data almost immediately after gaining access to an organization’s Salesforce environment. Following the initial data theft, the threat actor has often moved laterally across the victim network and attempted to access other platforms, such as Okta and Microsoft365, Google said.

In many cases though, UNC6040 has waited for months after the initial compromise and data theft to extort victims, meaning that some compromised organizations are likely to only hear from the threat actor in the coming months. Google interpreted the delay as a sign that UNC6040 has likely partnered with other groups that monetize access to the stolen data. “During these extortion attempts, the actor has claimed affiliation with the well-known hacking group ShinyHunters, likely as a method to increase pressure on their victims,” Google said.

Yoni Shohet, CEO of Valence Security, says UNC6040’s campaign is successful because it exploits a big blind spot many organizations still have around software-as-a-service (SaaS). “Attackers aren’t breaking in through a vulnerability — they’re socially engineering employees into granting them access or providing their credentials — including their multifactor authentication codes,” he says. “Most users can’t tell the difference between a legitimate and a malicious ‘Salesforce Data Loader’ or between a legitimate and a malicious IT support personnel.”

Related:Hundreds of Web Apps Have Full Access to Microsoft OneDrive Files

Other major SaaS platforms continue to be attractive targets for attackers as well because of how organizations use and manage them, Shohet says. These applications are very complex and include many configurations that when misconfigured by either an admin or a business user, can be leveraged by attackers to gain unauthorized access to sensitive data. “Most companies inherently trust these tools, especially when access is linked to reputable providers like Salesforce. But what’s often overlooked is that the responsibility to secure SaaS environments ultimately lies with the customer.”

Salesforce and Google have outlined several measures organizations can take to mitigate exposure to such attacks. Recommended measures include implementing the principle of least-privileged access, especially for tools such as Data Loader, restricting access to Salesforce instances to specific login IP ranges, and enabling MFA.



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleWhy Traditional DLP Fails in the Browser Age
Next Article Michael Rapp Appointed CEO to Lead CompassMSP into Next Phase of Growth
Avatar photo
Staff Writer
  • Website

John Marcelli is a staff writer for the CISO Brief, with a passion for exploring and writing about the ever-evolving world of technology. From emerging trends to in-depth reviews of the latest gadgets, John stays at the forefront of innovation, delivering engaging content that informs and inspires readers. When he's not writing, he enjoys experimenting with new tech tools and diving into the digital landscape.

Related Posts

Why CISOs Must Align Business Objectives & Cybersecurity

June 13, 2025

When Bad Guys Let Their Guard Down

June 12, 2025

Agentic AI Takes Over Gartner’s SRM Summit

June 11, 2025
Leave A Reply Cancel Reply

Latest Posts

Unveiling the Dark Side: Spyware, Hacks, and Hidden Threats

June 16, 20250 Views

"Anubis Ransomware: The Wiper That Erases Your Files Forever"

June 16, 20250 Views

WestJet Faces Cyberattack: A Major Disruption

June 16, 20250 Views

Critical Vulnerabilities Resolved in Tenable Nessus Agent

June 16, 20250 Views
Don't Miss

Big Risks for Malicious Code, Vulns

By Staff WriterFebruary 14, 2025

Attackers are finding more and more ways to post malicious projects to Hugging Face and…

North Korea’s Kimsuky Attacks Rivals’ Trusted Platforms

February 19, 2025

Deepwatch Acquires Dassana to Boost Cyber Resilience With AI

February 18, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to The CISO Brief, your trusted source for the latest news, expert insights, and developments in the cybersecurity world.

In today’s rapidly evolving digital landscape, staying informed about cyber threats, innovations, and industry trends is critical for professionals and organizations alike. At The CISO Brief, we are committed to providing timely, accurate, and insightful content that helps security leaders navigate the complexities of cybersecurity.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Unveiling the Dark Side: Spyware, Hacks, and Hidden Threats

June 16, 2025

"Anubis Ransomware: The Wiper That Erases Your Files Forever"

June 16, 2025

WestJet Faces Cyberattack: A Major Disruption

June 16, 2025
Most Popular

Attackers lodge backdoors into Ivanti Connect Secure devices

February 15, 20255 Views

VanHelsing Ransomware Builder Leaked: New Threat Emerges!

May 20, 20254 Views

SonicWall SMA 1000 series appliances left exposed on the internet

February 14, 20254 Views
© 2025 thecisobrief. Designed by thecisobrief.
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions

Type above and press Enter to search. Press Esc to cancel.