Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025

Microsoft helps CBI disassemble the Indian Centers for Japanese Technical Support

June 6, 2025

Expand users’ capabilities and protect against Genai data loss

June 6, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Google exposes Vishing Group UNC6040 target on Salesforce with a fake app for a data loader
Global Security

Google exposes Vishing Group UNC6040 target on Salesforce with a fake app for a data loader

AdminBy AdminJune 4, 2025No Comments4 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


04 June 2025Red Lakshmanan Threat of intelligence / data violation

Google revealed the details of the financially motivated threat cluster stating that he was “specializing” on voice phishing (AKA Vishing) aimed at violating copies of organizations for large -scale data theft and subsequent extortion.

Intelligence team at threat of technological giant tracks activity under nickname Unc6040which, according to his words Com.

“Over the past few months, UNC6040 has demonstrated repeated success in violation of networks, forcing him to bring himself to his support employee in a convincing telephone based on telephone engineering,” company company company – Note In a report that shared with Hacker News.

Cybersecurity

This approach, Google Group Group Group (GTIG), has benefited to cheat on English -speaking staff to perform a threat to the subjects or lead to valuable information such as powers that are then used to facilitate theft.

The characteristic aspect of the UNC6040 activity involves the use of a modified version of SalesForce’s Data loader that victims are cheating on the permit to connect to the Salesforce portal of the organization during an emergency attack. Data Loader is an app used to import, export and update the Salesforce platform.

In particular, the attackers direct the goal to visit the Salesforce page connected app and approve the modified version of the Data Loader application, which bears another name or branding (such as “my ticket portal”) from a legitimate colleague. This action gives them unauthorized access to the SalesForce customer environment and exfiltrate data.

In addition to losing data, the attacks serve as a UNC6040 stepping point to move toward the victim network, and then access and procurement information from other platforms such as OKTA, WorkPlace and Microsoft 365.

The selected incidents also participated in the extortion, but only “a few months” after observing the initial invasion, which testifies to the attempt to monetize and income from the stolen data, presumably in partnership with the second threat actor.

“During these attempts, the actor stated that the famous hacking groups Shinyhunters is likely as a method of pressure on their victims,” ​​Google said.

UNC6040 intersect with computers related orientation to the powers of Okta and the use of social engineering via IT -support, the tactics that covered Scattered spiderAnother financially motivated actor of the threat that is part of the loose team.

Vishing did not go unnoticed by Salesforce, which in March 2025 warned of threatening subjects using social engineering tactics to present himself by IT staff on the phone and cheat on their customers in distributing their powers or approval of a modified data loader application.

Cybersecurity

“It is reported that they incur employees of our customers and third parties to the Phishing Pages, designed for theft of credentials and MFA tokens or forcing users to go to the Login.Salesforce (.) COM/SETUP/Connect to add an angry app”. – Note.

“In some cases, we have noted that the Data Loader app is a modified version of the Data Loader application and/or branding. Once the actor threatens access to the Salesforce customer, or adds an connected application, they use an connected application to avoid data.”

The development not only emphasizes the constant sophistication of social engineering companies, but also shows how IT support workers are increasingly directed as a way to gain original access.

“The success of companies such as UNC6040, using these exquisite VILing, shows that such an approach remains an effective threat vector for financially motivated groups seeking to violate organizational protection,” Google said.

“Given the long terms between the original compromise and the extortion, it is possible that in the coming weeks or months may face requirements for extortion in the coming weeks or months.”

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025

Microsoft helps CBI disassemble the Indian Centers for Japanese Technical Support

June 6, 2025

Expand users’ capabilities and protect against Genai data loss

June 6, 2025

Why are more security leaders choose AEV

June 6, 2025

New data Wiper Pathwiper Data Wiper violates Ukrainian critical infrastructure in 2025 attack

June 6, 2025

Popular Chrome Extensions API leaks, user data via HTTP and Hard Codes

June 5, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025

Microsoft helps CBI disassemble the Indian Centers for Japanese Technical Support

June 6, 2025

Expand users’ capabilities and protect against Genai data loss

June 6, 2025

Why are more security leaders choose AEV

June 6, 2025

New data Wiper Pathwiper Data Wiper violates Ukrainian critical infrastructure in 2025 attack

June 6, 2025

Popular Chrome Extensions API leaks, user data via HTTP and Hard Codes

June 5, 2025

Researchers in detail in detail decisively developing tactics as it expands its geographical volume

June 5, 2025

Iran related

June 5, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025

Microsoft helps CBI disassemble the Indian Centers for Japanese Technical Support

June 6, 2025

Expand users’ capabilities and protect against Genai data loss

June 6, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.