Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Google says it will sign the EU AI practice code

Chinese companies linked to Silk Typhoons have filed more than 15 patents for Cyberspy Tool

Look inside Pillar’s AI security platform

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Google publishes vishing group UNC6040 targeting salesforce with fake data loader app
Identity

Google publishes vishing group UNC6040 targeting salesforce with fake data loader app

userBy userJune 4, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

June 4, 2025Ravi Lakshmanan Threat Intelligence/Data Breaches

Google has revealed details of a financially motivated threat cluster that it said to “specialize” in its “specialize” campaign for voice phishing (aka) campaigns designed to violate your organization’s Salesforce instances due to large-scale data theft and subsequent fear torture.

Tech Giant’s Threat Intelligence team is tracking activities under the Moniker UNC6040. It says it shows the characteristics that lie alongside the threat groups with online cybercrime groups known as com.

“Over the past few months, UNC6040 has demonstrated repeated success in violating the network by having operators impersonate IT support personnel when persuading phone-based social engineering engagement,” the company said in a report shared with Hacker News.

Cybersecurity

The approach, added by Google’s Threat Intelligence Group (GTIG), benefits from encouraging English-speaking employees to take actions that provide threat access or to share valuable information such as credentials and to carry out actions that are used to promote theft of data.

Notable aspects of UNC6040 activity include the use of a modified version of Salesforce Data Loader in which victims are deceived to be authorized to connect to the organization’s Salesforce portal during a billing attack. Data Loader is an application used to import, export and update data in bulk within the Salesforce platform.

Specifically, the attacker will guide the target to access the Setup page of the Connected app in Salesforce and approve the modified version of the Data Loader app with a different name or branding (such as “My Ticket Portal”) from its legitimate counterpart. This action allows unauthorized access to Salesforce’s customer environment and data data.

Beyond data loss, the attack acts as a stepping stone for UNC6040 to move laterally through the victim’s network, accessing and harvesting information from other platforms such as OKTA, workplace, and Microsoft 365.

The selected incident also includes the activity of fear tor, but only “a few months” after the first intrusion was observed, indicating an attempt to work with a second threat actor to monetize stolen data and make profits.

“In these attempts at terror, the actor claimed a relationship with the famous hacking group Shinyhunters.

UNC6040 overlaps with groups linked to groups related to the use of OKTA credential targeting and social engineering through IT support. This is a tactic that has been embraced by another financially motivated threat actor who is part of a loose, knit organized group.

In March 2025, the Vising Campaign used social engineering tactics to assist with calls, impersonating IT personnel to place qualifications and approve modified data loader apps, and using social engineering tactics to warn threat actors.

Cybersecurity

“They are reportedly directing client employees and third-party support workers to phishing pages designed to steal credentials.[.]”com/setup/connect page for adding malicious connected apps,” the company said.

“In some cases, it has been observed that malicious connected apps are modified versions of data loader apps that are published under different names and/or brands. When threat actors access a customer’s Salesforce account or add a connected app, they use the connected app to use them for data.”

This development not only highlights the continued sophistication of social engineering campaigns, but also shows that it is increasingly targeted as a way for IT support staff to gain early access.

“The success of campaigns like UNC6040 leverages these sophisticated vising tactics to show that this approach is an effective threat vector for financially motivated groups seeking to violate the organization’s defenses,” Google said.

“Given the long time frame between early compromises and fear tor, multiple victim organizations and potentially downstream victims could face demand for fear tor in the coming weeks or months.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleReserv raises $25 million Series B to modernize insurance claims with AI and automation
Next Article Four Promotions at TRO As Company Develop Talents
user
  • Website

Related Posts

Chinese companies linked to Silk Typhoons have filed more than 15 patents for Cyberspy Tool

July 30, 2025

Look inside Pillar’s AI security platform

July 30, 2025

Apple Patches Safari vulnerability was also exploited as zero day in Google Chrome

July 30, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Google says it will sign the EU AI practice code

Chinese companies linked to Silk Typhoons have filed more than 15 patents for Cyberspy Tool

Look inside Pillar’s AI security platform

Apple Patches Safari vulnerability was also exploited as zero day in Google Chrome

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

New Internet Era: Berners-Lee Sets the Pace as Zuckerberg Pursues Metaverse

TwinH Transforms Belgian Student Life: Hendrik’s Journey to Secure Digital Identity

Tim Berners-Lee Unveils the “Missing Link”: How the Web’s Architect Is Building AI’s Trusted Future

Dispatch from London Tech Week: Keir Starmer, The Digital Twin Boom, and FySelf’s Game-Changing TwinH

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.