Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

VC Marcia Butcher, an associate of Epstein and founder of Day One, explains it herself.

Google sends student journalists’ personal and financial information to ICE

Almost half of xAI’s founding team has now left the company.

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » The FBI warns UNC6040 and UNC6395 targeting Salesforce platforms in data theft attacks
Identity

The FBI warns UNC6040 and UNC6395 targeting Salesforce platforms in data theft attacks

userBy userSeptember 13, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

The US Federal Bureau of Investigation (FBI) has issued a flash alert to release Compromise Indicators (IOCs) related to two cybercrime groups tracked as UNC6040 and UNC6395 due to a series of data theft and tor attacks.

“It has been observed that both groups have recently been targeting their organization’s Salesforce platform through various early access mechanisms,” the FBI said.

UNC6395 is a threat group caused by a wide range of data theft campaigns targeting Salesforce instances in August 2025 by leveraging compromised OAUTH tokens from the SalesLoft Drift application. In an update published this week, SalesLoft said that violations of GitHub accounts from March to June 2025 made the attack possible.

As a result of the violation, SalesLoft has isolated the drift infrastructure and took the Artificial Intelligence (AI) chatbot application offline. The company also said it is in the process of implementing a new multifactor certification process and GitHub cure countermeasure.

Audit and subsequent

“We are focusing on the continuous curing of our drift application environment,” the company said. “This process involves rotating credentials, temporarily disabling certain parts of the drift application and enhancing security configurations.” “At this point, we advise all drift customers to treat all drift integrations and related data as potentially impaired.”

The second group the FBI calls attention is UNC6040. UNC6040, rated active since October 2024, is the name Google has assigned to a financially motivated threat cluster, engaged in a billing campaign to gain initial access and hijack sales force instances for large-scale data theft and fear tor.

These attacks use a modified version of Salesforce Data Loader app and custom Python scripts to violate the victim’s Salesforce portal and remove valuable data. At least some of the incidents involved fear tor activity after the UNC6040 break-in, and took place several months after the initial data theft.

“The UNC6040 threat actors use phishing panels and are instructing victims to visit from their mobile phones or work computers during social engineering calls,” the FBI said. “After gaining access, the UNC6040 threat actors used API queries to remove a large amount of data.”

The Fear Tor stage is attributed to another uncategorized cluster tracked by Google as UNC6240, which consistently claims to be the Shinyhunters group in emails and phone calls to employees of the victim organization.

“We also believe that threat actors using the ‘Shinyhunters’ brand may be preparing to escalate the tactics of fear tor by launching a data leak site (DLS),” Google said last month. “These new tactics may be aimed at increasing pressure on victims, including those related to the recent UNC6040 Salesforce-related data breaches.”

Most notable since then is the team-up of Shinyhunters, Spricded Spider and Lapsus $ to integrate and consolidate criminal efforts. Then, on September 12, 2025, the group claimed they were shutting down on their telegram channel with “scattered Lapsus $Hunters 4.0”.

CIS Build Kit

“We decided that lapsus $, trihash, yurosh, yaxsh, wytrozz, n3z0x, nitroz, toxiqueroot, prosox, pertinax, kurosh, clown, intelbroker, spitsed spider spider spider and many others would be dark. “Our purpose has been fulfilled. Now is the time to say goodbye.”

It is currently unclear why the group started cutting their boots, but this movement could be a slow and attempt to avoid the attention of law enforcement agencies.

“The newly formed scattered Lapsus $Hunters 4.0 group said ‘Go Dark’ after French law enforcement allegedly arrested another wrong person in connection with a cybercrime group,” Sam Rubin, senior vice president of consulting and threat intelligence for Unit 42, told Hacker News. “These declarations rarely inform you of a true retirement.”

“Recent arrests may have made the group lower, but history tells us that this is often temporary. This shard, rebranding, resurfaced groups – even if the public works are suspended, stolen data could be played. It hasn’t disappeared, it’s just adapted.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleRAM will end the EV pickup truck plan
Next Article JWST finds all carbon-ambient planets orbiting the “Black Widow” star
user
  • Website

Related Posts

North Korean agents impersonate experts on LinkedIn to infiltrate companies

February 10, 2026

Reynolds ransomware embeds BYOVD drivers that disable EDR security tools

February 10, 2026

Inside the rise of the digital parasite

February 10, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

VC Marcia Butcher, an associate of Epstein and founder of Day One, explains it herself.

Google sends student journalists’ personal and financial information to ICE

Almost half of xAI’s founding team has now left the company.

North Korean agents impersonate experts on LinkedIn to infiltrate companies

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.