Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
What's Hot

A detained Colombian alumni asserts “irreparable harm” to his career and family when he sues for release

New York won’t retract Native American mascot ban despite Trump’s threat

Things the Trump administration needs to know when tuition fees for students without legal status target breaks

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
Fyself News
Home » Google publishes vishing group UNC6040 targeting salesforce with fake data loader app
Identity

Google publishes vishing group UNC6040 targeting salesforce with fake data loader app

userBy userJune 4, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

June 4, 2025Ravi Lakshmanan Threat Intelligence/Data Breaches

Google has revealed details of a financially motivated threat cluster that it said to “specialize” in its “specialize” campaign for voice phishing (aka) campaigns designed to violate your organization’s Salesforce instances due to large-scale data theft and subsequent fear torture.

Tech Giant’s Threat Intelligence team is tracking activities under the Moniker UNC6040. It says it shows the characteristics that lie alongside the threat groups with online cybercrime groups known as com.

“Over the past few months, UNC6040 has demonstrated repeated success in violating the network by having operators impersonate IT support personnel when persuading phone-based social engineering engagement,” the company said in a report shared with Hacker News.

Cybersecurity

The approach, added by Google’s Threat Intelligence Group (GTIG), benefits from encouraging English-speaking employees to take actions that provide threat access or to share valuable information such as credentials and to carry out actions that are used to promote theft of data.

Notable aspects of UNC6040 activity include the use of a modified version of Salesforce Data Loader in which victims are deceived to be authorized to connect to the organization’s Salesforce portal during a billing attack. Data Loader is an application used to import, export and update data in bulk within the Salesforce platform.

Specifically, the attacker will guide the target to access the Setup page of the Connected app in Salesforce and approve the modified version of the Data Loader app with a different name or branding (such as “My Ticket Portal”) from its legitimate counterpart. This action allows unauthorized access to Salesforce’s customer environment and data data.

Beyond data loss, the attack acts as a stepping stone for UNC6040 to move laterally through the victim’s network, accessing and harvesting information from other platforms such as OKTA, workplace, and Microsoft 365.

The selected incident also includes the activity of fear tor, but only “a few months” after the first intrusion was observed, indicating an attempt to work with a second threat actor to monetize stolen data and make profits.

“In these attempts at terror, the actor claimed a relationship with the famous hacking group Shinyhunters.

UNC6040 overlaps with groups linked to groups related to the use of OKTA credential targeting and social engineering through IT support. This is a tactic that has been embraced by another financially motivated threat actor who is part of a loose, knit organized group.

In March 2025, the Vising Campaign used social engineering tactics to assist with calls, impersonating IT personnel to place qualifications and approve modified data loader apps, and using social engineering tactics to warn threat actors.

Cybersecurity

“They are reportedly directing client employees and third-party support workers to phishing pages designed to steal credentials.[.]”com/setup/connect page for adding malicious connected apps,” the company said.

“In some cases, it has been observed that malicious connected apps are modified versions of data loader apps that are published under different names and/or brands. When threat actors access a customer’s Salesforce account or add a connected app, they use the connected app to use them for data.”

This development not only highlights the continued sophistication of social engineering campaigns, but also shows that it is increasingly targeted as a way for IT support staff to gain early access.

“The success of campaigns like UNC6040 leverages these sophisticated vising tactics to show that this approach is an effective threat vector for financially motivated groups seeking to violate the organization’s defenses,” Google said.

“Given the long time frame between early compromises and fear tor, multiple victim organizations and potentially downstream victims could face demand for fear tor in the coming weeks or months.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleReserv raises $25 million Series B to modernize insurance claims with AI and automation
Next Article Four Promotions at TRO As Company Develop Talents
user
  • Website

Related Posts

The Digital Driver’s License (DDL): Is Your ID Ready for the Virtual Era?

June 5, 2025

Popular Chrome Extensions leak API keys, user data over HTTP, and hardcoded credentials

June 5, 2025

Researchers detail the evolving tactics of bitter apt as its geographical extent expands

June 5, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

A detained Colombian alumni asserts “irreparable harm” to his career and family when he sues for release

New York won’t retract Native American mascot ban despite Trump’s threat

Things the Trump administration needs to know when tuition fees for students without legal status target breaks

Top 10 Startup and Tech Funding News – June 5, 2025

Trending Posts

Sana Yousaf, who was the Pakistani Tiktok star shot by gunmen? |Crime News

June 4, 2025

Trump says it’s difficult to make a deal with China’s xi’ amid trade disputes | Donald Trump News

June 4, 2025

Iraq’s Jewish Community Saves Forgotten Shrine Religious News

June 4, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Top 10 Startup and Tech Funding News – June 5, 2025

AI Startup Filament Syfter raises $4.8 million to fix broken data stacks with private equity

Reddit sues mankind to train AI model Claude without permission by cutting down user data

Automatic transportation startup plus is published at a $1.2 billion valuation in SPAC transactions

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.