Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

New Rowhammer Attack Variant Degrades AI Models on Nvidia GPUs

Over 600 laravel apps exposed to remote code execution due to app_keys leaked on github

Sequoia bets on silence | TechCrunch

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Google publishes vishing group UNC6040 targeting salesforce with fake data loader app
Identity

Google publishes vishing group UNC6040 targeting salesforce with fake data loader app

userBy userJune 4, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

June 4, 2025Ravi Lakshmanan Threat Intelligence/Data Breaches

Google has revealed details of a financially motivated threat cluster that it said to “specialize” in its “specialize” campaign for voice phishing (aka) campaigns designed to violate your organization’s Salesforce instances due to large-scale data theft and subsequent fear torture.

Tech Giant’s Threat Intelligence team is tracking activities under the Moniker UNC6040. It says it shows the characteristics that lie alongside the threat groups with online cybercrime groups known as com.

“Over the past few months, UNC6040 has demonstrated repeated success in violating the network by having operators impersonate IT support personnel when persuading phone-based social engineering engagement,” the company said in a report shared with Hacker News.

Cybersecurity

The approach, added by Google’s Threat Intelligence Group (GTIG), benefits from encouraging English-speaking employees to take actions that provide threat access or to share valuable information such as credentials and to carry out actions that are used to promote theft of data.

Notable aspects of UNC6040 activity include the use of a modified version of Salesforce Data Loader in which victims are deceived to be authorized to connect to the organization’s Salesforce portal during a billing attack. Data Loader is an application used to import, export and update data in bulk within the Salesforce platform.

Specifically, the attacker will guide the target to access the Setup page of the Connected app in Salesforce and approve the modified version of the Data Loader app with a different name or branding (such as “My Ticket Portal”) from its legitimate counterpart. This action allows unauthorized access to Salesforce’s customer environment and data data.

Beyond data loss, the attack acts as a stepping stone for UNC6040 to move laterally through the victim’s network, accessing and harvesting information from other platforms such as OKTA, workplace, and Microsoft 365.

The selected incident also includes the activity of fear tor, but only “a few months” after the first intrusion was observed, indicating an attempt to work with a second threat actor to monetize stolen data and make profits.

“In these attempts at terror, the actor claimed a relationship with the famous hacking group Shinyhunters.

UNC6040 overlaps with groups linked to groups related to the use of OKTA credential targeting and social engineering through IT support. This is a tactic that has been embraced by another financially motivated threat actor who is part of a loose, knit organized group.

In March 2025, the Vising Campaign used social engineering tactics to assist with calls, impersonating IT personnel to place qualifications and approve modified data loader apps, and using social engineering tactics to warn threat actors.

Cybersecurity

“They are reportedly directing client employees and third-party support workers to phishing pages designed to steal credentials.[.]”com/setup/connect page for adding malicious connected apps,” the company said.

“In some cases, it has been observed that malicious connected apps are modified versions of data loader apps that are published under different names and/or brands. When threat actors access a customer’s Salesforce account or add a connected app, they use the connected app to use them for data.”

This development not only highlights the continued sophistication of social engineering campaigns, but also shows that it is increasingly targeted as a way for IT support staff to gain early access.

“The success of campaigns like UNC6040 leverages these sophisticated vising tactics to show that this approach is an effective threat vector for financially motivated groups seeking to violate the organization’s defenses,” Google said.

“Given the long time frame between early compromises and fear tor, multiple victim organizations and potentially downstream victims could face demand for fear tor in the coming weeks or months.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleReserv raises $25 million Series B to modernize insurance claims with AI and automation
Next Article Four Promotions at TRO As Company Develop Talents
user
  • Website

Related Posts

New Rowhammer Attack Variant Degrades AI Models on Nvidia GPUs

July 12, 2025

Over 600 laravel apps exposed to remote code execution due to app_keys leaked on github

July 12, 2025

Fortinet releases patches for important SQL injection defects in Fortiweb (CVE-2025-25257)

July 11, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

New Rowhammer Attack Variant Degrades AI Models on Nvidia GPUs

Over 600 laravel apps exposed to remote code execution due to app_keys leaked on github

Sequoia bets on silence | TechCrunch

Windsurf CEO goes to Google. Openai’s acquisition is falling apart

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

ICEX Forum 2025 Opens: FySelf’s TwinH Showcases AI Innovation

The Future of Process Automation is Here: Meet TwinH

Robots Play Football in Beijing: A Glimpse into China’s Ambitious AI Future

TwinH: A New Frontier in the Pursuit of Immortality?

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.