Hackers target multinational firms in Salesforce data breach scheme

Hackers target multinational firms in Salesforce data breach scheme

Google's Threat Intelligence Group (GTIG) has discovered a series of targeted cyberattacks orchestrated by a financially motivated threat cluster it tracks as “UNC6040,” with hackers posing as the ShinyHunters extortion group. The attackers are using advanced social engineering tactics, including voice phishing (vishing), to steal sensitive data from multinational companies via their Salesforce platforms.

According to GTIG, the attackers contact English-speaking employees while impersonating IT support personnel. During these calls, they convince victims to install a malicious version of Salesforce's Data Loader, which as a legitimate tool used to import, export, or modify data in Salesforce environments. The attackers exploit Salesforce’s OAuth-based ‘connected apps’ functionality, tricking victims into linking the rogue application to the organization’s systems via a fraudulent connection code.

Once connected, the malicious Data Loader is used to exfiltrate sensitive customer and corporate data from Salesforce instances. GTIG says the attackers then pivot laterally across other connected platforms, including Okta, Microsoft 365, and Meta's Workplace, in search of additional valuable information such as authorization tokens, internal documents, and private communications.

To make the scheme more believable, the attackers disguise the malicious tool with plausible names like “My Ticket Portal” and often reach out under the pretense of resolving technical issues. In several cases, the group was observed using IP addresses linked to Mullvad VPN during the data exfiltration process to mask their origin.

GTIG said that the team observed phishing pages mimicking Okta login portals in the campaign, a tactic similar to cybercrime groups like “The Com” and Scattered Spider.

While some data exfiltration attempts were thwarted by enterprise security tools, GTIG noted that the attackers adapted quickly experimenting with different data packet sizes to avoid detection.


Back to the list

Latest Posts

Cyber Security Week in Review: June 20, 2025

Cyber Security Week in Review: June 20, 2025

In brief: the Langflow, TP-Link and Zyxel flaws exploited in the wild, Russian hackers use ASPs to infiltrate victims’ email accounts, and more
20 June 2025
Russian-linked hackers exploit Google App passwords in email espionage campaign

Russian-linked hackers exploit Google App passwords in email espionage campaign

Victims were tricked into creating and sharing ASPs under the mistaken belief that they are enabling secure communication with the US Department of State.
19 June 2025
FBI-wanted member of ransomware gang arrested in Ukraine, extradited to the US

FBI-wanted member of ransomware gang arrested in Ukraine, extradited to the US

Using custom-developed malware, including ransomware such as LockerGoga, MegaCortex, HIVE and Dharma, the hackers encrypted data on corporate networks.
18 June 2025