Hacking group UNC6040 attacks Salesforce instances via vishing

Sicherheit (Pexels, allgemeine Nutzung)[German]I'm posting some more information here that I received from the Google Threat Intelligence Group (GTIG). The security experts have come across a campaign by the hacker group UNC6040 that uses voice phishing (vishing) to compromise Salesforce instances and steal data.


Advertising

What is vishing?

Vishing (which stands for "voice phishing") is a form of telephone fraud in which fraudsters attempt to obtain sensitive information such as login details, credit card numbers or bank details via telephone calls or voice messages.

Visher use fake phone numbers, voice-altering software, text messages and social engineering to trick their victims into revealing confidential information. The scammers often pose as trustworthy institutions to gain the victims' trust.

UNC6040 Salesforce Vishing

Salesforce is a US provider of cloud solutions. The company is considered the world's largest cloud software provider for businesses. The company offers a Data Loader application. This client application enables the mass import or export of data. The Data Loader is intended to be used to insert, update, delete or export Salesforce data records.

With the cybercriminal group UNC6040, which specializes in vishing, the callers pretend to be IT support employees on the phone and try to get called employees to install modified data loader applications (not authorized by Salesforce).

Using these data loader variants, UNC6040 gains access to sensitive data that the employee enters into the application. The attackers can then use this data to penetrate other cloud services and internal company networks.


Advertising

Salesforce warns of this attack

Salesforce has already responded and describes the methodology of abusing the data loader functions through modified apps in its guidelines for protecting Salesforce environments. It is therefore not a Salesforce vulnerability that leads to accounts being compromised, but classic social engineering to trick a user.

Probably 20 organizations affected

The Google Threat Intelligence Group (GTIG) estimates that a limited number of around 20 organizations are currently affected by these activities. The UNC6040 campaign began a few months ago and is still active, according to the statement.

According to the GTIG experts, the UNC6040 group is "opportunistic", i.e. it never misses an opportunity. Targeted industries include hospitality, retail, education and various other sectors in Europe and the Americas.

The organizations compromised in this way are sometimes blackmailed months after the initial breach. According to the experts, this could indicate that UNC6040 has entered into a partnership with a second threat actor who is monetizing the stolen data.

GTIG states that the hackers of UNC6040 claimed to belong to other groups such as ShinyHunters during extortion attempts. It is assumed that this is intended to increase the pressure on the victims.

However, the experts at the Google Threat Intelligence Group (GTIG) are following a different trail or have a suspicion. They have identified extensive overlaps between the infrastructure and TTPs (Tactics, Techniques and Procedures) of UNC6040 and the activities of the underground community "The Com". Therefore, a loose association of cybercriminals is suspected (UNC3944 / Scattered Spider is part of the same ecosystem).

According to GTIG's observations, UNC6040 uses the Okta phishing panels and directly requests MFA (multi-factor authentication) codes. Furthermore, Mullvad VPN IPs are used for data exfiltration.


Advertising

This entry was posted in Security and tagged . Bookmark the permalink.

Leave a Reply

Your email address will not be published. Required fields are marked *

Note: Please note the rules for commenting on the blog (first comments and linked posts end up in moderation, I release them every few hours, I rigorously delete SEO posts/SPAM).