1080*80 ad

FBI Warns of Hackers Stealing Salesforce Data: UNC6040, UNC6395

FBI Issues Urgent Warning: Hackers Targeting Salesforce Data with Sophisticated Phishing Attacks

A new federal alert has been issued, warning businesses of active cybercriminal campaigns specifically designed to breach Salesforce environments and steal sensitive corporate data. The advisory identifies two distinct threat groups, known as UNC6040 and UNC6395, who are employing sophisticated phishing tactics to compromise user accounts and gain unauthorized access to critical information stored within the popular CRM platform.

This threat is particularly severe because Salesforce often serves as the central nervous system for an organization, housing invaluable customer data, sales pipelines, financial records, and proprietary business intelligence. A successful breach can lead to devastating financial losses, regulatory penalties, and long-term reputational damage.

The Attackers and Their Methods

The primary weapon used by these cybercriminals is a highly convincing and targeted phishing campaign. Unlike generic phishing emails, these attacks are often well-researched and tailored to appear as legitimate communications from trusted services, including Salesforce itself.

The core of the attack involves luring an employee to a fraudulent login page that perfectly mimics the authentic Salesforce portal. Once the unsuspecting user enters their username and password, the attackers capture these credentials in real-time.

Crucially, these threat actors are also deploying techniques to bypass Multi-Factor Authentication (MFA), a security measure many organizations rely on to protect their accounts. Attackers may use methods like “MFA fatigue,” where they repeatedly spam a user with push notifications until one is accidentally approved, or they may use advanced techniques to intercept session cookies, effectively hijacking an already authenticated session.

Why Your Salesforce Data is a Prime Target

Cybercriminals specifically target Salesforce because the data it contains is a goldmine. A breach can expose a wide range of highly sensitive information, including:

  • Personally Identifiable Information (PII): Names, addresses, email addresses, and phone numbers of your customers and leads.
  • Financial Data: Customer transaction histories, billing information, and sales performance metrics.
  • Business Intelligence: Detailed sales pipelines, customer interaction logs, and strategic marketing plans.
  • Proprietary Information: Internal notes and confidential details about business operations and client relationships.

The theft of this data not only allows criminals to commit fraud but also gives them a significant competitive advantage, as they can sell this information to rival companies or use it for further targeted attacks.

Actionable Steps to Protect Your Organization Today

Given the active nature of this threat, it is imperative that businesses take immediate and proactive steps to fortify their Salesforce environments. Relying on basic security measures is no longer sufficient.

  1. Enhance Security Awareness Training: The human element is the first line of defense. Conduct regular, mandatory training for all employees to help them identify sophisticated phishing emails. Teach them to be suspicious of any unexpected requests for login credentials, to hover over links to verify their destination, and to never approve an MFA prompt they did not initiate.

  2. Implement Phishing-Resistant MFA: Not all MFA is created equal. Move beyond simple SMS codes or push notifications, which can be compromised. Adopt phishing-resistant MFA solutions like FIDO2 security keys or hardware tokens. These methods require physical interaction and cannot be phished remotely, providing a much higher level of assurance.

  3. Enforce the Principle of Least Privilege: Ensure that employees only have access to the data and functionalities they absolutely need to perform their jobs. Regularly audit user permissions and roles within Salesforce to remove unnecessary access rights, limiting the potential damage if an account is compromised.

  4. Actively Monitor for Suspicious Activity: Implement robust logging and monitoring for your Salesforce instance. Watch for unusual login patterns, such as logins from unfamiliar locations or at odd hours. Be alert to signs of data exfiltration, like unusually large data exports or the creation of new, unauthorized administrative accounts.

  5. Secure Connected Applications: Your Salesforce security is only as strong as its weakest link. Carefully vet and audit all third-party applications integrated with your Salesforce environment. Revoke permissions for any apps that are no longer in use or that have overly permissive access to your data.

The FBI’s warning is a clear signal that cybercriminals are actively and successfully targeting corporate Salesforce instances. By taking these decisive security measures, you can significantly reduce your organization’s risk and protect your most valuable asset: your data.

Source: https://www.bleepingcomputer.com/news/security/fbi-warns-of-unc6040-unc6395-hackers-stealing-salesforce-data/

900*80 ad

      1080*80 ad