1080*80 ad

FBI Warns of Salesforce Attacks by UNC6040 and UNC6395

Secure Your Salesforce Org: FBI Issues Urgent Warning on Advanced Phishing Attacks

Salesforce is the lifeblood of countless organizations, holding everything from sensitive customer data to critical financial information. Its importance makes it a prime target for sophisticated cybercriminals. Recently, the Federal Bureau of Investigation (FBI) issued a critical alert regarding two financially motivated threat groups, tracked as UNC6040 and UNC6395, who are actively targeting organizations using highly effective phishing campaigns to breach Salesforce environments.

This isn’t a routine security bulletin; it’s a warning about an advanced attack method that successfully bypasses common security measures, including Multi-Factor Authentication (MFA). Understanding their tactics is the first step toward building a stronger defense.

The Attack Method: A Sophisticated Blend of Phishing and Deception

The cybercriminals’ strategy is meticulously planned and executed in several stages designed to trick even security-conscious employees. Here’s how they gain access to your most valuable data.

1. The Bait: Highly Convincing Phishing Emails

The attack begins with a carefully crafted phishing email. These are not the poorly-worded scam messages of the past. Instead, attackers send emails that appear to be legitimate business communications, often targeting employees in finance, sales, or account management roles who regularly use Salesforce. The emails create a sense of urgency, prompting the user to click a link to review a document, update account information, or address a supposed issue.

2. The Trap: A Perfect Replica of the Salesforce Login Page

Upon clicking the link, the employee is redirected to a malicious website that is a pixel-perfect clone of their organization’s Salesforce login portal. This fraudulent page is designed to harvest credentials. The unsuspecting user enters their username and password, which are immediately captured by the attackers.

3. The Bypass: Real-Time Multi-Factor Authentication (MFA) Theft

This is the most critical and alarming part of the attack. After the user enters their credentials, the fake portal prompts them for their MFA code (from an authenticator app, SMS, or email). As soon as the user enters the one-time code, the attackers, operating in real-time, use the stolen credentials and the MFA code to log into the real Salesforce instance. Because they act immediately, they gain access before the temporary code expires. This technique, often called an Adversary-in-the-Middle (AiTM) attack, effectively renders traditional MFA useless.

Post-Breach: What Attackers Do Once Inside

Gaining access is only the beginning. Once inside your Salesforce environment, these threat actors move quickly to solidify their position and exfiltrate data. Their common post-breach activities include:

  • Establishing Persistence: The attackers often create new administrator accounts or elevate the privileges of the compromised account. This gives them persistent, high-level access to the system, making them difficult to remove.
  • Mapping the Environment: They explore the Salesforce organization to identify high-value data, such as customer lists, financial records, personally identifiable information (PII), and internal business intelligence.
  • Data Exfiltration: Using their privileged access, the attackers steal large volumes of sensitive data. This information is often sold on the dark web or used to conduct further financial fraud.
  • Hiding Their Tracks: Cybercriminals often use legitimate, built-in Salesforce tools (like data loaders) to blend in with normal activity, making their malicious actions harder to detect.

Actionable Steps to Protect Your Organization

Standard security practices are no longer enough. To defend against these sophisticated threats, organizations must adopt a more resilient and proactive security posture. Here are essential steps you should take immediately to secure your Salesforce environment.

  • Implement Phishing-Resistant MFA: While standard MFA is better than nothing, it is vulnerable to AiTM attacks. Transition to phishing-resistant MFA solutions like FIDO2-compliant security keys (e.g., YubiKey) or Windows Hello for Business. These methods tie authentication to a physical device, making it nearly impossible for attackers to intercept credentials remotely.
  • Enforce Strict Access Policies: Implement Conditional Access Policies that restrict logins based on risk factors. Block logins from unusual geographic locations or non-compliant devices. Enforce “impossible travel” alerts, which flag simultaneous login attempts from geographically distant places.
  • Conduct Rigorous Employee Training: Your employees are your first line of defense. Conduct regular, updated security awareness training that specifically covers how to identify sophisticated phishing attempts and the dangers of AiTM attacks. Simulate these attacks to test and reinforce their knowledge.
  • Regularly Audit User Permissions: Do not grant administrator-level access by default. Follow the principle of least privilege, ensuring users only have the permissions necessary to perform their jobs. Perform regular audits of all user accounts, especially those with high privileges, and promptly disable any that are unnecessary.
  • Monitor Salesforce Login and Activity Logs: Actively monitor Salesforce logs for suspicious behavior. Look for signs of a breach, such as logins from unfamiliar IP addresses, unusual data export activity, or the creation of new, unauthorized administrator accounts. Set up automated alerts for these events to enable a rapid response.

The threat to your Salesforce data is real, active, and evolving. By understanding the tactics used by groups like UNC6040 and UNC6395 and implementing robust, multi-layered security controls, you can significantly reduce your risk and protect your organization’s most critical assets.

Source: https://securityaffairs.com/182159/cyber-crime/fbi-warns-of-salesforce-attacks-by-unc6040-and-unc6395-groups.html

900*80 ad

      1080*80 ad