Google Confirms Data Breach at Salesforce in ShinyHunters Attack

In a new development in an ongoing cybersecurity campaign, Google has acknowledged a data breach in one of its Salesforce systems carried out by the hacker group ShinyHunters.

The breach, which occurred in early June, compromised one of Googleโ€™s internal Salesforce instances, exposing contact information and notes related to small and medium businesses. Back then, Google’s Threat Intelligence Group (GTIG) had already warned about this threat, labeling the attackers as “UNC6040,โ€ a financially motivated group, and their extortion arm as “UNC6240.”

Now, in an update to its original post, the tech giant has acknowledged that it had been targeted. According to GTIG, the stolen data was restricted to โ€œbasic and largely publicly availableโ€ business information, such as business names and contact details. The intrusion was reportedly brief, with access cut off quickly after detection.

“In June, one of Google’s corporate Salesforce instances was impacted by similar UNC6040 activity described in this post. Google responded to the activity, performed an impact analysis and began mitigations,”ย says Google’s update.

“The instance was used to store contact information and related notes for small and medium businesses. Analysis revealed that data was retrieved by the threat actor during a small window of time before the access was cut off.”

Who Are ShinyHunters?

ShinyHunters, a well-known extortion group, has been linked to a string of high-profile breaches, including at Snowflake, AT&T, NitroPDF, and PowerSchool. This summer, they have claimed responsibility for compromising Salesforce data at companies like Adidas, Qantas, Allianz Life, Cisco, Dior, Louis Vuitton, and Pandora.

This time, they have used voice phishingโ€”or โ€œvishingโ€โ€”to fool employees into giving up access to cloud services like Salesforce.

A Widening Web Of Attacks

Googleโ€™s breach is just one piece of a much larger campaign by ShinyHunters to steal and weaponize Salesforce data. The group reportedly uses social engineering tactics, such as posing as IT support during convincing phone calls, to trick employees into handing over credentials or approving fake apps connected to a companyโ€™s Salesforce account.

Once inside, they deploy custom scripts or modified Salesforce Data Loader to quietly extract sensitive business data.

In some cases, the attackers use modified versions of these tools disguised with names like โ€œMy Ticket Portalโ€ to match the pretext they used in their phishing calls.

Importantly, these attacks donโ€™t exploit any flaws in Salesforce itself. The platform remains secure. Instead, the hackers depend on human error, such as manipulating users into giving up credentials or approving malicious connected apps.

The stolen data is then used for ransom demands, with companies receiving threatening emails demanding payment in bitcoin within 72 hours or risk having their information leaked online. In some cases, companies have paid hefty sums to prevent the release of sensitive information, with one company reportedly paying $400,000 to keep its data from being leaked online.ย 

Googleโ€™s Response

To help organizations protect themselves from these kinds of social engineering attacksโ€”especially those involving tools like Salesforce Data Loaderโ€”Google has shared several key security measures, including:

  • Restricting access to Salesforce Data Loader and connected apps
  • Using IP-based access restrictions
  • Enforcing multi-factor authentication (MFA) universally
  • Monitoring for large data downloads
  • Limiting permissions based on roles

โ€œBy implementing these measures, organizations can significantly strengthen their security posture against the types of vishing and the UNC6040 data exfiltration campaign,โ€ Google concluded.

 

Kavita Iyer
Kavita Iyerhttps://www.techworm.net
An individual, optimist, homemaker, foodie, a die hard cricket fan and most importantly one who believes in Being Human!!!
spot_img

Read More

Suggested Post