Google confirms data breach after Salesforce database hack exposes customer data

Google confirms data breach after Salesforce database hack exposes customer data

Google has confirmed that a recent breach involved one of its Salesforce systems, which holds contact data for small and medium-sized businesses. The attack was executed by a cybercriminal group identified as UNC6040, which employs voice phishing, or 'vishing', to manipulate employees into granting access to sensitive resources. Using social engineering tactics, the attackers impersonated IT support staff during phone calls, persuading employees to authorize the installation of malicious software tied to their Salesforce environment. This breach enabled the hackers to gain access to and extract basic business contact information, most of which Google claims was already available publicly, before the situation was identified and contained. UNC6040 is particularly notorious for targeting Salesforce platforms, leveraging legitimate applications like the 'Data Loader' for bulk data management. However, their strategy involves creating counterfeit versions of these tools with deceptive names, such as 'My Ticket Portal,' to evade detection during their phishing attempts. Recently, the group has transitioned from using official tools to employing custom Python scripts for data theft, complicating efforts to trace their actions. Additionally, they reportedly utilize VPNs and the TOR network to obscure their identities and locations. Another associated group, UNC6240, has been linked to extortion efforts following these data thefts, reaching out to company personnel via email or phone with demands for bitcoin payments within 72 hours. These communications often claim to be from the hacking group 'ShinyHunters,' which is well-known in the cybercrime sector. Google's threat intelligence unit has expressed concern that the extortion group is likely to launch a website to publicly disclose the stolen data, a tactic commonly used by cybercriminals to exert pressure. The fundamental issue highlighted by this incident is that these attacks do not exploit vulnerabilities in Salesforce itself but rather capitalize on human error, tricking employees into granting access through seemingly normal IT support interactions. In light of these events, companies are being advised to enhance their access controls, restrict permissions to sensitive tools, limit application installations, and provide training for staff to better recognize social engineering scams.

Sources : Mint

Published On : Aug 07, 2025, 13:50

Startups
Massive Bets on Iran Conflict: Polymarket Sees $529 Million Trade Surge

In a striking display of speculative trading, users on Polymarket have engaged in substantial betting concerning potenti...

TechCrunch | Mar 01, 2026, 19:25
Massive Bets on Iran Conflict: Polymarket Sees $529 Million Trade Surge
AI
Claude Surges to the Top of the App Store Amid Pentagon Controversy

In a remarkable turn of events, Anthropic's chatbot Claude has ascended to the pinnacle of the Apple App Store's free ap...

TechCrunch | Mar 01, 2026, 15:05
Claude Surges to the Top of the App Store Amid Pentagon Controversy
Gadgets
Honor Unveils Innovative 'Robot Phone' with Dance Moves and Smart Camera

Honor has unveiled exciting details about its upcoming 'Robot phone', showcasing a unique device featuring a movable cam...

TechCrunch | Mar 01, 2026, 15:50
Honor Unveils Innovative 'Robot Phone' with Dance Moves and Smart Camera
Computing
LexisNexis Defends Its Position Amidst AI Market Fears

As the artificial intelligence landscape continues to evolve, LexisNexis finds itself at the center of investor concerns...

Business Insider | Mar 01, 2026, 10:30
LexisNexis Defends Its Position Amidst AI Market Fears
AI
The Silent Risks of AI: How Businesses Face Unseen Threats

As businesses increasingly integrate artificial intelligence into their operations, a hidden danger lurks that could dis...

CNBC | Mar 01, 2026, 14:15
The Silent Risks of AI: How Businesses Face Unseen Threats
View All News