#1 Middle East & Africa Trusted Cybersecurity News & Magazine |

36 C
Dubai
Friday, August 8, 2025
HomeTopics 2Phishing & SolutionThe Cost of a Call: How Voice Phishing Campaigns Escalated into Salesforce...

The Cost of a Call: How Voice Phishing Campaigns Escalated into Salesforce Data Extortion

Date:

Related stories

TikTok Shop Scam “ClickTok” Unleashes SparkKitty Spyware in Global Phishing Blitz

A massive cybersecurity campaign dubbed ClickTok is targeting TikTok Shop users...

CVE‑2025‑7847: Arbitrary File Upload in AI Engine Puts 100K+ WordPress Sites at Risk of RCE

On 18 July 2025, researchers at Wordfence disclosed CVE‑2025‑7847, a high-severity...

Jordan’s Cyber Incidents Soar: NCC Reports 6,758 Attacks in 2024

On 31 July 2025, Jordan’s National Cybersecurity Center (NCC) revealed that...
spot_imgspot_imgspot_imgspot_img

A sophisticated cybersecurity campaign leveraging voice phishing (vishing) has evolved into a high-stakes data extortion threat. Tracked as UNC6040 and UNC6240 by Google Threat Intelligence, the operation targeted Salesforce environments, abusing social engineering tactics to gain access, exfiltrate business data, and initiate extortion under the guise of “ShinyHunters.” The shift from phishing call to ransom demand underscores a dangerous evolution in financially motivated attacks and it’s happening now.

Beginning in early 2025, Google’s Threat Intelligence Group (GTIG) identified a cluster of intrusions orchestrated by UNC6040, a financially motivated group that uses vishing to breach organizational security perimeters. Their operators impersonated IT support staff over the phone, convincing targeted employees-mostly in English-speaking divisions of multinational firms-to authorize a malicious app within Salesforce.

The attackers guided victims to a connected apps setup page where they approved rogue apps-often branded as fake ticketing portals or support tools-that functioned like Salesforce’s Data Loader, enabling large-scale data exfiltration.

“These attacks didn’t exploit Salesforce vulnerabilities,” said GTIG researchers. “They exploited human trust.” Google Threat Intelligence, 5 August 2025

A Closer Look at the Attack Chain

Initial Access:

  • Vishing call using anonymized IPs (Mullvad VPN, TOR).
  • Target guided to authorize a modified Data Loader via Salesforce connected apps.

Credential Harvesting & Lateral Movement:

  • Victims unknowingly gave up credentials and MFA codes.
  • Attackers accessed cloud platforms like Okta and Microsoft 365.

Exfiltration:

  • Custom Python scripts and renamed apps like “My Ticket Portal” pulled sensitive records from Salesforce.
  • Attackers often tested small queries before large-scale downloads.

Infrastructure:

  • Hosted phishing panels mimicking Okta portals.
  • Used compromised email accounts to register malicious apps.

Extortion Phase: UNC6240 Emerges

Several months post-breach, a second cluster-UNC6240-initiated extortion campaigns. Employees received emails or calls demanding Bitcoin within 72 hours, threatening public data leaks. The attackers claimed affiliation with ShinyHunters, a well-known data breach actor.

Known Extortion Email Addresses

  • shinycorp@tuta[.]com
  • shinygroup@tuta[.]com

Google confirmed that one of its internal Salesforce instances, containing basic business contact data for SMBs, was impacted during a narrow window in June. The stolen data was limited to non-sensitive information and mitigations were immediately applied.

Global Context & MEA Considerations

The campaign’s focus on cloud-based SaaS platforms like Salesforce is globally relevant, but organizations in MEA-many of which are undergoing rapid digital transformation-may be particularly vulnerable. Vishing campaigns can easily cross borders, and regional IT support centers may lack the layered security training needed to defend against socially engineered calls.

MITRE ATT&CK Mapping

TacticTechnique
Initial AccessPhishing: Voice Phishing
Credential AccessAdversary-in-the-Middle
PersistenceCreate Account
Command & ControlWeb Protocols
CollectionEmail Collection via App
ExfiltrationExfiltration Over C2 Channel

Actionable Takeaways for Security Leaders

  1. Train employees to detect voice phishing, especially IT staff and Salesforce users.
  2. Restrict “API Enabled” and “Manage Connected Apps” permissions to only essential personnel.
  3. Implement IP allowlisting for Salesforce logins and connected app authorizations.
  4. Enable MFA and educate users on social engineering tactics designed to bypass it.
  5. Use Salesforce Shield’s Transaction Security Policies to detect large data downloads.
  6. Audit and approve all connected apps; block unauthorized or modified Data Loaders.
  7. Monitor for suspicious behavior patterns using event monitoring and centralized SIEM logs.
  8. Rotate credentials immediately after suspected phishing events.
  9. Engage legal/compliance teams when extortion attempts occur; do not engage alone.
  10. Review cloud access policies and consider behavior-based detection tools.

Conclusion: Why This Matters Now

The UNC6040/UNC6240 campaign marks a chilling convergence of traditional vishing with modern cloud exploitation and ransomware-like extortion. This escalation-exploiting trust, then weaponizing stolen data months later-shows that security threats don’t end when the call hangs up. As organizations continue adopting SaaS platforms, proactive controls, user education, and visibility across cloud apps will be essential defenses against these silent, persistent attackers.

Sources

Ouaissou DEMBELE
Ouaissou DEMBELEhttp://cybercory.com
Ouaissou DEMBELE is a seasoned cybersecurity expert with over 12 years of experience, specializing in purple teaming, governance, risk management, and compliance (GRC). He currently serves as Co-founder & Group CEO of Sainttly Group, a UAE-based conglomerate comprising Saintynet Cybersecurity, Cybercory.com, and CISO Paradise. At Saintynet, where he also acts as General Manager, Ouaissou leads the company’s cybersecurity vision—developing long-term strategies, ensuring regulatory compliance, and guiding clients in identifying and mitigating evolving threats. As CEO, his mission is to empower organizations with resilient, future-ready cybersecurity frameworks while driving innovation, trust, and strategic value across Sainttly Group’s divisions. Before founding Saintynet, Ouaissou held various consulting roles across the MEA region, collaborating with global organizations on security architecture, operations, and compliance programs. He is also an experienced speaker and trainer, frequently sharing his insights at industry conferences and professional events. Ouaissou holds and teaches multiple certifications, including CCNP Security, CEH, CISSP, CISM, CCSP, Security+, ITILv4, PMP, and ISO 27001, in addition to a Master’s Diploma in Network Security (2013). Through his deep expertise and leadership, Ouaissou plays a pivotal role at Cybercory.com as Editor-in-Chief, and remains a trusted advisor to organizations seeking to elevate their cybersecurity posture and resilience in an increasingly complex threat landscape.

Subscribe

- Never miss a story with notifications

- Gain full access to our premium content

- Browse free from up to 5 devices at once

Latest stories

spot_imgspot_imgspot_imgspot_img

LEAVE A REPLY

Please enter your comment!
Please enter your name here