#1 Middle East & Africa Trusted Cybersecurity News & Magazine |

39 C
Dubai
Saturday, September 13, 2025
HomeTopics 2Data BreachFBI Sounds Alarm as Hackers Target Salesforce in Global Data Theft and...

FBI Sounds Alarm as Hackers Target Salesforce in Global Data Theft and Extortion Campaigns

Date:

Related stories

spot_imgspot_imgspot_imgspot_img

Hackers are turning Salesforce, one of the world’s most widely used business platforms, into their latest playground. According to a new FBI alert, two cybercriminal groups – UNC6040 and UNC6395 – have been compromising Salesforce accounts to steal sensitive data and extort companies. The campaigns underline just how vulnerable cloud platforms have become, and why organizations need to rethink how they protect customer information.

The first group, UNC6040, has been at it since late 2024. Their weapon of choice? Old-fashioned but highly effective voice phishing (vishing). They call company help desks, pretend to be IT staff, and convince employees to hand over credentials or approve malicious apps. Once inside Salesforce, they use tools like Data Loader to pull out customer data in bulk. Victims often receive extortion emails later, some linked to the notorious ShinyHunters gang, demanding payment to stop stolen data from being leaked.

The second group, UNC6395, took a different approach. In August 2025, they exploited compromised OAuth tokens tied to Salesloft Drift, an AI chatbot connected to Salesforce. With those tokens, they slipped past authentication and drained data from Salesforce systems until the access was revoked.

Why It Matters

Salesforce is a cornerstone for businesses in nearly every sector – banks, hospitals, retailers, governments. A breach can expose not just customer records but also contracts, financial data, and internal communications. The FBI’s warning isn’t just about one company – it’s about the broader risk of how attackers are exploiting people and trusted integrations rather than hacking passwords or deploying malware.

In regions like the Middle East and Africa, where Salesforce adoption is climbing alongside ambitious digital transformation projects, the warning hits close to home. Financial institutions, telecoms, and government agencies in particular face a bigger bullseye on their backs.

The Bigger Picture

What these campaigns show is that the cloud isn’t inherently safe just because it’s run by tech giants. Criminals are finding creative ways to bypass traditional defenses. By tricking employees or abusing trusted third-party apps, they can get direct access to sensitive systems—often without tripping alarms. Security teams need to recognize that defending cloud services requires more than strong passwords and multi-factor authentication.

10 Ways to Protect Your Organization

Here are ten steps recommended by the FBI and security experts:

  1. Train call center and frontline staff to recognize and report suspicious calls. Use resources from Saintynet Training.
  2. Require phishing-resistant MFA for Salesforce and other critical apps.
  3. Apply the Principle of Least Privilege – give employees only the access they need.
  4. Use authentication and access controls (AAA systems) to monitor user actions.
  5. Enforce IP restrictions for Salesforce logins.
  6. Keep a close eye on API activity, especially large or unusual queries.
  7. Regularly audit and clean up third-party app integrations.
  8. Rotate API keys, OAuth tokens, and credentials on a set schedule.
  9. Continuously monitor network and session logs for anomalies.
  10. Build a SaaS-specific incident response plan so you’re ready if attackers strike.

Conclusion:

The FBI’s alert on UNC6040 and UNC6395 is a wake-up call. Attackers don’t need malware when they can trick employees or exploit integrations to walk right into Salesforce. Organizations need to stay ahead with stronger training, tighter controls, and constant vigilance. In today’s cloud-first world, the fight to protect customer trust is more urgent than ever.

Source: FBI IC3 Alert

Ouaissou DEMBELE
Ouaissou DEMBELEhttp://cybercory.com
Ouaissou DEMBELE is a seasoned cybersecurity expert with over 12 years of experience, specializing in purple teaming, governance, risk management, and compliance (GRC). He currently serves as Co-founder & Group CEO of Sainttly Group, a UAE-based conglomerate comprising Saintynet Cybersecurity, Cybercory.com, and CISO Paradise. At Saintynet, where he also acts as General Manager, Ouaissou leads the company’s cybersecurity vision—developing long-term strategies, ensuring regulatory compliance, and guiding clients in identifying and mitigating evolving threats. As CEO, his mission is to empower organizations with resilient, future-ready cybersecurity frameworks while driving innovation, trust, and strategic value across Sainttly Group’s divisions. Before founding Saintynet, Ouaissou held various consulting roles across the MEA region, collaborating with global organizations on security architecture, operations, and compliance programs. He is also an experienced speaker and trainer, frequently sharing his insights at industry conferences and professional events. Ouaissou holds and teaches multiple certifications, including CCNP Security, CEH, CISSP, CISM, CCSP, Security+, ITILv4, PMP, and ISO 27001, in addition to a Master’s Diploma in Network Security (2013). Through his deep expertise and leadership, Ouaissou plays a pivotal role at Cybercory.com as Editor-in-Chief, and remains a trusted advisor to organizations seeking to elevate their cybersecurity posture and resilience in an increasingly complex threat landscape.

Subscribe

- Never miss a story with notifications

- Gain full access to our premium content

- Browse free from up to 5 devices at once

Latest stories

spot_imgspot_imgspot_imgspot_img

LEAVE A REPLY

Please enter your comment!
Please enter your name here