InsighthubNews
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
Reading: The FBI warns UNC6040 and UNC6395 targeting Salesforce platforms in data theft attacks
Share
Font ResizerAa
InsighthubNewsInsighthubNews
Search
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
© 2024 All Rights Reserved | Powered by Insighthub News
InsighthubNews > Technology > The FBI warns UNC6040 and UNC6395 targeting Salesforce platforms in data theft attacks
Technology

The FBI warns UNC6040 and UNC6395 targeting Salesforce platforms in data theft attacks

September 13, 2025 5 Min Read
Share
The FBI warns UNC6040 and UNC6395 targeting Salesforce platforms in data theft attacks
SHARE

The US Federal Bureau of Investigation (FBI) has issued a flash alert to release Compromise Indicators (IOCs) related to two cybercrime groups tracked as UNC6040 and UNC6395 due to a series of data theft and tor attacks.

“It has been observed that both groups have recently been targeting their organization’s Salesforce platform through various early access mechanisms,” the FBI said.

UNC6395 is a threat group caused by a wide range of data theft campaigns targeting Salesforce instances in August 2025 by leveraging compromised OAUTH tokens from the SalesLoft Drift application. In an update published this week, SalesLoft said that violations of GitHub accounts from March to June 2025 made the attack possible.

As a result of the violation, SalesLoft has isolated the drift infrastructure and took the Artificial Intelligence (AI) chatbot application offline. The company also said it is in the process of implementing a new multifactor certification process and GitHub cure countermeasure.

“We are focusing on the continuous curing of our drift application environment,” the company said. “This process involves rotating credentials, temporarily disabling certain parts of the drift application and enhancing security configurations.” “At this point, we advise all drift customers to treat all drift integrations and related data as potentially impaired.”

The second group the FBI calls attention is UNC6040. UNC6040, rated active since October 2024, is the name Google has assigned to a financially motivated threat cluster, engaged in a billing campaign to gain initial access and hijack sales force instances for large-scale data theft and fear tor.

These attacks use a modified version of Salesforce Data Loader app and custom Python scripts to violate the victim’s Salesforce portal and remove valuable data. At least some of the incidents involved fear tor activity after the UNC6040 break-in, and took place several months after the initial data theft.

See also  One click allows you to turn Perplexity's Comet AI Browser into Data Thief

“The UNC6040 threat actors use phishing panels and are instructing victims to visit from their mobile phones or work computers during social engineering calls,” the FBI said. “After gaining access, the UNC6040 threat actors used API queries to remove a large amount of data.”

The Fear Tor stage is attributed to another uncategorized cluster tracked by Google as UNC6240, which consistently claims to be the Shinyhunters group in emails and phone calls to employees of the victim organization.

“We also believe that threat actors using the ‘Shinyhunters’ brand may be preparing to escalate the tactics of fear tor by launching a data leak site (DLS),” Google said last month. “These new tactics may be aimed at increasing pressure on victims, including those related to the recent UNC6040 Salesforce-related data breaches.”

Most notable since then is the team-up of Shinyhunters, Spricded Spider and Lapsus $ to integrate and consolidate criminal efforts. Then, on September 12, 2025, the group claimed they were shutting down on their telegram channel with “scattered Lapsus $Hunters 4.0”.

“We decided that lapsus $, trihash, yurosh, yaxsh, wytrozz, n3z0x, nitroz, toxiqueroot, prosox, pertinax, kurosh, clown, intelbroker, spitsed spider spider spider and many others would be dark. “Our purpose has been fulfilled. Now is the time to say goodbye.”

It is currently unclear why the group started cutting their boots, but this movement could be a slow and attempt to avoid the attention of law enforcement agencies.

“The newly formed scattered Lapsus $Hunters 4.0 group said ‘Go Dark’ after French law enforcement allegedly arrested another wrong person in connection with a cybercrime group,” Sam Rubin, senior vice president of consulting and threat intelligence for Unit 42, told Hacker News. “These declarations rarely inform you of a true retirement.”

See also  Stealit malware exploits a single executable feature in Node.js via game and VPN installers

“Recent arrests may have made the group lower, but history tells us that this is often temporary. This shard, rebranding, resurfaced groups – even if the public works are suspended, stolen data could be played. It hasn’t disappeared, it’s just adapted.”

Share This Article
Twitter Copy Link
Previous Article Everything grows thorny plants and fruits in the garden Everything grows thorny plants and fruits in the garden
Next Article Judge orders the Trump administration to say it is trying to prevent illegal deportation from Ghana Judge orders the Trump administration to say it is trying to prevent illegal deportation from Ghana

Latest News

Silver Fox uses fake Microsoft Teams installer to spread ValleyRAT malware in China

Silver Fox uses fake Microsoft Teams installer to spread ValleyRAT malware in China

threat actor known as silver fox In attacks targeting Chinese…

December 4, 2025
Critical RSC bug in React and Next.js allows unauthenticated remote code execution

Critical RSC bug in React and Next.js allows unauthenticated remote code execution

A maximum severity security flaw has been disclosed in React…

December 3, 2025
India orders messaging apps to work only with active SIM cards to prevent fraud and abuse

India orders messaging apps to work only with active SIM cards to prevent fraud and abuse

India's Department of Telecommunications (DoT) has directed app-based telecom service…

December 2, 2025
India orders mobile phone manufacturers to pre-install Sanchar Saathi app to prevent wire fraud

India orders mobile phone manufacturers to pre-install Sanchar Saathi app to prevent wire fraud

India's Ministry of Telecommunications has reportedly asked major mobile device…

December 1, 2025
CISA adds actively exploited XSS bug CVE-2021-26829 in OpenPLC ScadaBR to KEV

CISA adds actively exploited XSS bug CVE-2021-26829 in OpenPLC ScadaBR to KEV

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has updated…

November 30, 2025

You Might Also Like

$50 batter ram attack breaks Intel and AMD cloud security protections
Technology

$50 batter ram attack breaks Intel and AMD cloud security protections

6 Min Read
New Assessment ClickFix Campaign Offers Amatera Stealer and NetSupport RAT
Technology

New Assessment ClickFix Campaign Offers Amatera Stealer and NetSupport RAT

4 Min Read
Russian IT Network
Technology

Chinese threat group Jewelbug secretly infiltrated Russian IT networks for months

5 Min Read
Chinese hackers have been exploiting ArcGIS Server as a backdoor for over a year
Technology

Chinese hackers have been exploiting ArcGIS Server as a backdoor for over a year

4 Min Read
InsighthubNews
InsighthubNews

Welcome to InsighthubNews, your reliable source for the latest updates and in-depth insights from around the globe. We are dedicated to bringing you up-to-the-minute news and analysis on the most pressing issues and developments shaping the world today.

  • Home
  • Celebrity
  • Environment
  • Business
  • Crypto
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
  • World News
  • Politics
  • Technology
  • Sports
  • Gaming
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service

© 2024 All Rights Reserved | Powered by Insighthub News

Welcome Back!

Sign in to your account

Lost your password?