By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Viral Trending contentViral Trending content
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
Reading: Google Exposes Vishing Group UNC6040 Targeting Salesforce with Fake Data Loader App
Notification Show More
Viral Trending contentViral Trending content
  • Home
  • Categories
    • World News
    • Politics
    • Sports
    • Celebrity
    • Business
    • Crypto
    • Tech News
    • Gaming News
    • Travel
  • Bookmarks
© 2024 All Rights reserved | Powered by Viraltrendingcontent
Viral Trending content > Blog > Tech News > Google Exposes Vishing Group UNC6040 Targeting Salesforce with Fake Data Loader App
Tech News

Google Exposes Vishing Group UNC6040 Targeting Salesforce with Fake Data Loader App

By Viral Trending Content 5 Min Read
Share
SHARE

Jun 04, 2025Ravie Lakshmanan Threat Intelligence / Data Breach

Google has disclosed details of a financially motivated threat cluster that it said “specialises” in voice phishing (aka vishing) campaigns designed to breach organizations’ Salesforce instances for large-scale data theft and subsequent extortion.

The tech giant’s threat intelligence team is tracking the activity under the moniker UNC6040, which it said exhibits characteristics that align with threat groups with ties to an online cybercrime collective known as The Com.

“Over the past several months, UNC6040 has demonstrated repeated success in breaching networks by having its operators impersonate IT support personnel in convincing telephone-based social engineering engagements,” the company said in a report shared with The Hacker News.

Cybersecurity

This approach, Google’s Threat Intelligence Group (GTIG) added, has had the benefit of tricking English-speaking employees into performing actions that give the threat actors access or lead to the sharing of valuable information such as credentials, which are then used to facilitate data theft.

A noteworthy aspect of UNC6040’s activities involves the use of a modified version of Salesforce’s Data Loader that victims are deceived into authorizing so as to connect to the organization’s Salesforce portal during the vishing attack. Data Loader is an application used to import, export, and update data in bulk within the Salesforce platform.

Specifically, the attackers guide the target to visit Salesforce’s connected app setup page and approve the modified version of the Data Loader app that carries a different name or branding (e.g., “My Ticket Portal”) from its legitimate counterpart. This action grants them unauthorized access to the Salesforce customer environments and exfiltrate data.

Beyond data loss, the attacks serve as a stepping stone for UNC6040 to move laterally through the victim’s network, and then access and harvest information from other platforms such as Okta, Workplace, and Microsoft 365.

Select incidents have also involved extortion activities, but only “several months” after the initial intrusions were observed, indicating an attempt to monetize and profit off the stolen data presumably in partnership with a second threat actor.

“During these extortion attempts, the actor has claimed affiliation with the well-known hacking group ShinyHunters, likely as a method to increase pressure on their victims,” Google said.

UNC6040’s overlaps with groups linked to The Com stem from the targeting of Okta credentials and the use of social engineering via IT support, a tactic that has been embraced by Scattered Spider, another financially motivated threat actor that’s part of the loose-knit organized collective.

The vishing campaign hasn’t gone unnoticed by Salesforce, which, in March 2025, warned of threat actors using social engineering tactics to impersonate IT support personnel over the phone and trick its customers’ employees into giving away their credentials or approving the modified Data Loader app.

Cybersecurity

“They have been reported luring our customers’ employees and third-party support workers to phishing pages designed to steal credentials and MFA tokens or prompting users to navigate to the login.salesforce[.]com/setup/connect page in order to add a malicious connected app,” the company said.

“In some cases, we have observed that the malicious connected app is a modified version of the Data Loader app published under a different name and/or branding. Once the threat actor gains access to a customer’s Salesforce account or adds a connected app, they use the connected app to exfiltrate data.”

The development not only highlights the continued sophistication of social engineering campaigns, but also shows how IT support staff are being increasingly targeted as a way to gain initial access.

“The success of campaigns like UNC6040’s, leveraging these refined vishing tactics, demonstrates that this approach remains an effective threat vector for financially motivated groups seeking to breach organizational defenses,” Google said.

“Given the extended time frame between initial compromise and extortion, it is possible that multiple victim organizations and potentially downstream victims could face extortion demands in the coming weeks or months.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

You Might Also Like

In a Big Reversal, Zohran Mamdani Tells NYC Agencies They Can Use TikTok

Tech Advisor May 2026 digital magazine: Best of MWC 2026, first look at Google’s Pixel 10a and Samsung’s S26 line-up, and much more

Microsoft 365 Updates March 2026: Teams, Copilot, Entra

Research Ireland awards €4.4m to 46 ‘enterprise-engaged’ projects

Android 17: These Phones Will get the Update

TAGGED: Cyber Security, Cybersecurity, data breach, Google, insider threat, Internet, IT Support, Malware, Microsoft 365, Okta, Salesforce, ShinyHunters, social engineering, Threat Intelligence, Voice Phishing
Share This Article
Facebook Twitter Copy Link
Previous Article Sky Glass Air – The Newest addition to Sky’s TV Range
Next Article Comedian sentenced to eight years over discriminatory jokes
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

EU to press Israel to scrap law allowing execution of convicted Palestinians
World News
Qubic Reveals How Its Dogecoin Mining Launch Will Work Starting April 1
Crypto
Did Lamar Odom Actually Die After His Overdose? ‘Untold: The Death & Life’ Doc Bombshells
Celebrity
Assassin’s Creed Shadows Receives Upgraded PSSR Support on April 7th
Gaming News
In a Big Reversal, Zohran Mamdani Tells NYC Agencies They Can Use TikTok
Tech News
Chisora: I'm happy Fury is back – he will fight AJ!
Sports
Wall Street rally ahead? Dow futures jump nearly 500 points on Trump’s reported plans to exit Iran war
Business

About Us

Welcome to Viraltrendingcontent, your go-to source for the latest updates on world news, politics, sports, celebrity, tech, travel, gaming, crypto news, and business news. We are dedicated to providing you with accurate, timely, and engaging content from around the globe.

Quick Links

  • Home
  • World News
  • Politics
  • Celebrity
  • Business
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
  • Sports
  • Crypto
  • Tech News
  • Gaming News
  • Travel

Trending News

cageside seats

Unlocking the Ultimate WWE Experience: Cageside Seats News 2024

EU to press Israel to scrap law allowing execution of convicted Palestinians

Investing £5 a day could help me build a second income of £329 a month!

cageside seats
Unlocking the Ultimate WWE Experience: Cageside Seats News 2024
May 22, 2024
EU to press Israel to scrap law allowing execution of convicted Palestinians
March 31, 2026
Investing £5 a day could help me build a second income of £329 a month!
March 27, 2024
Brussels unveils plans for a European Degree but struggles to explain why
March 27, 2024
© 2024 All Rights reserved | Powered by Vraltrendingcontent
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?