menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Google News

>

The Cost o...
source image

Cloudblog

2d

read

148

img
dot

Image Credit: Cloudblog

The Cost of a Call: From Voice Phishing to Data Extortion

  • UNC6040, a financially motivated threat cluster, specializes in voice phishing campaigns to compromise organizations' Salesforce instances for data theft and extortion.
  • UNC6040's success lies in impersonating IT support personnel to trick employees into actions granting access or sharing credentials, leading to theft of data from Salesforce.
  • Attackers deceive victims to authorize a malicious connected app, granting them capabilities to access and exfiltrate sensitive information from compromised Salesforce environments.
  • Extortion activities often follow initial data theft, potentially involving partnerships with other threat actors to monetize stolen data.
  • UNC6040 utilizes infrastructure including Okta phishing panels and Mullvad VPN IP addresses for data exfiltration and lateral movement within victim networks.
  • The use of modified Data Loader applications by threat actors enables exfiltration of Salesforce data and customization to align with social engineering tactics.
  • UNC6040's vishing tactics underscore a concerning trend of targeting IT support personnel for initial access, exploiting their roles in compromising enterprise data.
  • Mitigations against such threats include implementing the Principle of Least Privilege, managing connected app access, enforcing IP-based restrictions, using Salesforce Shield for monitoring, and enforcing universal Multi-Factor Authentication (MFA).
  • By following best practices and security measures, organizations can enhance their defenses against vishing attacks and data exfiltration campaigns like those orchestrated by UNC6040.
  • The collaboration between UNC6040 and potential partners emphasizes the need for proactive security measures to combat evolving social engineering tactics.
  • Organizations must remain vigilant and continuously update their security protocols to safeguard against sophisticated threats targeting cloud environments and exploiting human vulnerabilities.

Read Full Article

like

8 Likes

For uninterrupted reading, download the app