UNC6040, a financially motivated threat cluster, specializes in voice phishing campaigns to compromise organizations' Salesforce instances for data theft and extortion.
UNC6040's success lies in impersonating IT support personnel to trick employees into actions granting access or sharing credentials, leading to theft of data from Salesforce.
Attackers deceive victims to authorize a malicious connected app, granting them capabilities to access and exfiltrate sensitive information from compromised Salesforce environments.
Extortion activities often follow initial data theft, potentially involving partnerships with other threat actors to monetize stolen data.
UNC6040 utilizes infrastructure including Okta phishing panels and Mullvad VPN IP addresses for data exfiltration and lateral movement within victim networks.
The use of modified Data Loader applications by threat actors enables exfiltration of Salesforce data and customization to align with social engineering tactics.
UNC6040's vishing tactics underscore a concerning trend of targeting IT support personnel for initial access, exploiting their roles in compromising enterprise data.
Mitigations against such threats include implementing the Principle of Least Privilege, managing connected app access, enforcing IP-based restrictions, using Salesforce Shield for monitoring, and enforcing universal Multi-Factor Authentication (MFA).
By following best practices and security measures, organizations can enhance their defenses against vishing attacks and data exfiltration campaigns like those orchestrated by UNC6040.
The collaboration between UNC6040 and potential partners emphasizes the need for proactive security measures to combat evolving social engineering tactics.
Organizations must remain vigilant and continuously update their security protocols to safeguard against sophisticated threats targeting cloud environments and exploiting human vulnerabilities.