Salesforce (via targeted CRM platforms)

Salesforce (via targeted CRM platforms)

UNC6040 executed a highly sophisticated **vishing (voice phishing) campaign** targeting enterprise **Customer Relationship Management (CRM) platforms**, particularly **Salesforce**, to perform **large-scale data exfiltration**. The attack leveraged **OAuth 2.0 exploitation**, tricking victims into granting malicious apps **elevated API permissions** (including `api`, `refresh_token`, and full scopes) via spoofed IT support calls. Using **SIP spoofing, VoIP routing via Tor/Mullvad VPN**, and modified **Data Loader applications with custom Python scripts**, the threat actors automated **bulk data extraction** via **SOQL queries and REST API calls**, bypassing detection through rate-limiting. The compromised data likely included **customer records, financial details, and sensitive corporate information**, enabling **persistent access for extortion**. The group’s infrastructure—segmented across **Tor hidden services, commercial VPNs, and bulletproof hosting**—hinted at preparations for a **Data Leak Site (DLS)**, escalating from private ransom demands to **public pressure tactics**. Partnerships with **UNC6240 (ransomware/extortion specialists)** suggest potential **follow-on ransomware or data auction threats**.

Source: https://cyberpress.org/google-urges-2-5-billion-gmail-users/

TPRM report: https://www.rankiteo.com/company/salesforce

"id": "sal815090225",
"linkid": "salesforce",
"type": "Cyber Attack",
"date": "9/2025",
"severity": "85",
"impact": "4",
"explanation": "Attack with significant impact with customers data leaks"
{'affected_entities': [{'industry': ['Multiple (Targeting CRM Users)'],
                        'type': ['Enterprise Organizations']}],
 'attack_vector': ['Voice Phishing (Vishing)',
                   'SIP Spoofing',
                   'OAuth 2.0 Exploitation',
                   'API Abuse (Salesforce SOQL)',
                   'Malicious Connected Apps',
                   'VoIP/Tor Routing'],
 'customer_advisories': ['Warn Users About Unsolicited IT Support Calls '
                         'Requesting OAuth Approvals'],
 'data_breach': {'data_exfiltration': ['Automated via Bulk API Endpoints',
                                       'Python Scripts with Rate-Limiting to '
                                       'Evade Detection'],
                 'personally_identifiable_information': ['Likely (Dependent on '
                                                         'CRM Data Structure)'],
                 'sensitivity_of_data': ['High (Includes Salesforce Object '
                                         'Data via SOQL)'],
                 'type_of_data_compromised': ['CRM Data',
                                              'Customer Records',
                                              'Business Intelligence',
                                              'Potentially PII']},
 'description': 'Voice phishing (vishing) campaigns by UNC6040 have reached '
                'unprecedented sophistication, leveraging OAuth-based '
                'authentication and API exploitation to execute large-scale '
                'data exfiltration. The group targets enterprise CRM platforms '
                '(e.g., Salesforce) via SIP spoofing, VoIP/Tor routing, and '
                'malicious Connected Apps to gain persistent access for '
                'extortion. Their infrastructure uses segmented C2 channels '
                '(Tor for recon, VPNs like Mullvad for exfiltration) and '
                'collaborates with UNC6240 for ransom operations. '
                'Countermeasures include Zero Trust API security, WAF '
                'rate-limiting, UEBA, and HSM-based key management.',
 'impact': {'brand_reputation_impact': ['Risk of Public Data Leak via DLS '
                                        '(Data Leak Site)',
                                        'Loss of Customer Trust'],
            'data_compromised': ['CRM Data (Salesforce)',
                                 'Customer Records',
                                 'Sensitive Business Information'],
            'identity_theft_risk': ['High (PII likely exposed via CRM data)'],
            'operational_impact': ['Persistent Unauthorized Access',
                                   'Automated Data Exfiltration via API',
                                   'Potential Extortion Leverage'],
            'systems_affected': ['Salesforce CRM Platforms',
                                 'Connected Apps Infrastructure',
                                 'VoIP/Tor Communication Channels']},
 'initial_access_broker': {'backdoors_established': ['Persistent API Access '
                                                     'via Malicious Connected '
                                                     'Apps'],
                           'data_sold_on_dark_web': ['Potential (via UNC6240 '
                                                     'Extortion Partnerships)'],
                           'entry_point': ['Vishing Calls Spoofing IT Support',
                                           'SIP Spoofing via VoIP/Tor'],
                           'high_value_targets': ['Salesforce CRM Data',
                                                  'Customer Relationship '
                                                  'Records'],
                           'reconnaissance_period': ['Likely Extended '
                                                     '(Targeted CRM Platform '
                                                     'Mapping)']},
 'investigation_status': 'Ongoing (Threat Actor Infrastructure Still Active)',
 'lessons_learned': ['OAuth 2.0 Connected Apps Require Stricter Permission '
                     'Scoping and Monitoring',
                     'API Security Must Extend Beyond Authentication to '
                     'Include Behavioral Analysis',
                     'VoIP/Tor-Based Vishing Attacks Bypass Traditional '
                     'Phishing Defenses',
                     'Segmented C2 Infrastructure (Tor + VPN) Complicates '
                     'Attribution and Takedown'],
 'motivation': ['Financial Gain',
                'Data Extortion',
                'Initial Access Brokerage (Threat-as-a-Service)'],
 'post_incident_analysis': {'corrective_actions': ['Redesign OAuth App '
                                                   'Permission Model (Least '
                                                   'Privilege by Default)',
                                                   'Deploy Dedicated API '
                                                   'Security Gateways with '
                                                   'Behavioral Analysis',
                                                   'Mandate MFA for All OAuth '
                                                   'App Authorizations',
                                                   'Integrate Threat '
                                                   'Intelligence Feeds for '
                                                   'Tor/VPN-Based Call Origins',
                                                   'Establish Cross-Functional '
                                                   'Incident Response for CRM '
                                                   'Compromises'],
                            'root_causes': ['Over-Permissive OAuth Scopes for '
                                            'Connected Apps',
                                            'Lack of API-Specific Anomaly '
                                            'Detection (e.g., Bulk SOQL '
                                            'Queries)',
                                            'Insufficient User Training on '
                                            'Vishing + OAuth Risks',
                                            'Gaps in Conditional Access '
                                            'Policies for High-Risk Auth '
                                            'Flows']},
 'ransomware': {'data_exfiltration': ['Primary Focus (Extortion via Data Leak '
                                      'Threats)']},
 'recommendations': ['Implement Zero Trust Principles for API Access (Least '
                     'Privilege, Continuous Authentication)',
                     'Deploy WAF Rules to Detect Bulk API Queries (e.g., SOQL '
                     'via REST Endpoints)',
                     'Enforce Multi-Factor Authentication (MFA) for OAuth App '
                     'Authorizations',
                     'Monitor for Anomalous OAuth Token Usage (e.g., '
                     'Geographically Inconsistent Access)',
                     'Restrict Connected Apps to Pre-Approved IP Ranges/Device '
                     'Postures',
                     'Conduct Regular Red Team Exercises Simulating Vishing + '
                     'OAuth Abuse',
                     'Adopt Hardware-Backed Key Storage (HSM) for Critical API '
                     'Credentials',
                     'Prepare Incident Response Playbooks for CRM-Specific '
                     'Extortion Scenarios'],
 'references': [{'source': 'Article on UNC6040 Vishing Campaigns'}],
 'response': {'adaptive_behavioral_waf': ['Rate-Limiting for Bulk API '
                                          'Operations (e.g., '
                                          '/services/data/v58.0/jobs/query)'],
              'containment_measures': ['Web Application Firewall (WAF) with '
                                       'Rate-Limiting for API Calls',
                                       'SIEM Correlation of OAuth Events with '
                                       'API Usage',
                                       'User and Entity Behavior Analytics '
                                       '(UEBA) Deployment',
                                       'Conditional Access Policies for OAuth '
                                       'Apps (IP/Device/Risk-Based)'],
              'enhanced_monitoring': ['Real-Time API Call Anomaly Detection',
                                      'Geofencing for OAuth Authorizations'],
              'network_segmentation': ['Isolate CRM API Endpoints from '
                                       'Untrusted Networks'],
              'remediation_measures': ['Revoke Compromised OAuth Tokens',
                                       'Audit and Restrict Connected Apps '
                                       'Permissions',
                                       'Implement Hardware Security Modules '
                                       '(HSM) for API Keys',
                                       'Enforce Perfect Forward Secrecy (PFS) '
                                       'for Authentication Tokens',
                                       'Deploy CAA Records and DANE for Domain '
                                       'Spoofing Prevention']},
 'threat_actor': ['UNC6040', 'UNC6240 (associated extortion specialists)'],
 'title': 'Sophisticated Vishing Campaigns by UNC6040 Exploiting OAuth and '
          'Salesforce APIs for Large-Scale Data Exfiltration',
 'type': ['Social Engineering',
          'Vishing',
          'Data Exfiltration',
          'API Abuse',
          'Extortion'],
 'vulnerability_exploited': ['Trust in IT Support Interactions',
                             'Salesforce Connected Apps OAuth Endpoint '
                             '(/oauth2/authorize)',
                             'Elevated OAuth Scopes (api, refresh_token, full)',
                             'Lack of API Rate-Limiting Detection',
                             'Insufficient User Behavior Analytics (UBA/UEBA)',
                             'Weak Conditional Access Policies for OAuth Apps']}
Great! Next, complete checkout for full access to Rankiteo Blog.
Welcome back! You've successfully signed in.
You've successfully subscribed to Rankiteo Blog.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info has been updated.
Your billing was not updated.