Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

FBI Warns of UNC6040 and UNC6395 Targeting Salesforce Platforms in Data Theft Attacks

Posted on September 13, 2025September 13, 2025 By CWS

The U.S. Federal Bureau of Investigation (FBI) has issued a flash alert to launch indicators of compromise (IoCs) related to two cybercriminal teams tracked as UNC6040 and UNC6395 for a string of knowledge theft and extortion assaults.

“Each teams have not too long ago been noticed focusing on organizations’ Salesforce platforms through completely different preliminary entry mechanisms,” the FBI mentioned.

UNC6395 is a menace group that has been attributed a widespread knowledge theft marketing campaign focusing on Salesforce cases in August 2025 by exploiting compromised OAuth tokens for the Salesloft Drift utility. In an replace issued this week, Salesloft mentioned the assault was made potential because of the breach of its GitHub account from March by way of June 2025.

On account of the breach, Salesloft has remoted the Drift infrastructure and brought the bogus intelligence (AI) chatbot utility offline. The corporate additionally mentioned it is within the means of implementing new multi-factor authentication processes and GitHub hardening measures.

“We’re targeted on the continuing hardening of the Drift Utility surroundings,” the corporate mentioned. “This course of consists of rotating credentials, quickly disabling sure components of the Drift utility and strengthening safety configurations.” “At the moment, we’re advising all Drift prospects to deal with any and all Drift integrations and associated knowledge as probably compromised.”

The second group the FBI has referred to as consideration to is UNC6040. Assessed to be lively since October 2024, UNC6040 is the title assigned by Google to a financially motivated menace cluster that has engaged in vishing campaigns to acquire preliminary entry and hijack Salesforce cases for large-scale knowledge theft and extortion.

These assaults have concerned the usage of a modified model of Salesforce’s Information Loader utility and customized Python scripts to breach victims’ Salesforce portals and exfiltrate precious knowledge. No less than a few of the incidents have concerned extortion actions following UNC6040 intrusions, with them happening months after the preliminary knowledge theft.

“UNC6040 menace actors have utilized phishing panels, directing victims to go to from their cell phones or work computer systems through the social engineering calls,” the FBI mentioned. “After acquiring entry, UNC6040 menace actors have then used API queries to exfiltrate massive volumes of knowledge in bulk.”

The extortion section has been attributed by Google to a different uncategorized cluster tracked as UNC6240, which has constantly claimed to be the ShinyHunters group in emails and calls to staff of sufferer organizations.

“As well as, we imagine menace actors utilizing the ‘ShinyHunters’ model could also be getting ready to escalate their extortion techniques by launching a knowledge leak website (DLS),” Google famous final month. “These new techniques are possible meant to extend stress on victims, together with these related to the current UNC6040 Salesforce-related knowledge breaches.”

Since then, there have been a flurry of developments, essentially the most notable being the teaming up of ShinyHunters, Scattered Spider, and LAPSUS$ to consolidate and unify their prison efforts. Then on September 12, 2025, the group claimed on their Telegram channel “scattered LAPSUS$ hunters 4.0” that they’re shutting down.

“We LAPSUS$, Trihash, Yurosh, Yaxsh, WyTroZz, N3z0x, Nitroz, TOXIQUEROOT, Prosox, Pertinax, Kurosh, Clown, IntelBroker, Scattered Spider, Yukari and amongst many others, have determined to go darkish,” the group mentioned. “Our goals having been fulfilled, it’s now time to say goodbye.”

It is at the moment not clear what prompted the group to hold up their boots, however it’s potential that the transfer is an try to put low and keep away from additional legislation enforcement consideration.

“The newly fashioned scattered LAPSUS$ hunters 4.0 group mentioned it is hanging up the boots and ‘go darkish’ after it alleged that French legislation enforcement arrested one other improper particular person in reference to the cybercrime group,” Sam Rubin, senior vice chairman of Unit 42 Consulting and Menace Intelligence, instructed The Hacker Information. “These declarations not often sign a real retirement.”

“Latest arrests might have prompted the group to put low, however historical past tells us that is typically momentary. Teams like this splinter, rebrand, and resurface – very similar to ShinyHunters. Even when public operations pause, the dangers stay: stolen knowledge can resurface, undetected backdoors might persist, and actors might re-emerge below new names. Silence from a menace group doesn’t equal security. Organizations should keep vigilant and function below the idea that the menace has not disappeared, solely tailored.”

The Hacker News Tags:Attacks, Data, FBI, Platforms, Salesforce, Targeting, Theft, UNC6040, UNC6395, Warns

Post navigation

Previous Post: EvilAI as AI-enhanced Tools to Exfiltrate Sensitive Browser Data and Evade Detections
Next Post: Choosing the Right Tool for Network Penetration Testing

Related Posts

Malicious Nx Packages in ‘s1ngularity’ Attack Leaked 2,349 GitHub, Cloud, and AI Credentials The Hacker News
38,000+ FreeDrain Subdomains Found Exploiting SEO to Steal Crypto Wallet Seed Phrases The Hacker News
OpenAI Bans ChatGPT Accounts Used by Russian, Iranian and Chinese Hacker Groups The Hacker News
Storm-0501 Exploits Entra ID to Exfiltrate and Delete Azure Data in Hybrid Cloud Attacks The Hacker News
Cisco Warns of CVSS 10.0 FMC RADIUS Flaw Allowing Remote Code Execution The Hacker News
Hackers Using PDFs to Impersonate Microsoft, DocuSign, and More in Callback Phishing Campaigns The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Choosing the Right Tool for Network Penetration Testing
  • FBI Warns of UNC6040 and UNC6395 Targeting Salesforce Platforms in Data Theft Attacks
  • EvilAI as AI-enhanced Tools to Exfiltrate Sensitive Browser Data and Evade Detections
  • New Malvertising Campaign Leverages GitHub Repository to Deliver Malware
  • New Malware Attack Leverages SVGs, Email Attachments to Deliver XWorm and Remcos RAT

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Choosing the Right Tool for Network Penetration Testing
  • FBI Warns of UNC6040 and UNC6395 Targeting Salesforce Platforms in Data Theft Attacks
  • EvilAI as AI-enhanced Tools to Exfiltrate Sensitive Browser Data and Evade Detections
  • New Malvertising Campaign Leverages GitHub Repository to Deliver Malware
  • New Malware Attack Leverages SVGs, Email Attachments to Deliver XWorm and Remcos RAT

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News