Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Campaigns
  3. Salesforce Data Exfiltration

Salesforce Data Exfiltration

TheSalesforce Data Exfiltration campaign began in October 2024 with financially-motivated threat actor UNC6040 usingSpearphishing Voice (vishing) to compromise corporate Salesforce instances for large-scale data theft and extortion. Following the initial data theft, victim organizations received extortion demands from a separate threat actor, UNC6240, who claimed to be the "ShinyHunters" group. The observed infrastructure and TTPs used during theSalesforce Data Exfiltration campaign overlap with those used by threat groups with suspected ties to the broader collective known as "The Com." These overlaps could plausibly be the result of associated actors operating within the same communities and are not necessarily an indication of a direct operational relationship.[1][2]

ID: C0059
First Seen: October 2004[1]
Last Seen: September 2025[1]
Version: 1.0
Created: 22 October 2025
Last Modified: 24 October 2025
Enterprise Layer
downloadview

Techniques Used

DomainIDNameUse
EnterpriseT1020Automated Exfiltration

DuringSalesforce Data Exfiltration, threat actors used API queries to automatically exfiltrate large volumes of data.[1]

EnterpriseT1671Cloud Application Integration

DuringSalesforce Data Exfiltration, threat actors deceived victims into authorizing malicious connected apps to their organization's Salesforce portal.[1][2]

EnterpriseT1059.006Command and Scripting Interpreter:Python

DuringSalesforce Data Exfiltration, threat actors used custom applications developed in python.[2]

EnterpriseT1586.002Compromise Accounts:Email Accounts

DuringSalesforce Data Exfiltration, threat actors used compromised emails to create Salesforce trial accounts.[2]

EnterpriseT1213.004Data from Information Repositories:Customer Relationship Management Software

DuringSalesforce Data Exfiltration, threat actors accessed and exfiltrated sensitive information from compromised Salesforce instances.[2]

EnterpriseT1587.001Develop Capabilities:Malware

DuringSalesforce Data Exfiltration, threat actors created malicious applications within Salesforce trial accounts, typically Python scripts with similar function to the Salesforce Data Loader.[1][2]

EnterpriseT1585Establish Accounts

DuringSalesforce Data Exfiltration, threat actors created Salesforce trial accounts to register their malicious applications.[2]

.002Email Accounts

DuringSalesforce Data Exfiltration, threat actors registered emails shinycorp@tuta[.]com and shinygroup@tuta[.]com to send victims extortion demands.[2]

EnterpriseT1567Exfiltration Over Web Service

DuringSalesforce Data Exfiltration, threat actors exfiltrated data via legitimate Salesforce API communication channels including the Salesforce Data Loader application.[2][1]

EnterpriseT1083File and Directory Discovery

DuringSalesforce Data Exfiltration, threat actors queried customers' Salesforce environments to identify sensitive information for exfiltration.[1]

EnterpriseT1656Impersonation

DuringSalesforce Data Exfiltration, threat actors impersonated IT support personnel in voice calls with victims at times claiming to be addressing enterprise-wide connectivity issues.[2][1]

EnterpriseT1036Masquerading

DuringSalesforce Data Exfiltration, threat actors used voice calls to socially engineer victims into authorizing a modified version of the Salesforce Data Loader app.[2]

EnterpriseT1588.002Obtain Capabilities:Tool

DuringSalesforce Data Exfiltration, threat actors initially relied on the legitimate Salesforce Data Loader app for data exfiltration.[2][1]

EnterpriseT1598.004Phishing for Information:Spearphishing Voice

DuringSalesforce Data Exfiltration, threat actors initiated voice calls with victims to socially engineer them into authorizing malicious applications or divulging sensitive credentials.[1][2]

EnterpriseT1090Proxy

DuringSalesforce Data Exfiltration, threat actors used Mullvad VPN IPs to proxy voice phishing calls.[2]

.003Multi-hop Proxy

DuringSalesforce Data Exfiltration, threat actors usedTor IPs for voice calls and for the collection of stolen data.[2]

EnterpriseT1608.005Stage Capabilities:Link Target

DuringSalesforce Data Exfiltration, threat actors established an Okta phishing panel which victims were tricked into accessing from mobile phones or work computers during social engineering calls.[1][2]

EnterpriseT1078.002Valid Accounts:Domain Accounts

DuringSalesforce Data Exfiltration, threat actors used compromised credentials for lateral movement.[1][2]

Software

IDNameDescription
S0183 Tor

DuringSalesforce Data Exfiltration, threat actors usedTor IPs for voice calls and data collection.[2]

References

×

[8]ページ先頭

©2009-2026 Movatter.jp