Close Menu
Pineapples Update –Pineapples Update –

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    5 shows like ‘Big Mouth’ on Netflix to stream now that animated show is over

    June 8, 2025

    Tedhar CEO Paolo Ardoino says ‘No need is needed’

    June 8, 2025

    What is MicroSD Express? Everything You Need To Know

    June 8, 2025
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Pineapples Update –Pineapples Update –
    • Home
    • Gaming
    • Gadgets
    • Startups
    • Security
    • How-To
    • AI/ML
    • Apps
    • Web3
    Pineapples Update –Pineapples Update –
    Home»Security»Cyber ​​criminals are stealing business salesforce data with this simple trick – don’t fall for it
    Security

    Cyber ​​criminals are stealing business salesforce data with this simple trick – don’t fall for it

    PineapplesUpdateBy PineapplesUpdateJune 6, 2025No Comments4 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Cyber ​​criminals are stealing business salesforce data with this simple trick – don’t fall for it
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Cyber ​​criminals are stealing business salesforce data with this simple trick – don’t fall for it

    Mencent photography/gayty

    Do you use salesfors in your business? If so, you want to look out for a new fishing attack in which hackers aim to steal your salesforce data.

    One in Blog post published on WednesdayGoogle’s Threat Intelligence Group wishs how attackers are using Vishing, or Voice Fishing, to provide employees to provide access to salesforce records. The target is to steal a large amount of confidential data in an attempt to remove the victims. It works like this.

    Also: Clicked on a fishing link? To protect your accounts immediately to take 7 steps

    The cyber criminal behind the campaign calls an unheard employee in a targeted business, implementing IT support personnel. During the call, the employee is instructed to go to an alleged salesforce setup page, where they are asked to download and install an application called salesforce data loader.

    Data loader app is real And by connecting to the internal database, salesforce records are used to import, export or replace. But the version on the web page is a modified and controlled by the attackers.

    Once the app is installed and connected, hackers can use, query and export sensitive salesforce records for their own devious purposes. Data exfIs usually occur immediately after receiving access by the group.

    In some cases, the offender employee asks users for credentials and multi-factor authentication code, through which they can export salesforce data. The attackers use Mullvad VPN IP addresses to reach the SAlesforce atmosphere.

    Also: 7 password rules security experts live in 2025 – final can surprise you

    They will also sign in with the user names and passwords captured through credential harvesting or wishing. Armed with credentials, they can later move through a network where they capture data from other cloud-based platforms including Microsoft 365 and OKTA.

    Vishing Campaign to steal salesforce data

    Google

    In its post, Google recognized the group behind the attack as UnC6040, which specializes in Voice Fishing as a form of social engineering. But UnC6040 cannot work alone.

    For several months of the initial attack, the real occurs until often occurs. It can point to another cyber crime group, whose role is to mudge access to data according to Google. UNC6040 has also claimed to work with Hacking Group Shinoors to pressurize its victims to pay their victims.

    Also: Is your Asus router part of a botnet? How to check – and what you can do

    In addition, Google’s danger intelligence researchers have discovered other attacks similar to those staged by UNC6040. All these share some strategy, techniques and processes (TTPs), such as IT support in a wishing scam, targeting OCTA credentials and focusing on English speaking users in multinational companies. Dubbing this loose collective “The Com”, Google admitted that these similarities may mean that the attackers are working in the same community rather than joining the forces directly.

    It is also important to note that the attacks do not stems from any weaknesses in salesforce or other cloud-based services. Rather, criminals take advantage of a familiar and always reliable social engineering strategy. In these cases, employees voluntarily apply a reliable or official entity to request an unknown collar requests. Despite all the staff warnings and training about fishing and vision, scammers know that they can still find someone who will take fodder.

    Salesforce spokesperson said in a statement by ZDNET, “Salesforce has an enterprise-grade security manufactured in every part of our platform, and there is no indication on the issue that any degeneration has been described with any vulnerability inherent for our services.” “Attacks like Voice Fishing are targeted by social engineering scams designed to take advantage of intervals in cyber security awareness and best practices of individual users.

    Both Google And Sales force Suggest for the protection of your data from these types of scams. These include allowing users only to allow the necessary permission for their roles, manage access to connected applications, apply multi-factor authentication, set up a limited range of reliable IP addresses for login, looking at available safety equipment. Salesforce shieldAnd add a specific safety contact to your organization.

    Get top stories of morning with us in your inbox every day Tech Today Newsletter.

    business criminals Cyber data dont fall SAlesforce simple stealing trick
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleThis dirty malware reminds us why the pirateing games are dangerous
    Next Article Week’s book of my kitchen: ‘sauceie’
    PineapplesUpdate
    • Website

    Related Posts

    Security

    Remove project directors presented as malicious NPM package utilities

    June 8, 2025
    Security

    Supply series attacks Glustac NPM package with 960K weekly download

    June 7, 2025
    Gadgets

    Cyber ​​criminals love this ancient Windows tool, but a small CLI utility is their new secret weapon

    June 7, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Microsoft’s new text editor is a VIM and Nano option

    May 19, 2025594 Views

    The best luxury car for buyers for the first time in 2025

    May 19, 2025536 Views

    Massives Datenleck in Cloud-Spichenn | CSO online

    May 19, 2025465 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    Meta delay entrusts ‘Bhamoth’ AI model, Openi and Google more than one more head start

    May 16, 20250 Views

    The OURA ring found a new rival with just one titanium design and 24/7 biometric tracking – no membership is required

    May 16, 20250 Views

    Filecoin, Lockheed Martin Test IPFS in space

    May 16, 20250 Views
    Our Picks

    5 shows like ‘Big Mouth’ on Netflix to stream now that animated show is over

    June 8, 2025

    Tedhar CEO Paolo Ardoino says ‘No need is needed’

    June 8, 2025

    What is MicroSD Express? Everything You Need To Know

    June 8, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms And Conditions
    • Disclaimer
    © 2025 PineapplesUpdate. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.