Thursday, October 2, 2025

Google Warns Firms to Fortify Salesforce Security Against UNC6040

The rise in Salesforce data breaches has put global companies on edge. Google, which has itself faced intrusions, is now urging enterprises to step up defenses against the threat group UNC6040, a collective known for using phone-based social engineering to trick employees into handing over sensitive information.

A Growing Threat to Cloud Platforms

UNC6040 has gained notoriety for repeatedly breaking into Salesforce environments. According to Mandiant, a cybersecurity arm under Google, the group has not relied on technical flaws but on manipulating people through vishing, or voice phishing, calls. Attackers persuade employees to download an altered version of Salesforce’s Data Loader tool, which secretly funnels sensitive customer data to the intruders.

These breaches are often followed by extortion demands, sometimes surfacing months after the initial compromise. Messages are sent by actors claiming ties to the ShinyHunters cybercrime group, notorious for past thefts and leaks of corporate data.

The danger extends beyond Salesforce. Once inside, attackers have been able to harvest credentials and move laterally into other systems, including Okta identity management and Microsoft 365 accounts. This creates a ripple effect, where a single weak link opens the door to entire corporate networks.

google and mandiant
google and mandiant

How Attackers Exploit Employees

The tactics are as simple as they are effective. Mandiant investigators detailed that UNC6040 often targets English-speaking staff at multinational firms. Employees receive calls from impostors pretending to be IT support or vendor representatives. Under pressure, the victims are guided to install rogue apps or share login details.

In many cases, the scam hinges on trust. Attackers lean on information that seems credible, such as the employee’s team, supervisor name, or recent activity, all of which can be pieced together from publicly available sources. Once persuaded, the employee unknowingly hands over the keys to critical systems.

The success of these attacks highlights that the human factor, not software flaws, remains the most exploited entry point into enterprise systems.

Stronger Identity Verification Is Critical

Mandiant’s latest advisory emphasizes that verification must be multi-layered. Organizations should stop relying on identifiers that attackers can easily find, like birth dates or employee IDs. Instead, they should pivot to more secure practices:

  • Video verification: A live call where the employee must display a corporate badge or government-issued ID beside their face.

  • Cross-checking internal photos: Comparing the person’s face with the image in the corporate directory.

  • Calendar validation: Confirming the caller is not marked absent or on leave when making a request.

For high-risk actions, such as resetting multifactor authentication (MFA), help desks should use out-of-band checks. This means calling the registered number on file or reaching out to the employee’s manager before approving the request. These extra steps help ensure that attackers cannot succeed by voice alone.

Defending Against Vendor Impersonation

UNC6040 has also impersonated third-party vendors, a tactic that makes employees more likely to comply since the request seems business-related. Mandiant advises that staff must never grant access immediately in such cases. Instead, they should:

  1. End the call without sharing details.

  2. Reach out directly to the official account manager tied to that vendor.

  3. Demand a support ticket be logged through the official portal with a valid confirmation number.

This structured process makes it harder for fraudsters to pressure employees into hasty decisions.

Common Attack ScenarioDefensive Step
Fake vendor requests system accessHang up, confirm with account manager
Caller asks for MFA resetUse video ID proofing and OOB checks
Employee asked to download Salesforce toolValidate source and confirm digitally signed software

Security Awareness and Culture

Mandiant stressed that technology alone cannot solve the problem. Companies need a strong reporting culture where employees are encouraged to flag suspicious calls, emails, or app requests without fear of blame. These reports must feed into a centralized system, enabling security teams to detect and stop campaigns before they spread.

Cybercriminal groups like ShinyHunters and Scattered Spider thrive on human missteps. Regular training sessions, clear escalation procedures, and visible leadership support can significantly reduce the success rate of these social engineering attacks.

Hardening Cloud Defenses

Beyond verification, Mandiant listed several practical measures for organizations to adopt:

  • Use single sign-on (SSO) providers to reduce password fatigue.

  • Deploy phishing-resistant MFA with hardware keys such as FIDO2.

  • Apply dynamic authentication policies that adapt to risk, such as requiring extra steps when logins come from new locations.

  • Continuously monitor for suspicious behavior, including unusual data downloads or failed login attempts.

These steps, while technical, ultimately aim to contain damage if a social engineering attack slips past initial defenses.

The Stakes for Enterprises

The warning from Google underscores how the modern cyber battlefield has shifted. Even global tech firms with advanced defenses have fallen victim to UNC6040’s schemes. This demonstrates that the weakest link is often not the code or infrastructure but the individual on the other end of a phone call.

For companies, the cost of inaction could be steep: stolen customer data, regulatory fines, reputational harm, and prolonged extortion threats. By investing in layered identity checks and fostering a vigilant culture, enterprises can make it far harder for groups like UNC6040 to succeed.

The call to action is clear: treat every unexpected request for access as suspicious until proven otherwise.

In a world where criminals no longer need to break the system but only break trust, the human firewall is just as critical as the technical one. What are your thoughts on these evolving tactics? Do you think your workplace is prepared to handle such social engineering risks? Share this article with your colleagues and spark the conversation on building stronger defenses.

Joshua Garcia
Joshua Garcia
Joshua is a certified personal trainer with a degree in Kinesiology and a fitness blogger with a passion for helping others achieve their health and fitness goals. He also writes about a wide range of topics, including health and wellness, personal development, mindfulness, and sustainable living.

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Share post:

Recent

More like this
Related

How to Get the Senior Discount for Amazon Prime Membership

Amazon Prime offers incredible convenience with its free shipping,...

How to Become an Amazon Delivery Driver: a Complete Guide

You can become an Amazon delivery driver by meeting...

China’s Underground Raves: a Secret Space for Youth Freedom

In the city of Changchun, China, a different kind...

How to Complain About an Amazon Driver for a Quick Resolution

When your Amazon package arrives late, damaged, or is...