Google Salesforce Breach: A Deep dive into the chain and extent of the compromise
In June 2025, Google's Salesforce instance was breached by UNC6040 & UNC6240 using vishing, OAuth app abuse, and anonymity layers. The attackers stole business data of small and medium-sized clients. A parallel attack by UNC6395 compromised Salesloft Drift's Salesforce integration, affecting hundreds of customers. Both incidents involved sophisticated social engineering, OAuth token abuse, and data exfiltration via TOR. The attacks are linked to the ShinyHunters group and share similarities with other high-profile breaches targeting various industries. The incidents highlight vulnerabilities in SaaS environments and the need for improved security measures, including OAuth governance, identity management, and proactive monitoring.
AI Analysis
Technical Summary
In June 2025, a sophisticated cyberattack campaign targeted Google's Salesforce environment, executed by threat actors UNC6040 and UNC6240. The attackers employed a multi-faceted approach combining vishing (voice phishing), abuse of OAuth applications, and anonymity techniques such as routing data exfiltration through the TOR network. The initial vector involved social engineering to trick users or administrators into granting OAuth app permissions, enabling the attackers to obtain valid OAuth tokens. These tokens allowed unauthorized access to Salesforce data without requiring direct credential compromise or traditional authentication bypass. Parallelly, UNC6395 compromised the Salesforce integration used by Salesloft Drift, impacting hundreds of customers. The attackers focused on stealing business data primarily from small and medium-sized clients, indicating a strategic targeting of less-protected SaaS environments. The campaign is linked to the ShinyHunters group, known for high-profile breaches and data theft. The attack chain highlights critical vulnerabilities in SaaS security, particularly around OAuth governance, identity and access management, and the challenges of detecting token abuse and social engineering in cloud environments. The use of TOR for data exfiltration further complicates attribution and detection. Indicators of compromise include multiple IP addresses and domains used for command and control or phishing infrastructure. The campaign underscores the necessity for enhanced monitoring of OAuth app permissions, rigorous user training against vishing, and improved anomaly detection in cloud platforms like Salesforce.
Potential Impact
European organizations using Salesforce and integrated SaaS platforms are at significant risk due to the widespread adoption of these cloud services across the continent. The theft of business data from small and medium-sized enterprises (SMEs) could lead to loss of intellectual property, competitive disadvantage, regulatory compliance violations (e.g., GDPR breaches), and reputational damage. The abuse of OAuth tokens bypasses traditional security controls, making detection difficult and increasing the risk of prolonged unauthorized access. The use of vishing exploits human factors, which remain a weak link in cybersecurity defenses. Data exfiltration via TOR anonymizes attacker activity, complicating incident response and forensic investigations. Given the interconnected nature of SaaS ecosystems, a breach in one service can cascade to others, amplifying the impact. This threat also raises concerns about supply chain security for European businesses relying on third-party SaaS integrations. The medium severity rating reflects the targeted nature of the attack and the complexity of exploitation, but the potential for significant business disruption and data loss remains high.
Mitigation Recommendations
European organizations should implement stringent OAuth governance policies, including regular audits of authorized OAuth applications and revocation of unused or suspicious app permissions. Employing least privilege principles for OAuth scopes can limit potential damage. Multi-factor authentication (MFA) should be enforced for all administrative and user accounts, especially those with access to sensitive SaaS platforms. User awareness programs must be enhanced to specifically address vishing and social engineering tactics, incorporating simulated phishing and vishing exercises. Network monitoring should include detection of TOR traffic and anomalous data flows indicative of exfiltration attempts. Integration of cloud access security brokers (CASBs) can provide visibility and control over SaaS usage and OAuth token activity. Incident response plans must be updated to include scenarios involving OAuth abuse and social engineering. Collaboration with SaaS providers to enable advanced logging and anomaly detection is critical. Finally, organizations should consider implementing just-in-time access and continuous authentication mechanisms to reduce the window of opportunity for attackers.
Affected Countries
United Kingdom, Germany, France, Netherlands, Sweden, Ireland, Belgium
Indicators of Compromise
- ip: 154.41.95.2
- ip: 176.65.149.100
- ip: 185.130.47.58
- ip: 192.42.116.179
- ip: 192.42.116.20
- ip: 194.15.36.117
- ip: 195.47.238.178
- ip: 195.47.238.83
- ip: 37.114.50.27
- ip: 38.135.24.30
- ip: 45.90.185.107
- ip: 45.90.185.109
- ip: 45.90.185.115
- ip: 45.90.185.118
- domain: ticket-audemarspiguet.com
- domain: ticket-dior.com
- domain: ticket-nike.com
- domain: tuta.com
- domain: tutamail.com
Google Salesforce Breach: A Deep dive into the chain and extent of the compromise
Description
In June 2025, Google's Salesforce instance was breached by UNC6040 & UNC6240 using vishing, OAuth app abuse, and anonymity layers. The attackers stole business data of small and medium-sized clients. A parallel attack by UNC6395 compromised Salesloft Drift's Salesforce integration, affecting hundreds of customers. Both incidents involved sophisticated social engineering, OAuth token abuse, and data exfiltration via TOR. The attacks are linked to the ShinyHunters group and share similarities with other high-profile breaches targeting various industries. The incidents highlight vulnerabilities in SaaS environments and the need for improved security measures, including OAuth governance, identity management, and proactive monitoring.
AI-Powered Analysis
Technical Analysis
In June 2025, a sophisticated cyberattack campaign targeted Google's Salesforce environment, executed by threat actors UNC6040 and UNC6240. The attackers employed a multi-faceted approach combining vishing (voice phishing), abuse of OAuth applications, and anonymity techniques such as routing data exfiltration through the TOR network. The initial vector involved social engineering to trick users or administrators into granting OAuth app permissions, enabling the attackers to obtain valid OAuth tokens. These tokens allowed unauthorized access to Salesforce data without requiring direct credential compromise or traditional authentication bypass. Parallelly, UNC6395 compromised the Salesforce integration used by Salesloft Drift, impacting hundreds of customers. The attackers focused on stealing business data primarily from small and medium-sized clients, indicating a strategic targeting of less-protected SaaS environments. The campaign is linked to the ShinyHunters group, known for high-profile breaches and data theft. The attack chain highlights critical vulnerabilities in SaaS security, particularly around OAuth governance, identity and access management, and the challenges of detecting token abuse and social engineering in cloud environments. The use of TOR for data exfiltration further complicates attribution and detection. Indicators of compromise include multiple IP addresses and domains used for command and control or phishing infrastructure. The campaign underscores the necessity for enhanced monitoring of OAuth app permissions, rigorous user training against vishing, and improved anomaly detection in cloud platforms like Salesforce.
Potential Impact
European organizations using Salesforce and integrated SaaS platforms are at significant risk due to the widespread adoption of these cloud services across the continent. The theft of business data from small and medium-sized enterprises (SMEs) could lead to loss of intellectual property, competitive disadvantage, regulatory compliance violations (e.g., GDPR breaches), and reputational damage. The abuse of OAuth tokens bypasses traditional security controls, making detection difficult and increasing the risk of prolonged unauthorized access. The use of vishing exploits human factors, which remain a weak link in cybersecurity defenses. Data exfiltration via TOR anonymizes attacker activity, complicating incident response and forensic investigations. Given the interconnected nature of SaaS ecosystems, a breach in one service can cascade to others, amplifying the impact. This threat also raises concerns about supply chain security for European businesses relying on third-party SaaS integrations. The medium severity rating reflects the targeted nature of the attack and the complexity of exploitation, but the potential for significant business disruption and data loss remains high.
Mitigation Recommendations
European organizations should implement stringent OAuth governance policies, including regular audits of authorized OAuth applications and revocation of unused or suspicious app permissions. Employing least privilege principles for OAuth scopes can limit potential damage. Multi-factor authentication (MFA) should be enforced for all administrative and user accounts, especially those with access to sensitive SaaS platforms. User awareness programs must be enhanced to specifically address vishing and social engineering tactics, incorporating simulated phishing and vishing exercises. Network monitoring should include detection of TOR traffic and anomalous data flows indicative of exfiltration attempts. Integration of cloud access security brokers (CASBs) can provide visibility and control over SaaS usage and OAuth token activity. Incident response plans must be updated to include scenarios involving OAuth abuse and social engineering. Collaboration with SaaS providers to enable advanced logging and anomaly detection is critical. Finally, organizations should consider implementing just-in-time access and continuous authentication mechanisms to reduce the window of opportunity for attackers.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.seqrite.com/blog/google-salesforce-breach-unc6040-threat-research/"]
- Adversary
- UNC6040, UNC6240
- Pulse Id
- 68b85f2d5e0366f13974b43e
- Threat Score
- null
Indicators of Compromise
Ip
Value | Description | Copy |
---|---|---|
ip154.41.95.2 | — | |
ip176.65.149.100 | — | |
ip185.130.47.58 | — | |
ip192.42.116.179 | — | |
ip192.42.116.20 | — | |
ip194.15.36.117 | — | |
ip195.47.238.178 | — | |
ip195.47.238.83 | — | |
ip37.114.50.27 | — | |
ip38.135.24.30 | — | |
ip45.90.185.107 | — | |
ip45.90.185.109 | — | |
ip45.90.185.115 | — | |
ip45.90.185.118 | — |
Domain
Value | Description | Copy |
---|---|---|
domainticket-audemarspiguet.com | — | |
domainticket-dior.com | — | |
domainticket-nike.com | — | |
domaintuta.com | — | |
domaintutamail.com | — |
Threat ID: 68b8a26bad5a09ad00fa1350
Added to database: 9/3/2025, 8:17:47 PM
Last enriched: 9/3/2025, 8:33:13 PM
Last updated: 9/4/2025, 1:55:11 AM
Views: 4
Related Threats
Not Safe for Work: Tracking and Investigating Stealerium and Phantom Infostealers
MediumEthereum smart contracts used to push malicious code on npm
MediumNew malware campaign discovered via ManualFinder
MediumDire Wolf Ransomware: Threat Combining Data Encryption and Leak Extortion
MediumMalicious Campaign Targeting Diplomatic Assets
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.