Sforce Maximizer

FBI Alert: How UNC6040 & UNC6395 Are Targeting Salesforce and How to proactively prevent it

🚨 Immediate Action Required

On September 12, 2025, the FBI issued FLASH alert FLASH-20250912-001 warning about two cybercriminal groups actively targeting Salesforce platforms. Major companies including Google, Chanel, Qantas, and Allianz have already been compromised. Your organization could be next.

The Threat Landscape Has Changed

In 2025, cybercriminals have evolved beyond traditional network breaches. They’re now targeting the very features that make Salesforce powerful—its integrations and ease of use. Two sophisticated threat groups, UNC6040 and UNC6395, have developed methods that bypass traditional security controls including MFA, making them extremely dangerous.

What makes these attacks so concerning:

How These Attacks Work

Attack Flow Diagram

Visual representation of both attack methods targeting Salesforce environments

The diagram shows the complete attack flow from initial contact to data exfiltration

🎯 UNC6040: Voice Phishing (Vishing)

  1. Initial Contact: Attackers call help desk posing as IT support
  2. Social Engineering: Claim to resolve “enterprise-wide connectivity issues”
  3. Deception: Guide employees to authorize malicious connected apps
  4. Persistence: Modified Salesforce Data Loader grants ongoing access
  5. Exfiltration: Bulk data extraction via API queries
  6. Extortion: ShinyHunters demands cryptocurrency payments

đź”— UNC6395: OAuth Token Compromise

  1. Supply Chain Attack: Compromise Salesloft’s GitHub (March-June 2025)
  2. Token Theft: Extract OAuth tokens from AWS Drift instance
  3. Direct Access: Use stolen tokens to authenticate to Salesforce
  4. Data Mining: Target support cases for credentials and tokens
  5. Lateral Movement: Use harvested credentials to access other cloud services
  6. Scale Impact: Pivot to multiple cloud environments

FBI Indicators of Compromise

The FBI has released specific technical indicators to help organizations detect these attacks:

🔍 Key IOCs to Monitor:

How to be Proactive and Prevent these Issues in the Future

Comprehensive approach to protecting your Salesforce environment


Shows the complete security lifecycle from prevention through response

🛡️ Prevention Layer

🔍 Detection Layer

⚡ Response Layer

🎯 Bottom Line Up Front (BLUF)

Implementation Roadmap

Week 1: Immediate Actions

Week 2-4: Foundation Building

Month 2-3: Optimization

Don’t Wait for an Attack

The threat actors behind these campaigns are sophisticated, well-funded, and actively targeting organizations like yours. The FBI’s alert is not just a warning—it’s a call to action.

📞 Need Help Implementing These Measures?

Our team of Salesforce security experts can help you assess your current security posture and implement these recommendations. Please feel free to email me at buyan@eigenx.com for any questions







Exit mobile version