Google Unveils a Salesforce Scam and Becomes a Victim Itself

Google Unveils a Salesforce Scam and Becomes a Victim Itself

In a compelling turn of events, Google's recent disclosure has revealed that even it was not immune to a scam it initially discovered. A June announcement by Google unearthed a deceptive campaign targeting Salesforce customers, where attackers masqueraded as IT department personnel to gain account access.

Unlike traditional exploits that target vulnerabilities in software, this scam leverages social engineering to obtain access. The attackers, driven by financial motivations, aim to exfiltrate business data with the intent to sell it back at exorbitant prices. Companies compromised in this wave include significant names like Adidas, Cisco, and several others.

Uncovering the Attack Vector
A key aspect of this operation is the misuse of a Salesforce feature that allows account-linking to third-party apps. Attackers instruct employees to connect an external app to their Salesforce, subsequently requesting an authentication code needed for connection. This simple yet effective trick permits access to sensitive data.

Google's acknowledgment of its own breach, however delayed, sheds light on the urgency with which businesses must bolster their defenses. Information accessed during this breach was reportedly limited to business names and contact info, much of which was previously public, according to Google’s statements.

Two-Pronged Attack Strategy
Initially attributed to the hacker group UNC6040, the attacks appear to have another dimension involving a second group, UNC6042, associated with extortion tactics under the 'ShinyHunters' label. There are indications of plans to heighten extortion pressures by launching a data leak site.

The revelation underscores the need for companies relying on Salesforce services to audit their systems for vulnerabilities. Implementing multifactor authentication and educating staff on recognizing social engineering attempts should be paramount.