Hackers abuse modified Salesforce app to steal data, extort companies, Google says


FILE PHOTO: The company logo for Salesforce.com is displayed on the Salesforce Tower in New York City, U.S., March 7, 2019. REUTERS/Brendan McDermid/File Photo

(Reuters) -Hackers are tricking employees at companiesin Europe and the Americasinto installing a modified version of a Salesforce-related app, allowing the hackers to steal reams of data, gain access to other corporate cloud services and extort those companies, Google said on Wednesday.

The hackers – tracked by the Google Threat Intelligence Group as UNC6040 – have “proven particularly effective at tricking employees” into installing a modified version of Salesforce’s Data Loader, a proprietary tool used to bulk import data into Salesforce environments, the researchers said.

The hackers use voice calls to trick employees into visiting a purported Salesforce connected app setup page to approve the unauthorized, modified version of the app, created by the hackers to emulate Data Loader.

If the employee installs the app, the hackers gain “significant capabilities to access, query, and exfiltrate sensitive information directly from the compromised Salesforce customer environments,” the researchers said.

The access also frequently gives the hackers the ability to move throughout a customer’s network, enabling attacks on other cloud services and internal corporate networks.

Technical infrastructure tied to the campaign shares characteristics with suspected ties to the broader and loosely organized ecosystem known as “The Com,” known for small, disparate groups engaging in cybercriminal and sometimes violent activity, the researchers said.

A Google spokesperson told Reuters that roughly 20 organizations have been affected by the UNC6040 campaign, which has been observed over the past several months.A subset of those organizations had data successfully exfiltrated, the spokesperson said.

A Salesforce spokesperson told Reuters in an email that “there’s no indication the issue described stems from any vulnerability inherent in our platform.” The spokesperson said the voice calls used to trick employees “are targeted social engineering scams designed to exploit gaps in individual users’ cybersecurity awareness and best practices.”

The spokesperson declined to share the specific number of affected customers, but said that Salesforce was "aware of only a small subset of affected customers," and said it was "not a widespread issue."

Salesforce warned customers of voice phishing, or "vishing," attacks and of hackers abusing malicious, modified versions of Data Loader in a March 2025 blog post.

(Reporting by AJ Vicens in Detroit; Editing by Leslie Adler and Franklin Paul)

Follow us on our official WhatsApp channel for breaking news alerts and key updates!

Next In Tech News

Surging memory chip prices dim outlook for consumer electronics makers
EU to weigh Netflix, Paramount bids for Warner Bros at same time, Bloomberg News reports
Court rules TikTok can continue to operate in Canada for now, Politico reports
Netflix-Warner Bros deal could offer viewers relief from subscription fatigue
AI company Eightfold sued for helping companies secretly score job seekers
SAP shares hit 17-month low as AI-driven selloff burns $130 billion
Intel results to spotlight turnaround efforts as AI data centers boost chip demand
Brazil central bank liquidates Banco Master's Will as Mastercard suspends cards
Netflix co-CEOs go on defensive over $83 billion Warner Bros deal
Exclusive-Meta's new AI team delivered first key models internally this month, CTO says

Others Also Read