FBI Warns of Salesforce Data Theft Campaigns by UNC6040, UNC6395 as Cybercrime Groups Go ‘Dark’

FBI Warns of Salesforce Data Theft Campaigns by UNC6040, UNC6395 as Cybercrime Groups Go ‘Dark’

The U.S. Federal Bureau of Investigation (FBI) has issued a flash alert containing indicators of compromise (IoCs) tied to two cybercriminal clusters — UNC6040 and UNC6395 — following a wave of data theft and extortion attacks targeting Salesforce environments.

“Both groups have recently been observed targeting organizations’ Salesforce platforms via different initial access mechanisms,” the FBI said.

UNC6395 has been linked to a large-scale campaign from August 2025 that exploited compromised OAuth tokens for the Salesloft Drift application to infiltrate Salesforce instances. The breach stemmed from the compromise of Salesloft’s GitHub account between March and June 2025. In response, Salesloft has taken the Drift AI chatbot offline, isolated its infrastructure, and initiated stronger security controls.
“We are focused on the ongoing hardening of the Drift Application environment,” the company stated. “This process includes rotating credentials, temporarily disabling certain parts of the Drift application and strengthening security configurations. At this time, we are advising all Drift customers to treat any and all Drift integrations and related data as potentially compromised.”

The second group, UNC6040, has been active since October 2024 and is described by Google as a financially motivated actor. It is known for using vishing campaigns to gain initial access and hijack Salesforce portals for data exfiltration. The group has relied on a modified version of Salesforce Data Loader and custom Python scripts to pull large datasets. The stolen data has in some cases been used for extortion, months after the initial breach.
“UNC6040 threat actors have utilized phishing panels, directing victims to visit from their mobile phones or work computers during the social engineering calls,” the FBI said. “After obtaining access, UNC6040 threat actors have then used API queries to exfiltrate large volumes of data in bulk.”

Google has attributed the extortion phase to another cluster, UNC6240, which has claimed affiliation with ShinyHunters. Although ShinyHunters recently announced, alongside Scattered Spider and LAPSUS$, that they are shutting down — saying, “Our objectives having been fulfilled, it is now time to say goodbye” — security researchers warn this may be temporary.
“Recent arrests may have prompted the group to lay low, but history tells us this is often temporary,” said Sam Rubin of Unit 42. “Silence from a threat group does not equal safety.”

- Advertisement -

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles

error: Content is protected !!

Share your details to download the Cybersecurity Report 2025

Share your details to download the CISO Handbook 2025

Sign Up for CXO Digital Pulse Newsletters

Share your details to download the Research Report

Share your details to download the Coffee Table Book

Share your details to download the Vision 2023 Research Report

Download 8 Key Insights for Manufacturing for 2023 Report

Sign Up for CISO Handbook 2023

Download India’s Cybersecurity Outlook 2023 Report

Unlock Exclusive Insights: Access the article

Download CIO VISION 2024 Report

Share your details to download the report

Share your details to download the CISO Handbook 2024

Fill your details to Watch