Concur News
  • Home
  • India
  • Startup
  • Regulation
  • Interview
  • Press Release
  • Login
August 10, 2025
No Result
View All Result
Concur News

Home » Google admits data breach after cyberattack on Salesforce database – here’s what was exposed

Google admits data breach after cyberattack on Salesforce database – here’s what was exposed

August 8, 2025
in News, United States
Reading Time: 3 mins read
Google admits data breach after cyberattack on Salesforce database – here’s what was exposed
Share on LinkedinShare on Whatsapp

Google confirmed that hackers breached one of its corporate Salesforce systems in June through a cyberattack similar to one it had previously reported. The attackers briefly accessed the system before Google blocked them and stole basic business contact details for small and medium-sized companies. Google stressed that the stolen data was mostly public information, such as company names and contact numbers.

Google’s Threat Intelligence Group (GTIG) tracks the hacking group behind this incident as UNC6040. This group uses voice phishing—calling employees while pretending to be IT staff—to trick them into giving access to Salesforce accounts. Once inside, they use specially made tools to download large amounts of data.

In some cases, another group that GTIG calls UNC6240 uses the stolen data for extortion. This group often claims to be part of the notorious hacker brand “ShinyHunters” and sends threatening emails or makes calls demanding payment in Bitcoin within 72 hours, warning that they will leak the stolen data if victims don’t pay. GTIG believes ShinyHunters may soon launch a dedicated site to publish stolen information, increasing pressure on victims.

Consent Foundation

UNC6040’s tactics have evolved over time. Initially, they used Salesforce’s “Data Loader” app to extract data, but they now use custom-built programs for the same purpose. They also disguise their malicious apps with names like “My Ticket Portal” to make them look legitimate during phishing calls. The attackers frequently hide their location by using VPN services or the TOR network, making it harder to track them.

How the Attack Works

  1. The hackers call an employee, pretending to be IT staff.
  2. They convince the person to approve a fake connected app in Salesforce.
  3. The fake app, often a modified Data Loader, gives them permission to download sensitive data.
  4. They sometimes also steal login details for other company systems like Microsoft 365 or Okta.

Google’s Warning & Advice
Google warns that such attacks may continue for months before the stolen data is used for extortion. Businesses using Salesforce should take the following steps:

  • Limit permissions for tools like Data Loader to only essential staff.
  • Strictly control connected apps and only allow trusted ones.
  • Restrict logins by IP address to block access from unknown networks.
  • Use Salesforce Shield for advanced monitoring and alerts.
  • Enable multi-factor authentication (MFA) for all users and train employees to spot phishing attempts.

Google says these measures can greatly reduce the risk of falling victim to such attacks and urges companies to stay alert to suspicious calls and app authorization requests.



Also read: Election Commission Suspends Five in West Bengal Over Voter Data Breach

Tags: Cyber securityData breachData privacyData ProtectionTechnology

Related Posts

Election Commission Suspends Five in West Bengal Over Voter Data Breach
India

Election Commission Suspends Five in West Bengal Over Voter Data Breach

August 7, 2025
HDFC bank
India

HDFC Warns of New Bank Scam Involving Harmful File Downloads

August 7, 2025
F5 Integrates Data Leak Prevention to Strengthen AI Workload Security
Global

F5 Integrates Data Leak Prevention to Strengthen AI Workload Security

August 7, 2025
Gujarat Police’s Sentinel Lab to Offer Cybersecurity Audits to Businesses
Africa

Gujarat Police’s Sentinel Lab to Offer Cybersecurity Audits to Businesses

August 7, 2025

RECOMMENDED NEWS

Madras High Court Suspends DMK’s Digital Membership Drive Citing Data Privacy Issues

Madras High Court Suspends DMK’s Digital Membership Drive Citing Data Privacy Issues

3 weeks ago
Star Health Data Scare: Breach, Backlash, and a ₹250 Crore Blow

Star Health Data Scare: Breach, Backlash, and a ₹250 Crore Blow

2 months ago
Farmers Bank & Trust

Levi & Korsinsky, LLP Investigates Farmers Bank & Trust Data Breach Impact

4 months ago
ChatGPT Referring to Users by Name Triggers Privacy Concerns

ChatGPT Referring to Users by Name Triggers Privacy Concerns

4 months ago

BROWSE BY TOPICS

AI AI in education AI Privacy banks Children privacy Compliance Consent consent managers Cross-Border Cybercrime Cyber security Data Data breach Data leak Data privacy Data Protection Data security Data Violation Digital DPDP DPDPA DPDP Act EU Fines GDPR google Hack Hacked Industry Interview Investigation Law Meity penalty Personal data Press Release Privacy RBI RTI Act SPAM Tech giants Technology TRAI Training Trending

701, The Capital, BKC(E), Mumbai, India

Follow us on social media:

Categories

Categories Layout
  • Africa
  • America
  • India
  • Asia
  • Europe
  • Japan
  • Business
  • Events
  • Regulation
  • Law
  • News
  • Privacy
  • Startup
  • Technology
Categories Layout
  • Apps
  • Cybercrime
  • Data
  • Data Breach
  • Data Privacy
  • Data Protection
  • Digital
  • FBI
  • Investment
  • Law
  • Privacy
  • Tech Giants
  • DPDP
  • DPDPA

Harmonize Data Compliance

Footer with Animated Button
Effortlessly align your data compliance with Concur, ensuring seamless integration and robust adherence to regulatory standards.
BOOK A DEMO
  • About
  • Advertise
  • Careers
  • Home
  • Demo

© 2025 Concur - consent manager

Welcome Back!

OR

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Home
  • News
  • Business

© 2025 Concur - consent manager