"Widespread data theft" hits Salesforce customers via third party

By

Speculation that breach may be connected to "ShinyHunters" hackers.

Compromised OAuth tokens through a third-party app have resulted in large-scale data raids on instances of the Salesforce customer relationship management (CRM) platform, by an unknown threat actor.

"Widespread data theft" hits Salesforce customers via third party
Query to retrieve user data from Salesforce instances
GTIG

The third-party app is Salesloft Drift, which is described as a revenue orchestration platform that uses purpose built artificial intelligence (AI).

Salesloft has acknowledged the data breach, which started on August 8, and said it has notified all impacted customers.

How the threat actor, tracked as UNC (uncategorised) 6395, obtained the OAuth tokens from Salesloft to exfiltrate data from customer Salesforce instances wasn't detailed.

Salesloft said it has engaged a third-party digital forensics and incident response team to investigate the incident, and is working in collaboration with Salesforce to provide all customers with detailed information on attacker actions in their respective environments.

Analysing the incident, Google's Threat Intelligence Group (GTIG) and in-house Mandiant security team said "the [threat] actor systematically exported large volumes of data from numerous corporate Salesforce instances".

GTIG and Mandiant did not say how much data had been exfiltrated, and from which customers; the queries made by the threat actor focused on obtaining record counts from Salesforce objects, followed by other user data such as email address, login dates and contact information.

Secrets such as Amazon Web Services AKIA access key identifiers, Snowflake logins and passwords and other credentials were targeted by the attackers, GTIG said, with UNC6395 deleting the queries for them, which were nevertheless logged and available as evidence.

All active Salesloft access tokens have been revoked and refreshed for the Drift application, and administrators must reauthenticate with Salesforce to restate the third-party app integration.

Salesforce has also removed Salesloft Drift from its AppExchange, pending an investigation.

Open Authorisation protocol tokens allow third-party applications to access data on services, without requiring passwords.

GTIG and Mandiant did not connect the attacks to any particular organisation, but United States media reported the ShinyHunters/Scattered Spider threat actors have taken responsibility for the Salesloft intrusions.

ShinyHunters has been actively attacking Salesforce instances for the past few years, to extort organisations into paying ransom for the data in Bitcoin cryptocurrency.

Reported in June this year and continuing until early August, GTIG warned of a "vishing" (voice phishing) campaign by ShinyHunters, tracked as UNC6040/6240.

The vishing attack uses social engineering to obtain user credentials, allowing the threat actor "significant capabilities to access, query and exfiltrate sensitive information from the compromised Salesforce customer instances," GTIG said.

During the vishing, staff are tricked into connecting a malicious version of Salesforce's Data Loader data import/export application with OAuth to victims' environments, GTIG said.

Google's corporate Salesforce instance was hit by UNC6040 activity in early August, resulting in some data such as business names and contact information being extracted.

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:

Most Read Articles

Travel eSIMs secretly route traffic over Chinese and undisclosed networks: study

Travel eSIMs secretly route traffic over Chinese and undisclosed networks: study

Greater Western Water's billing system data issues laid bare

Greater Western Water's billing system data issues laid bare

Attackers weaponise Linux file names as malware vectors

Attackers weaponise Linux file names as malware vectors

Microsoft plans full quantum-resistant cryptography transition by 2033

Microsoft plans full quantum-resistant cryptography transition by 2033

Log In

  |  Forgot your password?