Tools

News

Notícias

Classificados

Cursos

Broker

IPv4:
IPv6:
UpOrDown
Ping
MTR
MTU Detect
Portscan
DNS
HTTP/SSL
My IP
IP Calc & Sum

Salesforce Refuses Extortion Demand in 1B Breach

Image © Arstechnica
Salesforce says it will not negotiate or pay after a group claiming to have stolen nearly one billion records targeted its customers.

Salesforce says it will not negotiate or pay an extortion demand from a crime group that claims to have stolen roughly one billion records from customers using its platform.

The threat actors began their campaign in May, using voice calls to lure targets into connecting an attacker-controlled app to their Salesforce portals, according to incident responders at Mandiant.

The group, which calls itself Scattered LAPSUS$ Hunters, is tracked by Mandiant as UNC6040 because analysts have not yet confirmed a formal link among the attackers behind the different monikers. Earlier this month they published a page listing Toyota, FedEx, and 37 other Salesforce customers as victims, claiming nearly 989.45 million records were stolen and threatening to leak all data unless a ransom was paid.

Salesforce confirmed in an email on Wednesday that it would not comply with the ransom demand and that it is continuing to investigate the breach with its customers and law enforcement.

Security researchers say such extortion campaigns highlight the growing risk of social engineering and data exfiltration in the ransomware economy, noting that even large enterprises are vulnerable when attackers blend threats, phishing, and supply-chain style compromises.

 

Arstechnica

Related News

Wasco Gets $10M Fiber Upgrade
Pixnapping Threat Expands to Android 2FA
Bluepeak Upgrades 25k Customers in SD MN
Signal's Post-Quantum Upgrade: Engineering Triumph
Comcast Begins Teays Valley Internet Buildout
Metronet expands in 4 Michigan towns

ISP.Tools survives thanks to ads.

Consider disabling your ad blocker.
We promise not to be intrusive.

Cookie Consent

We use cookies to improve your experience on our site.

By using our site you consent to cookies. Learn more