The Federal Bureau of Investigation (FBI) has issued a high-priority cybersecurity warning about two criminal groups, UNC6040 and UNC6395 launching coordinated campaigns against Salesforce platforms.
This FBI Warning Salesforce Attack outlines a new wave of cyber intrusions that use OAuth tokens, a widely trusted authentication method, to gain unauthorized access to Salesforce data through third-party apps. Unlike traditional phishing or password-theft attacks, these incidents bypass multi-factor authentication (MFA) and appear legitimate to monitoring systems, making them especially dangerous.
Businesses of every size from healthcare practices to Fortune 500 firms must now reconsider how connected apps and OAuth tokens are managed inside their Salesforce environments.
UNC6040 has a history of using voice phishing (vishing), where attackers impersonate IT support over the phone. Victims are persuaded to install or authorize malicious Salesforce apps. Once approved, these apps exploit OAuth tokens to extract Salesforce records at scale.
UNC6395 specializes in abusing third-party integrations. In 2025, they compromised tokens from the Salesloft–Drift app, allowing them to query Salesforce databases across hundreds of companies.
Both groups converge on the same endgame: data theft and extortion.
Salesforce is the world’s leading CRM platform, housing enormous amounts of sensitive data:
For attackers, this is a gold mine. Access to Salesforce isn’t just about stealing contacts — it’s about unlocking a treasure chest of business intelligence, financial data, and even cloud infrastructure credentials that can fuel larger breaches.
OAuth is designed to let apps connect securely without sharing usernames or passwords. But once an OAuth token is granted, it acts like a master key until revoked or expired.
Attackers use these tokens to:
Data is funneled out via Salesforce APIs, often disguised as legitimate traffic. Stolen records may include:
After exfiltrating data, attackers often demand payment to prevent leaks or sell the information on dark web marketplaces.
This technical flow is why the FBI Warning Salesforce Attack has raised such alarm — attackers aren’t breaking in through the front door, they’re walking through trusted side doors.
The fallout from these Salesforce attacks goes far beyond technical inconvenience:
The key lesson of this Salesforce attack warning is that trust can be weaponized. OAuth tokens, third-party integrations, and connected apps — once considered safe — are now attack surfaces.
This warning pushes businesses toward a zero-trust mindset, where every app, token, and permission must be continuously scrutinized.
Different industries face unique risks from the FBI Warning Salesforce Attack:
For all industries, the message is the same: Salesforce is now a high-value target.
At Zevonix, we integrate Salesforce security into our Six-Step Pathway to Smarter IT:
This pathway ensures your Salesforce data is protected against evolving threats like UNC6040 and UNC6395.
The FBI Warning Salesforce Attack is more than just another alert, it’s a signal that OAuth token abuse and trusted integrations have become prime attack vectors. Groups like UNC6040 and UNC6395 are exploiting gaps in app governance to steal data, extort businesses, and cause widespread disruption.
For businesses, the path forward is clear: audit connected apps, revoke compromised tokens, monitor activity closely, train employees, and adopt a zero-trust mindset.
At Zevonix, we help organizations navigate these exact challenges through our comprehensive cybersecurity services. Protect your Salesforce environment today, because attackers aren’t waiting until tomorrow.
📞 Call us at 904.658.0777
🔒 Book Your meeting with Zevonix »
The FBI Warning Salesforce Attack refers to cybercriminal groups UNC6040 and UNC6395 targeting Salesforce platforms. They exploit OAuth tokens from third-party apps to steal sensitive data and demand extortion payments.
Attackers trick users into approving malicious connected apps or abuse stolen OAuth tokens from integrations. These tokens act like master keys, giving them access to Salesforce data without needing passwords or MFA.
UNC6040 is known for vishing attacks that impersonate IT staff, while UNC6395 exploits OAuth tokens from third-party tools like Drift and Salesloft. Both groups use these methods to infiltrate Salesforce and steal business data.
The FBI warning highlights that customer records, financial details, contracts, and even cloud service credentials (like AWS or Snowflake keys) can be stolen during these Salesforce attacks.
You can protect against these attacks by auditing connected apps, revoking unused tokens, restricting who can authorize apps, enabling Salesforce monitoring, and training employees to recognize vishing attempts.
Subscribe to get the latest posts sent to your email.