Discussion about this post

User's avatar
Neural Foundry's avatar

Solid coverage of the Salesforce vishing campaign. The UNC6040 tactics are textbook social engineering but what's interesting is the delayed extortion piece, suggests they're either selling access or waiting for data value to appreciate. I've seen similarpatterns where initial compromise teams operate completely separately from monetization groups. The real challenge here isn't detecting the malicious connected app after approval but preventing that initial approval conversation, and thats a training problem not a technical one.

No posts

Ready for more?