Data theft via exploitation of SaaS apps is becoming more widespread. Recent attacks by UNC6395 (which abused the Drift integration with Salesforce) and UNC6040 (which leveraged a rogue Salesforce Data Loader app) highlight a dangerous new reality: Attackers are no longer just targeting your users or your network. They are exploiting the trusted connections between your SaaS applications (your SaaS supply chain) to steal data, and most security tools can’t see it happening.
These incidents are not isolated misconfigurations. They are an exploitation of the SaaS to SaaS connections. Attackers are abusing the web of trust between platforms like Salesforce, Microsoft 365, and Google Workspace to infiltrate systems and breach sensitive data. And it’s not just connections from Salesforce to other applications; these integrations include connections to other tenants. An organization may have hundreds or even thousands of Microsoft or Salesforce tenants that all need to be managed and maintained with different connections for different purposes.
As organizations rely on a growing number of SaaS applications, each integration becomes part of the attack surface. The complexity is staggering, and most security stacks today aren’t equipped to monitor or defend against this type of threat.
UNC6395 carried out an attack, which impacted over 700 organizations, including Zscaler and Palo Alto Networks. It was shockingly simple and effective. The attackers didn’t use malware, and they didn’t phish any users.
Instead, they targeted the trusted connections between apps. By compromising the Drift integration for Salesforce, they gained a foothold into organizations’ sensitive data. And it did not stop there. As investigations continue, integrations from Drift to Google and other SaaS applications were compromised.
Here’s a breakdown of their method:
This was an oversight of permissions and OAuth governance. The attack proves that SaaS breaches rarely stay confined to one app and that attackers will exploit trusted interconnections to expand their compromise.
The attack group UNC6040 (possibly ShinyHunters) took a different but equally effective approach. Rather than compromising a legitimate integration, they used social engineering to introduce a fraudulent one.
They created a malicious app that perfectly mimicked the legitimate Salesforce Data Loader, a common business tool. By disguising their app, they tricked users and administrators into granting it broad OAuth permissions, which gave the attackers sweeping access to sensitive Salesforce data.
Both trusted and rogue apps can be entry points for attackers. It’s not enough to know who connects an app, you must scrutinize what permissions these apps are requesting and why. In this case, attackers took advantage of the API access controls.
These attacks succeed by exploiting the hidden risks in how modern applications connect and share data, primarily through OAuth. And attackers are now targeting:
This highlights a fundamental vulnerability in how many organizations manage authentication. For a deeper dive, you can read more about OAuth token vulnerabilities.
Traditional security tools were not built to manage the complexity of a sprawling, interconnected SaaS environment. They often fail because:
To defend against campaigns like UNC6395 and UNC6040, enterprises need a security strategy built for the SaaS-to-SaaS layer.
The Salesforce Drift breach and the rogue Data Loader app breach are more than just isolated incidents; they prove that modern SaaS attacks are:
As you secure your business, remember that your risk isn’t limited to the apps you buy, but also the integrations you trust.
Secure your SaaS supply chain. Request a complimentary risk assessment to find out how.
The post How New Supply Chain Attacks Challenge SaaS Security: Lessons from UNC6395, UNC6040, and ShinyHunters appeared first on AppOmni.
*** This is a Security Bloggers Network syndicated blog from AppOmni authored by Chad Knipschild, Director of Product Marketing, AppOmni. Read the original post at: https://appomni.com/blog/saas-supply-chain-attacks-unc6395-unc6040/