You’ve invested in system security, but are your policies and procedures doing their job?
This week, iTnews reported that hackers are abusing a modified version of Salesforce’s Data Loader to steal sensitive data and extort companies. This breach is a reminder that even when your tech is solid, people and process gaps can still open the door.
Hackers tricked staff with voice phishing (vishing), posing as IT support, and convinced them to install a fake App. That app let them access Salesforce data, and from there, move laterally into Microsoft 365, SharePoint, Okta, and more. They exfiltrated the data, waited weeks or months, and then came back with ransom demands.
At Double H Marketing, we take security seriously. Our internal data practices align with ISO 27001 standards, because handling client data with care isn’t optional, especially when we’re working inside complex systems, across multiple teams, and with sensitive business information.
So when we see breaches like the one reported this week, where hackers exploited a modified Salesforce Data Loader to steal data and extort businesses, we take notice.
Here’s what happened, and what your business needs to do about it.
Run real phishing drills
The breach started with a phone call. A calm voice. A fake IT story. And a staff member who didn’t spot the trap. That’s not stupidity — that’s a failure of training.
Action: Run vishing and phishing simulations that mimic real attacks. Use the results to plug gaps, and support training efforts.
Lock down admin access
Too many companies still give admin privileges to too many people. Once a hacker lands in an admin account, it’s game over.
Action: Review who has admin rights across Salesforce, Microsoft 365, Okta, and other key tools. Remove anything that isn’t essential. Enforce MFA everywhere.
Audit your integrations
Salesforce’s Data Loader is a legitimate app. That’s what made the fake version so dangerous. Most companies have dozens of similar tools integrated across their SaaS stack. That’s a risk.
Action: Create a live inventory of every third-party integration across your key platforms. Remove unused ones. Set clear rules on what gets approved.
Monitor for unusual behaviour
This crew (UNC6040) didn’t demand ransom straight away. They waited. That makes traditional antivirus or firewall alerts less useful, because by the time you see them, it’s too late.
Action: Use behavioural monitoring tools that flag anomalies, like mass downloads, access at odd hours, or logins from unexpected geographies.
Plan for the worst-case
Most businesses still scramble when a breach happens. Roles aren’t clear. Comms aren’t ready. Legal’s in the dark. That chaos makes recovery harder and the damage worse.
Action: Run a breach simulation including your executive team and essential team members. Make sure the response plan includes cloud compromise, social engineering, and ransomware. Update it regularly.
Final word
This attack wasn’t high-tech. It was high-trust. The moment your team believes a hacker is your helpdesk — you’re exposed.
Don’t wait for your name to be in the next breach report. If you’re ready to tighten the gaps, build in better governance, or stress test your SaaS stack — we’re ready to help.