In a blog post released Tuesday night, Google (GOOG) said that, in June, one of its corporate Salesforce (CRM) instances was impacted by UNC6040 activity. Google Threat Intelligence Group tracks the extortion activities following UNC6040 intrusions, sometimes several months after the initial data theft, as UNC6240. The extortion involves calls or emails to employees of the victim organization demanding payment in bitcoin within 72 hours. During these communications, UNC6240 has consistently claimed to be the threat group ShinyHunters. Google responded to the recent activity, performed an impact analysis and began mitigations. The instance was used to store contact information and related notes for small and medium businesses. Analysis revealed that data was retrieved by the threat actor during a small window of time before the access was cut off. The data retrieved by the threat actor was confined to basic and largely publicly available business information, such as business names and contact details.
Elevate Your Investing Strategy:
- Take advantage of TipRanks Premium at 50% off! Unlock powerful investing tools, advanced data, and expert analyst insights to help you invest with confidence.
Published first on TheFly – the ultimate source for real-time, market-moving breaking financial news. Try Now>>
Read More on GOOG:
- This Is How OpenAI Will Benefit from Its New Open-Weight AI Models
- Alphabet’s Growth Potential Bolstered by AI Adoption and Stable Metrics
- Google’s (GOOG) New AI Tools Target Big Data Savings for Companies
- LivePerson Stock (LPSN) Surges 60% on Google Cloud Expansion
- LivePerson expands partnership with Google Cloud