company logo

Product

Our Product

We are Reshaping the way Developers find and fix vulnerabilities before they get exploited.

Solutions

By Industry

BFSI

Healthcare

Education

IT & Telecom

Government

By Role

CISO

Application Security Engineer

DevsecOps Engineer

IT Manager

Resources

Resource Library

Get actionable insight straight from our threat Intel lab to keep you informed about the ever-changing Threat landscape.

Subscribe to Our Weekly Threat Digest

Company

Contact Us

Have queries, feedback or prospects? Get in touch and we shall be with you shortly.

loading..
loading..
loading..
Loading...

Zero Day

Phishing

loading..
loading..
loading..

Salesforce Zero-Day Exploited to Phish Facebook Credentials

Unraveling the sophisticated phishing campaign that leveraged a zero-day flaw in Salesforce's email services to deceive Facebook users

05-Aug-2023
3 min read

No content available.

Related Articles

loading..

Data breach

Discord data breach via third-party vendor exposed 70,000 users' government IDs ...

A significant data breach at a third-party customer service provider used by Discord has compromised the sensitive government ID photos of approximately 70,000 users, the company confirmed in an October 9th update. The incident, which occurred on September 20th, underscores the growing vulnerability of user data through supply-chain attacks, even when core platforms remain secure . Hackers, identifying as "Scattered Lapsus$ Hunters (SLH)," gained access to the vendor's support system for 58 hours. While they claim to have exfiltrated 1.6 terabytes of data affecting 5.5 million users, including over 2 million ID photos, Discord has refuted these figures, stating they are "inaccurate" and part of an extortion attempt. The company has refused to pay any ransom. The table below summarizes the compromised and safe data based on Discord's official advisory. | **Data Potentially Exposed** | **Data Confirmed Safe** | | :--- | :--- | | Government ID photos (e.g., driver's licenses, passports) | Full credit card numbers & CVV codes | | User names, Discord usernames, & email addresses | User account passwords | | Messages with customer service agents | Private messages & activity on Discord platforms | | IP addresses & limited billing info (last 4 digits of credit cards) | | ### Third-Party Weak Link The breach did not result from a flaw in Discord's own infrastructure. Still, it was executed by compromising a support agent's account at its third-party customer service provider, identified in some reports as 5CA. This vendor was responsible for handling age-verification appeals, a process that requires users to submit highly sensitive government identification. This incident exemplifies a **supply-chain attack**, where cybercriminals target a less-secure partner to bypass the primary company's defenses. Discord has since revoked the vendor's access to its ticketing system. ### Age-Verification Debate The exposure of thousands of government IDs has intensified the debate around online age-verification laws. Platforms like Discord are increasingly required by regulations, such as the UK's Online Safety Act, to confirm users' ages, often leading to the collection of highly sensitive documents. Privacy advocates warn that this creates a dangerous precedent. **"Age verification systems are surveillance systems,"** said Maddie Daly of the Electronic Frontier Foundation. She further noted that such systems leave users "highly vulnerable to data breaches and other security harms, as we see time and time again". ### Actionable Guidance for Affected Users Discord is directly notifying impacted users via `[email protected]` and will not use phone calls for this communication. If you receive this notification or have previously contacted Discord support, you should: - Be suspicious of unsolicited emails, calls, or messages that ask for personal information or direct you to click on links . - Ensure any email claiming to be from Discord comes from the `[email protected]` address. - Add an extra layer of security to your Discord account and other critical online accounts. The breach is a stark reminder of the cascading risks posed by third-party vendors. As Nathan Webb, a principal consultant at Acumen Cyber, stated, **"Despite age verification being outsourced, businesses still have an accountability to ensure that data is stored appropriately"**. Discord said it has notified data protection authorities and is working with law enforcement on an ongoing investigation.

loading..   10-Oct-2025
loading..   3 min read
loading..

Discord

Discord's third-party breach exposes user data and government IDs. Your informat...

A calculated cyberattack against a third-party customer service provider has exposed a critical vulnerability in [Discord](https://www.secureblink.com/cyber-security-news/discord-malware-hijacks-expired-invite-links-to-steal-crypto-wallets-in-2025)'s operational security, leading to the theft of user data from support tickets. The incident, claimed by the extortion group "Scattered Lapsus$ Hunters," pivots not on a technical exploit of Discord's core infrastructure, but on the strategic compromise of a weaker link in its supply chain. #### **Exploiting the Vendor Trust Model** The breach's root cause lies in the inherent risk of third-party vendor relationships. Discord's core servers, housing private messages and authentication data, remained secure. Instead, the attackers targeted a dedicated customer service provider with authorized access to [Discord](https://discord.com/press-releases/update-on-security-incident-involving-third-party-customer-service)'s support ticket system. * **Objective:** Financial extortion. The group gained leverage by stealing a defined dataset to pressure Discord for a ransom. * **Method:** By compromising the vendor, they bypassed Discord's primary defences, illustrating a classic supply-chain attack where the security of the entire ecosystem is dictated by its least secure partner. #### **What the Attackers Specifically Took** The stolen data is a direct map of the information users disclose when engaging with customer support. The compromise is significant not for its breadth across Discord's userbase, but for the depth of sensitivity within the affected support tickets. **The primary data set includes:** * Support ticket conversations and attachments * User identifiers (username, email) and IP addresses * Limited billing data (payment type, last 4 digits of card) **The critical escalation:** The exfiltration of a limited number of government-issued ID documents (driver's licenses, passports) submitted for age-verification appeals. This transforms the incident from a standard data leak into a high-severity identity theft risk. #### **Why This Breach Matters Beyond Discord** This incident serves as a real-world case study with two immediate consequences for the tech industry: 1. **The Validation of Vendor Compromise as a Primary Attack Tactic.** Threat actors are increasingly focusing on software and service providers as a more efficient path to compromising multiple clients simultaneously. The ROI for hacking one vendor can be access to dozens of companies. 2. **The Unintended Consequences of Age-Verification Mandates.** The exposure of government IDs is a direct result of platforms being forced to collect highly sensitive documents for regulatory compliance. This creates a new, high-value target for hackers and fundamentally shifts the risk onto users, potentially outweighing the intended safety benefits. #### **Lingering User Risk** Discord's containment strategy followed standard incident response protocol: revoke the vendor's access, engage forensics, and notify law enforcement. For impacted users, however, the risk is ongoing. The most probable threat is not a direct hack of a Discord account, but highly targeted and convincing phishing campaigns. Armed with knowledge of a user's support history, attackers can craft fraudulent emails that appear legitimate, tricking victims into revealing passwords or other sensitive information. Users must treat any communication referencing a support ticket with extreme scepticism. This revised structure focuses on the logical flow of the attack, the strategic decisions behind it, and its broader industry significance, moving beyond a simple recitation of facts.

loading..   06-Oct-2025
loading..   3 min read
loading..

Salesforce

A cybercrime alliance tied to Lapsus$, Scattered Spider, and ShinyHunters is pre...

A new dark‑web leak site branded Scattered [LAPSUS$](https://www.secureblink.com/cyber-security-news/lapsus-hackers-elevate-sim-swapping-attacks-to-unprecedented-heights) Hunters is threatening to dump roughly a billion records allegedly stolen from companies using Salesforce, a pressure tactic typical of modern data‑extortion operations rather than encryption‑based ransomware. Multiple enterprises have acknowledged recent Salesforce‑adjacent data theft, while [Salesforce](https://www.secureblink.com/cyber-security-news/salesforce-zero-day-exploited-to-phish-facebook-credentials) maintains there’s no evidence of a platform‑level compromise, aligning with reports that attackers targeted customers via social engineering and OAuth abuse, not a direct Salesforce breach. The numbers are designed for shock value; the operational core is credentialed API access obtained through vishing and connected‑app authorization flows that grant durable exfiltration capability. ### New alliance: brand fusion, tactics convergence Evidence points to a coordinated alliance blending Lapsus$, Scattered Spider, and [ShinyHunters](https://www.secureblink.com/cyber-security-news/1-1-m-affected-in-allianz-life-data-breach-via-social-engineering) into a single extortion machine that markets itself loudly, moves quickly, and leverages pooled playbooks: social engineering for initial access, OAuth for durable tokens, and public‑facing leak theater for leverage. Public monitoring shows Telegram activity explicitly merging these brands, with a shared narrative that Scattered Spider specializes in initial access while ShinyHunters executes exfiltration and data dumps, echoing their advertised “shinysp1d3r” operations and joint claims tied to Salesforce and other SaaS ecosystems. Third‑party threat profiles and incident recaps corroborate a mid‑2025 surge targeting Salesforce tenants across major enterprises, consistent with this merged identity. ### Why this works: trust edges, not zero‑days This campaign preys on trust junctions in SaaS identity, not exotic exploits: a phone call to a help desk, a plausible app name, and a legitimate OAuth flow that converts a moment of social trust into long‑lived API access. Desktop‑style OAuth and connected‑app experiences can be impersonated or repackaged to appear as standard Salesforce tooling (e.g., “Data Loader”), tricking staff into authorizing scopes like refresh_token + full that enable persistent bulk extraction with minimal noise. This turns traditional perimeter and endpoint controls into bystanders; once a connected app is authorized, the attacker is “inside” through sanctioned API pathways until the token is revoked and the app is pruned. ### Exfil Blueprint Incident forensics from multiple vendors describes a repeatable chain: vishing to the connected‑apps page, user‑supplied verification code, app authorization, and then scripted REST or bulk API queries that sweep high‑value objects at scale. Threat hunters have observed iterative testing with small chunk sizes before pivoting to full‑table pulls, and app aliases like “My Ticket Portal” to match the social pretext, allowing attackers to blend into operational noise until export volumes spike. Event Monitoring and REST API logs reveal patterned queries against PII‑rich objects with per‑request payloads in the megabytes, a signature that becomes obvious with the right telemetry but invisible without it. ### Extortion The leak‑site model operationalizes marketing: timers, victim lists, and public taunts amplify pressure while letting groups walk back into the shadows when it suits their private negotiations. Analysts note that these crews have shifted to selective media use—public enough to validate credibility, private enough to optimize ransom yield—making the “shutdown and reappear” cycles part of the business model rather than a sign of weakness. The Salesforce‑specific branding is a force multiplier, collapsing dozens of discreet tenant incidents into one narrative that helps drive larger payouts and faster executive attention. ### Misconceptions that can sink a response - “Platform breach” vs. tenant compromise: Reports and statements consistently indicate abuse of tenant‑level trust and identity flows, not a Salesforce core vulnerability, which changes the remediation locus from vendor patching to customer identity and app governance. - “MFA solves this”: MFA reduces risk but does not stop a user from consenting to a malicious connected app; OAuth consent with high‑privilege scopes can outflank strong authentication if help‑desk workflows are not hardened. - “If there’s no encryption ransomware, impact is limited”: Data theft alone can trigger regulatory exposure, customer churn, and downstream fraud; operational resilience does not equal privacy resilience. ### Make‑or‑break controls - OAuth and connected‑app governance: Inventory, alert, and gate app creation and authorization events; flag apps with elevated scopes and ambiguous names; enforce reviews for Data Loader‑like tools and restrict to managed, signed binaries. - Event Monitoring and anomaly detection: Continuously watch for API query bursts, unusual object access, sudden increases in data export sizes, and new app authorizations, using Event Monitoring logs as the primary signal source. - Help desk and user verification: Script defenses against vishing—no codes over the phone, out‑of‑band verification for any app authorization, and tight playbooks that treat connected‑app approvals as security‑sensitive changes. ### Break the kill chain: high‑impact, low‑friction steps - Enforce IP ranges and network‑based access policies for administrative sessions and high‑risk actions, reducing the surface for remote OAuth abuse to succeed unnoticed. - Minimize and rotate API keys and integration users, review automated data export jobs, and adhere strictly to least privilege for both humans and non‑human identities connected to Salesforce. - Monitor for unreviewed package installs and scope elevation events; alert when apps request refresh_token or full API access, and quarantine suspect apps pending review and forensic validation. ### SaaS sprawl meets identity debt The Salesforce wave underscores a broader SaaS security problem: sprawling connected apps, unattended machine identities, and permissive scopes create an identity debt that adversaries monetize via phone‑based persuasion rather than code execution. Training and MFA help, but durable fixes require continuous, identity‑aware monitoring across SaaS estates and controls that make “consent” a governed process, not a casual click. Expect copycats to transpose this playbook to other high‑value SaaS platforms where connected apps and delegated access are ubiquitous. This campaign is not about a novel exploit; it is about industrialized persuasion weaponizing OAuth trust to convert a polite phone call into a high‑bandwidth data siphon, then monetizing the haul via sophisticated extortion theater. Organizations that treat connected‑app governance, Event Monitoring, and help‑desk hardening as first‑class controls will deflate the business model behind the “billion records” headline, while those relying on traditional perimeter thinking will remain easy marks for the next branded leak countdown.

loading..   04-Oct-2025
loading..   6 min read