Estimated reading time: 10 minutes
Contents Introduction Key Targets Industries Affected. Geographical Focus. Infection Chain. Initial Findings Looking into the malicious email. Looking into the decoy-document. Technical Analysis Stage 0 – Malicious ZIP & LNK files. Stage 1 – Malicious BATCH scripts. Stage 2...
Estimated reading time: 10 minutes
Executive Summary In early June 2025, Google’s corporate Salesforce instance (used to store contact data for small‑ and medium‑sized business clients) was compromised through a sophisticated vishing‑extortion campaign orchestrated by the threat‑group tracked as UNC6040 & UNC6240 (online cybercrime collective known...