top of page

unc6395: The Breach the Keeps On Breaching!

  • Writer: Patrick Duggan
    Patrick Duggan
  • Sep 16, 2025
  • 3 min read

Updated: Apr 25

Just when you thought the Salesloft/Salesforce/Drift OAuth token compromise might quietly fade into the background, it’s back — and it brought friends.


The latest victim? The Law Enforcement Request System (LERS).



No? What if I said Blues Brothers SCMODS? But on GCP and on the internet!


Yes, that LERS — the secure portal used by law enforcement to request user data from tech companies. Think subpoenas, emergency disclosures, and court orders. Now imagine that system compromised.



This isn’t just a data breach. It’s a trust breach. And it’s a signal: UNC6395 isn’t done.



What’s the Risk?


LERS is supposed to be the Fort Knox of legal data exchange. If attackers have access:


They could impersonate law enforcement.

They could extract sensitive user data.

They could manipulate legal requests.


It was caught early by Mandiant and the fine folks at GCP - but consider the level of effort securing it initially and the ease with which it as still compromised.


This is no longer about OAuth tokens floating in support case notes. This is about infrastructure-level compromise.



Rotate Your Secrets. Yes, Yours.


Even if you didn’t use Drift, you’re not off the hook.


Support agents — bless them — sometimes paste API keys into case notes. Those notes live in Salesforce. Salesforce talks to Salesloft. Salesloft got breached. You see where this is going.


If your secrets haven’t been rotated since August, they’re stale.

If you don’t know where your secrets are, I’ll help you find them.

If you think this will blow over, it won’t.



📎 Source Article

Here’s the latest


How to Hunt Down SaaS Secrets in AWS and Azure Before They Hunt You

Rotating secrets is great. Knowing where they are is better. Here’s how to track down stale or exposed SaaS credentials in AWS IAM and Azure AD, especially those tied to integrations like Drift, Salesforce, or other OAuth-happy platforms.



AWS: Finding IAM Roles That Need Rotation

AWS doesn’t hand you a “compromised secrets” dashboard, but you can get close:


1. Use IAM Access Advisor

Go to the IAM console → Roles → Access Advisor tab.

See which services a role has accessed and when.

If a role hasn’t been used in months, it’s either stale or a sleeper cell.


2. Search for Access Keys

In the IAM console, use the Search box to find access keys:

    • Type the full access key ID.

    ��� It’ll show you the user or role it belongs to 1.


3. CloudTrail Lookup

Use this CLI command to find who assumed a role and what they did:

aws cloudtrail lookup-events \

  --lookup-attributes AttributeKey=ResourceName,AttributeValue=arn:aws:iam::<account>:role/<role-name> \

  --query "Events[*].[CloudTrailEvent]" \

  --output json


This helps you spot unexpected usage or over-permissioned roles 2.


Microsoft pulls this feed daily. AT&T pulls this feed daily. Starlink pulls this feed daily. Get the DugganUSA STIX feed — $9/mo →


4. Rotate Keys

Go to the IAM user or role.

Disable old keys.

Create new ones.

Store them in AWS Secrets Manager or Parameter Store.



Azure: Auditing App Registrations and Rotating Secrets


Azure AD app registrations are the usual suspects for leaked secrets. Here’s how to audit and rotate them:


1. Audit Azure AD Roles and Secrets

Go to Azure AD → Monitoring → Audit Logs.

Look for changes to app registrations, role assignments, and sign-ins 3.


2. Use Azure Key Vault + Event Grid

Set up Key Vault to fire alerts when secrets are about to expire.

Use Azure Functions to auto-rotate secrets and update them in Key Vault 4.


3. Automate with Terraform or Bicep


Use modules like azuread_application_password to rotate secrets.

Store new secrets in Key Vault or Azure DevOps variable groups 5.


4. Multi-Tenant? Use Lighthouse

If you manage secrets across tenants, Azure Lighthouse helps centralize control and automate rotation 6.



Pro Tip: Don’t Just Rotate — Revoke

Rotation is good. Revocation is better. If you suspect a secret was exposed:


Disable it immediately.

Audit downstream systems for usage.

Reissue with tighter scopes.



Tags:



The cheapest, fastest, most accurate threat feed on the internet.

275+ enterprises pulling daily. 1M+ IOCs. 17.4M indexed documents. We beat Zscaler by 43 days on NrodeCodeRAT. Starter tier $9/mo — less than any competitor’s sales demo.

Comments

Rated 0 out of 5 stars.
No ratings yet

Add a rating
bottom of page