Cybersecurity News Hub
No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos
  • Advertise
  • Privacy Policy
  • Contact Us
  • Home
  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos
  • Advertise
  • Privacy Policy
  • Contact Us
No Result
View All Result
Cybersecurity News Hub
No Result
View All Result
Home Data Breach

Salesforce Details Supply Chain Attack Targeting Gainsight

Cyberinchief by Cyberinchief
November 24, 2025
Reading Time: 5 mins read
0
Salesforce Details Supply Chain Attack Targeting Gainsight


Cybercrime
,
Fraud Management & Cybercrime

RELATED POSTS

UK Hospital Asks Court to Stymie Ransomware Data Leak

These five countries recorded the most third-party data breaches last year

LockBit 5’s “new secure blog domain” infra leaked already – DataBreaches.Net

Cybercrime Group ShinyHunters Claims to Steal Data From 300 Organizations

Mathew J. Schwartz (euroinfosec) •
November 24, 2025    

Salesforce Details Supply Chain Attack Targeting Gainsight
Image: Tada Images/Shutterstock

Hackers who took responsibility for stealing Salesforce data through integrated customer relationship software published by Gainsight claimed to have robbed more than 300 organizations.

See Also: OnDemand | North Korea’s Secret IT Army and How to Combat It

In a post to a new Telegram channel launched Friday, cybercrime group Scattered Lapsus$ Hunters asserted that victims include F5, GitLab, SonicWall and Verizon (see: ShinyHunters Hack Salesforce Instances Via Gainsight Apps).

Members of the Scattered Lapsus$ Hunters collective, largely comprised of Western adolescents, said that when combined with data stolen this past summer from users of the Salesloft Drift app, a forthcoming data leak site will feature information stolen from 1,000 organizations.

Gainsight hasn’t confirmed how many customer organizations’ data was stolen. The company said that when Salesforce first detected signs of the attack on Wednesday, it was tied to “suspicious access attempts” targeting three customers.

Buy JNews
ADVERTISEMENT

Salesforce said it revoked the Gainsight app’s access tokens and temporarily removed the publisher’s software from its AppExchange cloud marketplace.

Salesforce first publicly warned customers with Gainsight integrations on Thursday that attackers may have stolen their customer data. “There is no indication that this issue resulted from any vulnerability in the Salesforce platform. The activity appears to be related to the app’s external connection to Salesforce,” it said.

Austin Larsen, a principal threat analyst at Google, said Thursday that the company “observed threat actors, tied to ShinyHunters, compromising third-party OAuth tokens to potentially gain unauthorized access to Salesforce customer instances.” ShinyHunters’ activities overlap with a threat activity the company tracks as UNC6395.

Gainsight told customers early Thursday that Salesforce revoked all access for the Gainsight SFDC Connector, resulting in connection failures, after detecting “unusual activity” tied to the tool. Affected products include Customer Education Solution, Community, Northpass, Skilljar and Staircase. “While these products are operational, their ability to read and write from Salesforce is unavailable temporarily,” it said.

A probe into the attack and data theft remains ongoing. “We continue to work closely with Salesforce on the ongoing investigation into the incident. In parallel, a forensic analysis is continuing as part of a comprehensive and independent review,” Gainsight said in a Sunday update. It recommended customers open a support ticket to request logs, but said customers should first rotate their Gainsight S3 – for Amazon Simple Storage Service – keys, in case the attacker previously compromised them.

Known threat activity traced to an Amazon Web Services IP address on Oct. 23 that involved “reconnaissance against customers” by an attacker who used a “compromised Gainsight access token,” Salesforce said.

Further reconnaissance and unauthorized access to Salesforce systems continued again from Nov. 8 onward, before surging on Tuesday and Wednesday with a flurry of HTTP requests authored by Python scripts. From Tuesday to Wednesday, Salesforce said the attacker used the Salesforce-Multi-Org-Fetcher/1.0 Python script to gain further unauthorized access to Gainsight data, using the same script “observed in Salesloft Drift activity” in an August attack that used stolen OAuth tokens for the Drift tool.

Repeat Supply Chain Attacks

How attackers stole the Gainsight OAuth tokens isn’t yet clear. Hackers in the earlier Salesloft attack obtained tokens after first breaching a GitHub repository containing source code for Salesloft Drift’s chatbot, which they combed for OAuth tokens. This allowed them to access software integrated with Drift, including for 760 Salesforce instances.

Such supply chain attacks are notable in part for the roundabout path taken to obtain customers’ data. “It underlines a recurring tactic: attackers gaining access through trusted third-party integrations by misappropriating tokens or leveraging support-case secrets rather than exploiting direct product vulnerabilities,” said cybersecurity firm SOCRadar on Friday.

Based on the group’s previous attacks, the next step in the hackers’ playbook would appear to be extortion (see: Madman Theory Spurs Crazy Scattered Lapsus$ Hunters Playbook).

Following the theft of Salesforce data from Drift customers, the extortionists claimed that they would automatically leak the data for any company that failed to pay them a ransom. Those plans faced multiple hurdles, including U.S. and French authorities knocking offline the clearnet and darknet versions of the BreachForums data leak and extortion site being run by the group, as well as a darknet site listing 39 affected Salesforce customers.

Ultimately, the cybercrime group leaked data stolen from six customers (see: Salesforce Extortion Group Leaks Data After FBI Disruption).

Following from the Gainsight attack and ShinyHunters’ repeat targeting of Salesforce data, “more supply chain events” seem likely, not least because the group has signaled its plans “to keep pushing content to their public channels to stay relevant,” SOCRadar said.

Hardening Advice Against Persistent Hackers

Gainsight hired Google’s Mandiant incident response team to conduct that investigation, and referred customers to hardening advice issued by Mandiant following the attack against Salesloft Drift, updated Friday in the wake of the Gainsight attacks.

Mandiant said its advice details “comprehensive hardening, logging and detection recommendations for programmatic credentials such as API keys, OAuth tokens, service accounts and access keys.”

Salesforce on Saturday recommended “customers conduct a comprehensive review of all available logs when investigating potential compromise.” Gainsight application’s OAuth tokens have been revoked, but this “does not delete your historical audit trails or hinder customers’ ability to investigate this incident.”

A late August report into the Scattered Lapsus$ Hunters attack on Salesforce via the Salesloft authentication tokens by Mandiant detailed how “the actor systematically exported large volumes of data from numerous corporate Salesforce instances” thanks in part to wielding that “malicious user-agent string.”

Cybersecurity experts have lauded the level of detail being shared by Salesforce’s security team with customers, which has included both indicators of compromise as well as time stamps.

“This level of granularity is massively helpful to threat hunt and SOC teams to determining if activity was potentially malicious,” said Eli Woodward, a senior cyber threat intelligence adviser at Team Cymru, in a Sunday post to LinkedIn. He urged other organizations to adopt this level of post-attack information sharing as an “industry standard.”

Other major hacks by the group this year have included the targeting of major retailers, financial services firms and disrupting automaker Jaguar Land Rover, leading the company to report a loss of roughly $260 million.

The criminals have been previewing a new ransomware-as-a-service operation called ShinySp1d3r, and a sample of their crypto-locking malware has appeared in the wild. Cybersecurity firm ZeroFox said Scattered Lapsus$ Hunters likely “built this RaaS to keep ransom profits in-house, eliminating the need to share ransom proceeds with third-party providers.”





Source link

Tags: attackChaindetailsGainsightSalesforceSupplyTargeting
ShareTweetPin
Cyberinchief

Cyberinchief

Related Posts

UK Hospital Asks Court to Stymie Ransomware Data Leak
Data Breach

UK Hospital Asks Court to Stymie Ransomware Data Leak

December 8, 2025
These five countries recorded the most third-party data breaches last year
Data Breach

These five countries recorded the most third-party data breaches last year

December 8, 2025
LockBit 5’s “new secure blog domain” infra leaked already – DataBreaches.Net
Data Breach

LockBit 5’s “new secure blog domain” infra leaked already – DataBreaches.Net

December 7, 2025
Rethinking the CIO-CISO Dynamic in the Age of AI
Data Breach

Rethinking the CIO-CISO Dynamic in the Age of AI

December 6, 2025
NHS supplier hit with £3m fine for security failings that led to attack
Data Breach

NHS supplier hit with £3m fine for security failings that led to attack

December 6, 2025
HHS Outlines AI Road Map Amid Major Department Overhaul
Data Breach

HHS Outlines AI Road Map Amid Major Department Overhaul

December 5, 2025
Next Post
Cybersecurity Course for Beginners: Tababar Ku Saabsan Amniga Dijitaalka

Cybersecurity Course for Beginners: Tababar Ku Saabsan Amniga Dijitaalka

How The Dark Web Actually Works | How Crime Works | Insider

How The Dark Web Actually Works | How Crime Works | Insider

Recommended Stories

How a Billion-Dollar Cambodian Cybercrime Empire Was Built

How a Billion-Dollar Cambodian Cybercrime Empire Was Built

October 8, 2025
साइबर सिक्योरिटी कोर्स सभी शिक्षकों को पूरा करना है।। iGOT portal

साइबर सिक्योरिटी कोर्स सभी शिक्षकों को पूरा करना है।। iGOT portal

November 19, 2025
The silent doorway to identity attacks — and why proactive defense matters – Sophos News

The silent doorway to identity attacks — and why proactive defense matters – Sophos News

November 17, 2025

Popular Stories

  • Allianz Life – 1,115,061 breached accounts

    Allianz Life – 1,115,061 breached accounts

    0 shares
    Share 0 Tweet 0
  • Prosper – 17,605,276 breached accounts

    0 shares
    Share 0 Tweet 0
  • साइबर अपराध | Illegal Payment Gateway & Rented Bank Accounts | MAMTA CHOPRA

    0 shares
    Share 0 Tweet 0
  • Miljödata – 870,108 breached accounts

    0 shares
    Share 0 Tweet 0
  • Snowflake Data Breach Explained: Lessons and Protection Strategies

    0 shares
    Share 0 Tweet 0

Search

No Result
View All Result

Recent Posts

  • Top 5 Mobile App Security Threats Leaders Must Prepare for in 2026
  • Microsoft On Women In Cybersecurity At Black Hat Europe 2025 In London
  • Polisi kembali ungkap sindikat Cyber Crime kejahatan Internasional – iNews Malam 09/03

Categories

  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos

Newsletter

© 2025 All rights reserved by cyberinchief.com

No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos
  • Advertise
  • Privacy Policy
  • Contact Us

© 2025 All rights reserved by cyberinchief.com

Newsletter Signup

Subscribe to our weekly newsletter below and never miss the latest News.

Enter your email address

Thanks, I’m not interested