Key Takeaways
Salesforce has identified and is investigating a data theft campaign targeting its customers through a compromised third-party integration. The incident stems from unusual activity detected in Gainsight-published applications, which customers install and manage to connect to their Salesforce environments.
In response, Salesforce has revoked refresh tokens associated with the affected Gainsight applications to mitigate further risk. Gainsight’s September investigation confirmed they suffered a data breach due to stolen OAuth tokens linked to Salesloft Drift.
The company has clarified that this was not a vulnerability within Salesforce's core platform. Instead, the malicious activity is attributed to the app's external connection to Salesforce, which threat actors exploited to gain unauthorized access to certain customer data.
The attack was allegedly carried out by the ShinyHunters cyberattack group, which leveraged a consistent playbook: compromising a vendor, stealing OAuth tokens, and using those tokens to access data in integrated platforms.
The ShinyHunters group (also part of the Scattered LAPSUS$ Hunters collective) has previously targeted similar SaaS ecosystem vulnerabilities. On a Telegram channel, the collective announced the launch of their RaaS platform for November 24, adding, “RIP LinkedIn, DocuSign, MalwareBytes, Verizon, GitLab, Atlassian, Thomson Reuters, F5, Sonic Wall.”
“The next DLS (Data Leak Site) will contain the data of the Salesloft and GainSight campaigns, which is, in total, almost 1,000 organizations, ” the group told Dissent Doe, PhD. “From the GainSight campaign, the large companies were: Verizon, GitLab, F5, SonicWall, and others.”
ShinyHunters told BleepingComputer they accessed another 285 Salesforce instances following the Gainsight breach, using secrets stolen in the Salesloft Drift intrusion.
This Salesforce data theft incident highlights significant SaaS security risks related to interconnected application ecosystems. Ferhat Dikbiyik, Chief Research and Intelligence Officer (CRIO) at Black Kite, shared with TechNadu that this exact pattern was observed in a previous campaign involving Salesloft Drift, in which Gainsight acknowledged exposure due to stolen tokens.
Dikbiyik highlighted that over-provisioned permissions for third-party applications create a significant attack surface, explaining that even if the core platform, such as Salesforce, remains secure, a compromise in any single connected application or vendor can trigger a cascading data breach.
The only way to stay ahead is visibility, context, and continuous monitoring, and organizations must:
ShinyHunters retaliated with Salesforce extortion threats after the FBI seized BreachForums in October.