What's Happening?
The ShinyHunters hacking group has launched a new data theft campaign against Salesforce customers, exploiting Gainsight integrations to access their instances. Salesforce revoked all active access and tokens associated with the Gainsight applications connected to its platform and temporarily removed the applications while investigating the attack. Salesforce identified unusual activity involving Gainsight-published applications connected to Salesforce, which may have enabled unauthorized access to certain customers’ Salesforce data. Gainsight revealed that only three organizations were known to have been compromised in the attack, and it is investigating the incident together with Salesforce and a third-party forensics firm. The attackers are
compromising third-party OAuth tokens to potentially gain unauthorized access to Salesforce customer instances.
Why It's Important?
This incident underscores the vulnerabilities associated with third-party integrations in SaaS platforms. The attack highlights the increasing targeting of OAuth tokens by adversaries, which can lead to unauthorized access and data exfiltration. For companies handling sensitive data or intellectual property, the implications extend far beyond a single fraudulent incident. Initial access through compromised tokens can lead to lateral movement within networks, data exfiltration, or even ransomware deployment. The attack serves as a reminder for organizations to regularly audit and secure their third-party integrations to prevent similar breaches.
What's Next?
Salesforce and Gainsight are working together to investigate the breach and will issue a formal report and remediation guidance. Gainsight plans to move to a packaged version of the Connected App to ensure a clean and secure reset. Organizations affected by the breach are advised to rotate keys, credentials, and certificates for their Gainsight integrations. Once the connector is re-enabled, it will require re-authorization. Companies may need to reassess their security protocols and consider additional measures to protect against similar attacks in the future.












