A sophisticated supply chain attack has compromised the Salesforce data of more than 200 organizations. The threat actor, a collective calling itself Scattered Lapsus$ Hunters, exploited abused OAuth tokens associated with the Gainsight application, a popular tool on the Salesforce AppExchange. The incident was not a direct breach of Salesforce's platform but a classic example of a SaaS-to-SaaS attack, where the trusted connection between two cloud services is compromised. Salesforce has responded by revoking affected tokens and temporarily removing the Gainsight app. The attackers have publicly named numerous high-profile companies as victims, including Atlassian, Docusign, F5, and Verizon, creating a widespread security event with significant potential for data exposure across multiple industries.
The attack, detected by Google Threat Intelligence, involved the abuse of OAuth access and refresh tokens. These tokens, designed to allow Gainsight's application to interact with a customer's Salesforce instance, were compromised and used by the attackers to gain unauthorized access to sensitive customer data stored within Salesforce. The initial vector for the token theft appears to be a prior compromise of Gainsight itself, which the attackers claim was a result of another supply chain attack involving Salesloft/Drift.
Scattered Lapsus$ Hunters, a group reportedly composed of members from notorious crews like ShinyHunters, Scattered Spider, and Lapsus$, claimed the attack on their Telegram channel. They alleged the compromise of nearly 300 organizations and threatened to leak data from almost 1,000 organizations when combined with previous breaches. This incident highlights a dangerous trend where attackers pivot from one compromised SaaS provider to another, creating a cascading effect of breaches across the cloud ecosystem.
The attack chain leverages the inherent trust model of OAuth 2.0, a standard widely used for delegated authorization between cloud services.
T1528 - Steal Application Access Token: The core of the attack, where adversaries stole OAuth tokens to impersonate the Gainsight application.T1111 - Two-Factor Authentication Interception: While not a direct interception, the abuse of OAuth tokens effectively bypasses MFA protections on user accounts.T1078.004 - Valid Accounts: Cloud Accounts: The attackers used the stolen tokens, which represent a valid (application) account, to access cloud resources.T1530 - Data from Cloud Storage Object: The ultimate goal was to exfiltrate data stored within Salesforce cloud objects.T1625 - Hijack Session: The use of stolen tokens is a form of session hijacking, allowing the attacker to take over an authorized application's session.T1199 - Trusted Relationship: The attackers exploited the trusted relationship between organizations and their third-party SaaS providers (Salesforce and Gainsight).The business impact of this breach is potentially massive and far-reaching. With over 200 organizations compromised, including Fortune 500 companies, the potential for data leakage is severe. The stolen data, originating from Salesforce CRMs, is highly valuable and could include:
The public naming of victims like Atlassian, Docusign, F5, GitLab, LinkedIn, Malwarebytes, SonicWall, and Verizon causes significant reputational damage, regardless of the extent of data loss. For Gainsight, the incident is catastrophic, eroding customer trust and likely leading to significant financial and legal repercussions. For the affected organizations, the breach necessitates costly incident response efforts, customer notifications, and potential regulatory fines under laws like GDPR or CCPA.
No specific file-based or network-based IOCs were provided in the source articles. The primary indicator is the abuse of OAuth tokens, which must be detected through log analysis.
| Type | Value | Description | Context | Confidence |
|---|---|---|---|---|
| log_source | Salesforce Event Monitoring | Look for ApiTotalUsage or RestApi events. |
SIEM, Cloud Security Monitoring | high |
| network_traffic_pattern | Anomalous source IPs for OAuth token usage | Correlate Salesforce API access logs with known corporate IP ranges. Any access from unexpected ASNs or geolocations is suspicious. | SIEM, Cloud Access Security Broker (CASB) | high |
| api_endpoint | /services/data/vXX.X/ |
Monitor for unusual activity patterns against Salesforce REST API endpoints, especially from service accounts. | API Security Gateway, WAF, CASB | medium |
| user_account_pattern | Gainsight service account | Monitor the service account associated with the Gainsight integration for anomalous behavior, such as accessing unusual objects or exfiltrating large volumes of data. | Salesforce Shield, CASB | high |
Detecting this type of attack requires a focus on API and cloud application security monitoring.
Log Analysis: Security teams must ingest and analyze logs from their SaaS platforms, particularly Salesforce's Event Monitoring logs. Look for anomalous patterns associated with service accounts or third-party applications. Key indicators include:
ApiTotalUsage events).CASB/SSPM: A Cloud Access Security Broker (CASB) or SaaS Security Posture Management (SSPM) tool is crucial. These tools can baseline normal application behavior and alert on deviations. They can also provide visibility into OAuth permissions and help identify over-privileged applications. For detection, D3-RAPA: Resource Access Pattern Analysis is a key defensive technique to implement within these platforms.
Token Lifecycle Management: Regularly audit all authorized OAuth applications. Revoke tokens for unused or suspicious applications. Implement policies for short-lived refresh tokens where possible. D3-ANCI: Authentication Cache Invalidation should be applied by immediately revoking sessions and tokens upon detection of suspicious activity.
Mitigating SaaS-to-SaaS supply chain attacks requires a multi-layered approach focusing on visibility, control, and incident readiness.
Immediate Action: Salesforce has already revoked the tokens, which is the correct immediate response. Affected customers should assume their data was accessed and initiate their incident response plans.
Strategic Mitigation:
Scattered LAPSUS$ Hunters launched a dark web leak site, threatening to expose Salesforce customer data and demanding a ransom from Salesforce directly.
Routinely audit and enforce least privilege on service accounts, including those used for third-party application integrations.
Implement comprehensive logging and auditing for all SaaS platforms to monitor for anomalous API usage and access patterns.
If supported by the SaaS provider, restrict API access for third-party integrations to a known set of IP addresses.
Mapped D3FEND Techniques:
While token theft bypasses user MFA, enforcing MFA on the vendor's side (Gainsight) could have prevented the initial compromise.
Mapped D3FEND Techniques:
To specifically counter the abuse of the Gainsight application's OAuth token, organizations must implement Resource Access Pattern Analysis within their Salesforce environment. This involves using a SaaS Security Posture Management (SSPM) or advanced Cloud Access Security Broker (CASB) solution to establish a baseline of normal behavior for the Gainsight service account. The baseline should profile the types of Salesforce objects it accesses, the frequency of access, the volume of data queried, and the typical time-of-day for its operations. Once this baseline is established, configure real-time alerting for any significant deviations. For example, an alert should trigger if the service account suddenly starts accessing a large number of contact records it has never touched before, or if data export volumes spike unexpectedly. This technique moves beyond static permission checks and focuses on behavioral anomalies, which is essential for detecting the malicious use of a legitimate, authorized token. This provides a critical detection layer that could have identified the attacker's data collection activities.
A critical preventative measure is a rigorous audit and hardening of OAuth application permissions. Organizations must treat application service accounts with the same scrutiny as privileged user accounts. For the Gainsight-Salesforce integration, this means reviewing the scope of the OAuth grant and reducing it to the absolute minimum required for the application to function. For instance, if Gainsight only needs to read 'Opportunity' objects and write to 'Task' objects, its permissions should be explicitly limited to those actions and objects. Any 'read all' or 'write all' permissions should be eliminated. This can be implemented within Salesforce's 'Connected Apps' settings. Regularly scheduled reviews (e.g., quarterly) of all third-party app permissions should be mandated. This 'least privilege' approach ensures that even if an application's token is stolen, the potential blast radius is significantly contained, limiting the amount and type of data an attacker can exfiltrate.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats