ShinyHunters Hits Salesforce Again, Breaching Customers via Gainsight App

ShinyHunters Implicated in Major Salesforce Data Breach Through Compromised Gainsight Third-Party Application

HIGH
November 21, 2025
6m read
Supply Chain AttackData BreachThreat Actor

Impact Scope

People Affected

Data from users of approximately 285 Salesforce instances

Industries Affected

Technology

Related Entities

Threat Actors

Organizations

Salesforce Gainsight Google Threat Intelligence Group (GTIG)Obsidian Security

Products & Tech

DriftOAuth

Other

Salesloft

Full Report

Executive Summary

On November 19, 2025, Salesforce disclosed a security incident where customer data was exposed due to a compromise of the third-party Gainsight application. The threat actor, identified as the prolific cybercrime group ShinyHunters (also known as UNC6240), exploited OAuth tokens to gain unauthorized access to Salesforce customer environments. This supply chain attack did not exploit a vulnerability in the Salesforce platform itself but rather abused the trusted connection between the two SaaS platforms. In response, Salesforce revoked all associated credentials and temporarily delisted Gainsight's apps from its AppExchange. This incident underscores the critical risk posed by third-party application integrations and the sophisticated tactics used by threat actors to abuse authentication mechanisms.


Threat Overview

The attack was initiated by compromising the Gainsight customer success management (CSM) application, which integrates with Salesforce environments. The threat actors, ShinyHunters, leveraged this access to exploit the OAuth authentication tokens that govern the connection between Gainsight and its customers' Salesforce instances. By compromising these tokens, the attackers were able to move laterally from the third-party application into the primary Salesforce environments of numerous organizations.

ShinyHunters claimed to have accessed approximately 285 Salesforce customer instances through this method. This campaign is the latest in a series of similar attacks targeting the Salesforce ecosystem, following a pattern of abusing trusted SaaS-to-SaaS connections. The attack vector highlights a significant and growing threat surface for enterprises that rely on a web of interconnected cloud applications. The initial compromise of Gainsight's systems allowed the threat actor to bypass traditional perimeter defenses and operate with the privileges of a legitimate, integrated application.


Technical Analysis

The core of this attack revolves around the abuse of the OAuth 2.0 authorization framework. OAuth is widely used to grant applications access to resources on behalf of a user without sharing credentials. In this case, Gainsight applications were granted persistent access to customer Salesforce data via access and refresh tokens.

Attack Chain:

  1. Initial Compromise: The exact method used to compromise Gainsight is not publicly detailed, but it likely involved compromising credentials or infrastructure with access to their Salesforce integration secrets.
  2. Token Theft: The attackers stole the OAuth access and refresh tokens associated with Gainsight's applications. These tokens are bearer tokens, meaning anyone who possesses them can use them to access the associated resources.
  3. Unauthorized Access: Using the stolen tokens, ShinyHunters made API calls to the Salesforce environments of Gainsight's customers. This access would appear legitimate, as it originated from what looked like the trusted Gainsight application.
  4. Data Exfiltration: The attackers then used this unauthorized API access to exfiltrate data from the compromised Salesforce instances.

This attack methodology maps to several MITRE ATT&CK techniques:


Impact Assessment

The business impact of this breach is significant for the affected Salesforce customers. The exposed data could include sensitive customer information, sales pipelines, contact details, and other proprietary business data stored within their CRM. The potential consequences include:

  • Financial Loss: Direct costs associated with incident response, legal fees, and potential regulatory fines.
  • Reputational Damage: Loss of customer trust and damage to brand reputation.
  • Competitive Disadvantage: If stolen data, such as sales strategies or customer lists, is sold or leaked, it could be used by competitors.
  • Regulatory Scrutiny: Organizations subject to regulations like GDPR or CCPA may face investigations and penalties for the data exposure, even if the breach originated with a third party.
  • Operational Disruption: Salesforce's action to revoke tokens and delist the apps, while necessary, caused immediate operational disruption for legitimate users of the Gainsight application.

This incident forces organizations to re-evaluate their third-party risk management programs, especially concerning SaaS applications with deep integrations and privileged access to critical data repositories.


IOCs

Type Value Description
ip_address_v4 3.239.45.43 Malicious IP address observed by Obsidian Security.
user_agent Python/3.11 aiohttp/3.13.1 User agent associated with the attacker's tools.

Cyber Observables for Detection

Type Value Description Context Confidence
api_endpoint /services/oauth2/token Salesforce OAuth token endpoint. Monitor for anomalous requests or requests from unusual IPs. API Gateway Logs, Cloud Trail high
log_source Salesforce Event Monitoring Specifically monitor Login and API event types for suspicious activity. SIEM, Salesforce Shield high
network_traffic_pattern Unusual geographic source for API calls Look for API access from IP ranges inconsistent with the third-party vendor's known infrastructure. Firewall Logs, VPC Flow Logs medium
command_line_pattern curl -H "Authorization: Bearer [TOKEN]" Hunt for command-line history on potentially compromised developer or admin workstations that might handle tokens. EDR Logs, Shell History low
user_account_pattern API-only user accounts Closely monitor the activity of service accounts used for integrations for any deviation from baseline behavior. IAM Logs, SIEM high

Detection & Response

Detection:

  • Monitor Salesforce Logs: Utilize Salesforce Event Monitoring (part of Salesforce Shield) to analyze Login, API, RestApi, and ReportExport event types. Look for logins from the specified malicious IP (3.239.45.43) or user agent (Python/3.11 aiohttp/3.13.1).
  • Analyze API Usage: Baseline normal API usage patterns for integrated third-party applications. Alert on significant deviations, such as an unusual volume of ReportExport events, access to objects outside the application's normal scope, or activity outside of normal business hours.
  • Third-Party App Auditing: Regularly audit all connected applications in the Salesforce environment. Review their permissions and access levels. Tools like Obsidian Security specialize in detecting this type of SaaS-to-SaaS attack.
  • D3FEND Techniques: Implement D3-NTA: Network Traffic Analysis to identify anomalous API calls and D3-UBA: User Behavior Analysis to baseline and detect deviations in the behavior of integration accounts.

Response:

  1. Revoke Credentials: Immediately revoke all OAuth tokens and credentials associated with the suspected compromised application. Salesforce has already done this for Gainsight, but this is a critical first step in any similar incident.
  2. Investigate Activity: Analyze historical logs to determine the scope of the compromise. Identify which records were accessed, modified, or exfiltrated by the threat actor.
  3. Notify Affected Parties: Based on the investigation, notify affected customers and regulatory bodies as required by law.
  4. Review Third-Party Integrations: Conduct a full audit of all third-party applications connected to your critical SaaS platforms. Re-evaluate the business need and permissions for each.

Mitigation

Strategic Mitigation:

  • Principle of Least Privilege: Ensure that third-party applications are granted the absolute minimum permissions necessary to perform their function. Avoid granting broad Read/Write All permissions.
  • Third-Party Risk Management (TPRM): Enhance vendor security reviews. Scrutinize the security practices of any vendor whose application will have API access to critical data.
  • D3FEND Hardening: Apply D3-ACH: Application Configuration Hardening by restricting the IP ranges from which third-party applications can connect to your Salesforce instance, if the vendor supports it.

Tactical Mitigation:

  1. Regular Token Rotation: While refresh tokens are long-lived, enforce policies for periodic review and re-authorization of third-party applications.
  2. IP Whitelisting: If the third-party application uses a predictable set of source IPs, configure Salesforce to only allow API access from those addresses.
  3. Use Scoped API Tokens: When granting access, use tokens with narrow scopes that limit access to specific data types and API functions.
  4. Implement SaaS Security Posture Management (SSPM): Deploy SSPM tools to continuously monitor for misconfigurations, excessive permissions, and anomalous activity across interconnected SaaS applications.

Timeline of Events

1
October 22, 2025
Malicious activity primarily observed by Obsidian Security.
2
October 23, 2025
Malicious activity primarily observed by Obsidian Security.
3
November 19, 2025
Salesforce issues a security advisory about suspicious activity involving Gainsight applications.
4
November 21, 2025
This article was published

MITRE ATT&CK Mitigations

Audit

M1047enterprise

Implement comprehensive logging and auditing for SaaS platforms to detect anomalous API usage and access patterns.

While token theft bypasses user-facing MFA, enforce MFA for all administrative access to SaaS platforms to make initial compromise harder.

Restrict API access to trusted IP ranges for third-party integrations where possible to limit the impact of token theft.

Regularly audit and harden the configuration of third-party app integrations, applying the principle of least privilege for permissions and data access scopes.

D3FEND Defensive Countermeasures

To counter threats like the ShinyHunters' abuse of OAuth tokens, organizations must implement Resource Access Pattern Analysis within their SaaS environments. This involves establishing a baseline of normal API activity for each integrated third-party application, such as Gainsight. Security teams should use a Cloud Access Security Broker (CASB) or a SaaS Security Posture Management (SSPM) tool to monitor all API calls made by the integration's service account. The baseline should profile the types of data objects accessed, the volume of requests, the time of day, and the geographic source. For the Gainsight-Salesforce breach, this would mean flagging the sudden access of 285 different customer instances or unusual 'ReportExport' events. Alerts should be configured to trigger when the integration's behavior deviates significantly from this baseline, such as accessing new types of data, exfiltrating large volumes of information, or operating from a new IP address like the one identified (3.239.45.43). This proactive monitoring transforms API logs from a forensic tool into a real-time detection mechanism, enabling rapid response to token compromise before a full-scale data breach occurs.

Application Configuration Hardening is a critical defense against the abuse of third-party integrations. Within the context of the Salesforce-Gainsight breach, this means moving beyond default settings and applying the principle of least privilege to the OAuth connection. Instead of granting broad permissions, administrators should configure the connected app to have the most restrictive scope possible. For example, if an app only needs to read contact objects, it should not have permission to export reports or access financial data. Furthermore, where supported by the vendor, configure IP range restrictions on the Salesforce connected app settings to only allow API calls from Gainsight's known production IP addresses. Regularly schedule and conduct audits of all connected applications, reviewing their permissions and questioning the business justification for each. This process should be part of a larger Third-Party Risk Management (TPRM) program. By systematically hardening these configurations, organizations can significantly reduce the 'blast radius' of a compromise, ensuring that even if a third-party's token is stolen, the attacker's access is severely limited.

Sources & References

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

OAuthSaaS SecurityThird-Party RiskAPI SecuritySupply ChainUNC6240

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading