Posted in

Massive OAuth Attack Through Gainsight Integration Compromises Salesforce Data

A sophisticated supply chain attack has compromised sensitive data across hundreds of organizations after threat actors exploited the trusted integration between customer success platform Gainsight and CRM leader Salesforce. More than 200 companies may be affected.

The cybercriminal group ShinyHunters has claimed responsibility, marking this as one of the most impactful SaaS-based intrusions of 2025.


How the Attack Happened: Stolen OAuth Tokens, Not a Salesforce Breach

Short-tail SEO keywords: Salesforce breach, Gainsight hack, OAuth token attack, ShinyHunters
Long-tail SEO keywords: Salesforce OAuth compromise 2025, Gainsight Salesforce integration breach, third-party SaaS supply chain attack, OAuth token theft in cloud apps

Rather than breaching Salesforce directly, attackers exploited the trusted connection established by Gainsight applications via OAuth.

On November 20, 2025, Salesforce detected unusual activity and took emergency containment steps, disabling all connections from Gainsight-published apps.

According to Salesforce, unauthorized access occurred through the external integration—not from any flaw in its own platform.


Why OAuth Tokens Are the Perfect Target

The Google Threat Intelligence Group, supported by researchers from Mandiant, confirmed the attackers used compromised OAuth tokens to impersonate trusted integrations.

OAuth tokens act as digital access keys that allow apps to communicate without requiring constant logins. When stolen, threat actors can:

  • Bypass MFA
  • Evade traditional login detection
  • Access or exfiltrate sensitive corporate data
  • Move laterally between cloud services undetected

This tactic mirrors similar SaaS supply chain attacks involving tools like Salesloft and Drift.


Impact: 200+ Organizations Potentially Compromised

Affected companies may experience unauthorized data access where attackers leveraged Gainsight’s integration permissions to perform:

  • Reconnaissance
  • Data exfiltration
  • Multi-tenant environment probing
  • Credential harvesting

Salesforce and Mandiant are actively notifying impacted customers.

As of now, Gainsight integrations remain disabled globally until further notice.


Critical Warning for SaaS Administrators

This incident highlights a growing cybersecurity reality:
Identity and token theft has become more dangerous than exploiting software vulnerabilities.

Organizations using interconnected SaaS platforms should act immediately.


Immediate Actions Recommended

1. Audit All Connected Apps in Salesforce

Remove unused or suspicious integrations immediately.

2. Revoke OAuth Tokens

Especially for Gainsight or any integrations showing anomalous activity.

3. Rotate Credentials

Assume compromise if unusual access patterns are observed.

4. Monitor Official Advisories

Expect ongoing updates from both Salesforce and Gainsight.

5. Implement Continuous Third-Party Access Reviews

Many companies grant wide SaaS permissions that are never revisited.


Indicators of Compromise (IoCs)

Below is the table of confirmed IoCs linked to the ShinyHunters campaign against Gainsight–Salesforce integrations.

IOC TypeValueFirst Seen (UTC)Last Seen (UTC)Activity
IP Address104.3.11[.]12025-11-08 13:11:292025-11-08 13:15:23AT&T IP; reconnaissance & unauthorized access
IP Address198.54.135[.]1482025-11-16 21:48:032025-11-16 21:48:03Mullvad VPN; reconnaissance & unauthorized access
IP Address198.54.135[.]1972025-11-16 22:00:562025-11-16 22:06:57Mullvad VPN proxy; reconnaissance
IP Address198.54.135[.]2052025-11-18 10:43:552025-11-18 12:09:35Mullvad VPN proxy; unauthorized access
IP Address146.70.171[.]2162025-11-18 20:21:482025-11-18 20:50:13Mullvad VPN proxy
IP Address169.150.203[.]2452025-11-18 20:54:022025-11-18 23:04:12Surfshark VPN proxy
IP Address172.113.237[.]482025-11-18 21:23:292025-11-18 21:51:32NSocks VPN proxy
IP Address45.149.173[.]2272025-11-18 22:05:152025-11-18 22:05:18Surfshark VPN proxy
IP Address135.134.96[.]762025-11-19 08:26:182025-11-19 10:30:37IProxyShop VPN
IP Address65.195.111[.]212025-11-19 10:57:372025-11-19 10:59:19IProxyShop VPN
IP Address65.195.105[.]812025-11-19 11:17:512025-11-19 11:48:07Nexx VPN
IP Address65.195.105[.]1532025-11-19 12:23:172025-11-19 12:23:35ProxySeller VPN
IP Address45.66.35[.]352025-11-19 12:47:432025-11-19 12:47:45Tor proxy
IP Address146.70.174[.]692025-11-19 12:47:492025-11-19 12:47:49Proton VPN
IP Address82.163.174[.]832025-11-19 14:30:362025-11-19 22:26:46ProxySeller VPN
IP Address3.239.45[.]432025-10-23 00:17:222025-10-23 00:45:36AWS IP; reconnaissance via compromised tokens
User Agentpython-requests/2.28.12025-11-08 13:11:192025-11-08 13:15:01Not a Gainsight app UA; suspicious
User Agentpython-requests/2.32.32025-11-16 21:48:032025-11-16 21:48:03Unauthorized UA
User Agentpython/3.11 aiohttp/3.13.12025-10-23 00:00:002025-10-23 00:01:00Unrecognized UA pattern
User AgentSalesforce-Multi-Org-Fetcher/1.02025-11-18 22:05:132025-11-19 22:24:01Used by attackers; seen in similar campaigns

Conclusion

The Gainsight–Salesforce OAuth breach underscores a critical truth: third-party SaaS integrations are now one of the weakest links in enterprise security. As attackers continue targeting identity tokens instead of platform vulnerabilities, organizations must make continuous SaaS access governance a core part of their cybersecurity strategy.

Leave a Reply

Your email address will not be published. Required fields are marked *