Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Salesforce Flags Unauthorized Data Access via Gainsight-Linked OAuth Activity

Salesforce Flags Unauthorized Data Access via Gainsight-Linked OAuth Activity

Posted on November 21, 2025November 21, 2025 By CWS

Nov 21, 2025Ravie LakshmananData Breach / SaaS Safety
Salesforce has warned of detected “uncommon exercise” associated to Gainsight-published purposes linked to the platform.
“Our investigation signifies this exercise could have enabled unauthorized entry to sure clients’ Salesforce information by the app’s connection,” the corporate stated in an advisory.
The cloud providers agency stated it has taken the step of revoking all lively entry and refresh tokens related to Gainsight-published purposes linked to Salesforce. It has additionally quickly eliminated these purposes from the AppExchange as its investigation continues.
Salesforce didn’t disclose what number of clients had been impacted by the incident, however stated it has notified them.

“There isn’t a indication that this concern resulted from any vulnerability within the Salesforce platform,” the corporate added. “The exercise seems to be associated to the app’s exterior connection to Salesforce.”
Out of an abundance of warning, the Gainsight app has been quickly pulled from the HubSpot Market. “This may increasingly additionally affect Oauth entry for buyer connections whereas the assessment is happening,” Gainsight stated. “No suspicious exercise associated to Hubspot has been noticed at this level.”
In a put up shared on LinkedIn, Austin Larsen, principal menace analyst at Google Menace Intelligence Group (GTIG), described it as an “rising marketing campaign” focusing on Gainsight-published purposes linked to Salesforce.
The exercise is assessed to be tied to menace actors related to the ShinyHunters (aka UNC6240) group, mirroring an analogous set of assaults focusing on Salesloft Drift cases earlier this August.
In keeping with DataBreaches.Web, ShinyHunters has confirmed the marketing campaign is their doing and said that the Salesloft and Gainsight assault waves allowed them to steal information from almost 1000 organizations.
Apparently, Gainsight beforehand stated it was additionally one of many Salesloft Drift clients impacted within the earlier assault. However it’s not clear at this stage if the sooner breach performed a job within the present incident.

In that hack, the attackers accessed enterprise contact particulars for Salesforce-related content material, together with names, enterprise e mail addresses, telephone numbers, regional/location particulars, product licensing data, and assist case contents (with out attachments).
“Adversaries are more and more focusing on the OAuth tokens of trusted third-party SaaS integrations,” Larsen identified.
In mild of the malicious exercise, organizations are suggested to assessment all third-party purposes linked to Salesforce, revoke tokens for unused or suspicious purposes, and rotate credentials if anomalies are flagged from an integration.

The Hacker News Tags:Access, Activity, Data, Flags, GainsightLinked, OAuth, Salesforce, Unauthorized

Post navigation

Previous Post: Salesforce Confirms that Customers’ Data Was accessed Following the Gainsight Breach
Next Post: Authorities Sanctioned Russia-based Bulletproof Hosting Provider for Supporting Ransomware Operations

Related Posts

Microsoft OneDrive File Picker Flaw Grants Apps Full Cloud Access — Even When Uploading Just One File Microsoft OneDrive File Picker Flaw Grants Apps Full Cloud Access — Even When Uploading Just One File The Hacker News
The New JavaScript Injection Playbook The New JavaScript Injection Playbook The Hacker News
Salt Typhoon Exploits Cisco, Ivanti, Palo Alto Flaws to Breach 600 Organizations Worldwide Salt Typhoon Exploits Cisco, Ivanti, Palo Alto Flaws to Breach 600 Organizations Worldwide The Hacker News
The Case for Dynamic AI-SaaS Security as Copilots Scale The Case for Dynamic AI-SaaS Security as Copilots Scale The Hacker News
5 Reasons Why Attackers Are Phishing Over LinkedIn 5 Reasons Why Attackers Are Phishing Over LinkedIn The Hacker News
North Korean Hackers Target Web3 with Nim Malware and Use ClickFix in BabyShark Campaign North Korean Hackers Target Web3 with Nim Malware and Use ClickFix in BabyShark Campaign The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News