Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

ShinyHunters Claims Data Theft from 200+ Companies via Salesforce Gainsight Breach

Posted on November 22, 2025November 22, 2025 By CWS

A classy provide chain assault has reportedly compromised information throughout a whole lot of organizations, linking the breach to a vital integration between buyer success platform Gainsight and CRM big Salesforce.

The infamous hacking collective ShinyHunters is claiming duty for the intrusion, which allegedly impacts over 200 firms. The assault vector didn’t depend on breaking into Salesforce instantly however as an alternative on exploiting the trusted connection established by way of third-party purposes.

On November 20, 2025, Salesforce took emergency motion to include the risk. The corporate formally disabled the connection between Gainsight-published purposes and the Salesforce ecosystem after detecting “uncommon exercise.”

In accordance with an announcement from Salesforce, their investigation means that the exercise facilitated unauthorized entry to buyer information, particularly by way of the app’s exterior connection.

Exploiting Trusted OAuth Tokens

The mechanics of this marketing campaign spotlight a rising pattern in fashionable cyber warfare: focusing on the “keys” fairly than the “locks.”

The Google Risk Intelligence Group (GTIG), together with researchers from Mandiant, recognized the risk actors as associates of ShinyHunters. These adversaries compromised third-party OAuth tokens.

Within the SaaS surroundings, OAuth tokens perform like digital permissions slips, permitting apps like Gainsight to speak to Salesforce with out requiring a consumer to log in each time.

By stealing these tokens, the attackers may probably bypass multi-factor authentication and customary login defenses, masquerading because the trusted utility to exfiltrate delicate company information. This methodology permits risk actors to maneuver laterally inside cloud environments whereas remaining undetected by conventional perimeter safety.

Whereas the scope of the info loss is probably large, Salesforce has been clear in its distinction concerning the place the fault lies. The corporate emphasised that there’s “no indication that this situation resulted from any vulnerability within the Salesforce platform.” As a substitute, the breach is strictly associated to the exterior connection and the administration of credentials for the Gainsight integration.

At present, clients are unable to attach their Gainsight-published purposes to Salesforce till additional discover. Each Salesforce and Mandiant are actively notifying organizations that present indicators of compromise.

This incident mirrors related campaigns noticed just lately, comparable to assaults focusing on Salesloft Drift, suggesting a concerted effort by risk teams to audit and exploit SaaS ecosystems the place third-party permissions are sometimes granted and forgotten.

Pressing Actions for SaaS Directors

This incident serves as a vital wake-up name for organizations counting on interconnected SaaS platforms. Safety groups are urged to instantly deal with this as a sign to audit their complete cloud surroundings.

The first advice is to evaluate all related apps inside Salesforce cases and revoke OAuth tokens for any integration that’s unused, suspicious, or associated to the affected Gainsight purposes.

Organizations utilizing Gainsight integrations ought to monitor for official communications from each distributors, Salesforce and Gainsight.

Nevertheless, proactive protection is required. If any anomalous exercise is detected from an integration, directors ought to rotate credentials instantly and assume a possible compromise.

As risk actors more and more pivot towards identity-based assaults and token theft, the upkeep of third-party permissions has change into simply as very important as patching software program vulnerabilities.

Right here is the desk of Indicators of Compromise (IoCs) related to the ShinyHunters marketing campaign focusing on Salesforce and Gainsight integrations.

IOC TypeValueFirst Seen (UTC)Final Seen (UTC)Noticed ActivityIP Address104.3.11[.]12025-11-08 13:11:292025-11-08 13:15:23AT&T IP; reconnaissance and unauthorized entry. ​IP Address198.54.135[.]1482025-11-16 21:48:032025-11-16 21:48:03Mullvad VPN proxy IP; reconnaissance and unauthorized entry. ​IP Address198.54.135[.]1972025-11-16 22:00:562025-11-16 22:06:57Mullvad VPN proxy IP; reconnaissance and unauthorized entry. ​IP Address198.54.135[.]2052025-11-18 10:43:552025-11-18 12:09:35Mullvad VPN proxy IP; reconnaissance and unauthorized entry. obsi​IP Address146.70.171[.]2162025-11-18 20:21:482025-11-18 20:50:13Mullvad VPN proxy IP; reconnaissance and unauthorized entry. ​IP Address169.150.203[.]2452025-11-18 20:54:022025-11-18 23:04:12Surfshark VPN proxy IP; reconnaissance and unauthorized entry. ​IP Address172.113.237[.]482025-11-18 21:23:292025-11-18 21:51:32NSocks VPN proxy IP; reconnaissance and unauthorized entry. ​IP Address45.149.173[.]2272025-11-18 22:05:152025-11-18 22:05:18Surfshark VPN proxy IP; reconnaissance and unauthorized entry. ​IP Address135.134.96[.]762025-11-19 08:26:182025-11-19 10:30:37IProxyShop VPN proxy IP; reconnaissance and unauthorized entry. ​IP Address65.195.111[.]212025-11-19 10:57:372025-11-19 10:59:19IProxyShop VPN proxy IP; reconnaissance and unauthorized entry. ​IP Address65.195.105[.]812025-11-19 11:17:512025-11-19 11:48:07Nexx VPN proxy IP; reconnaissance and unauthorized entry. ​IP Address65.195.105[.]1532025-11-19 12:23:172025-11-19 12:23:35ProxySeller VPN proxy IP; reconnaissance and unauthorized entry. ​IP Address45.66.35[.]352025-11-19 12:47:432025-11-19 12:47:45Tor VPN proxy IP; reconnaissance and unauthorized entry. ​IP Address146.70.174[.]692025-11-19 12:47:492025-11-19 12:47:49Proton VPN proxy IP; reconnaissance and unauthorized entry. ​IP Address82.163.174[.]832025-11-19 14:30:362025-11-19 22:26:46ProxySeller VPN proxy IP; reconnaissance and unauthorized entry. ​IP Address3.239.45[.]432025-10-23 00:17:222025-10-23 00:45:36AWS IP; reconnaissance in opposition to clients with compromised Gainsight entry token. ​Person Agentpython-requests/2.28[.]12025-11-08 13:11:192025-11-08 13:15:01Not an anticipated consumer agent string utilized by Gainsight related app; use together with different IOCs shared. ​Person Agentpython-requests/2.32[.]32025-11-16 21:48:032025-11-16 21:48:03Not an anticipated consumer agent string utilized by Gainsight related app; use together with different IOCs shared. ​Person Agentpython/3.11 aiohttp/3.13[.]12025-10-23 00:00:002025-10-23 00:01:00Not an anticipated consumer agent string utilized by Gainsight related app; use together with different IOCs shared. ​Person AgentSalesforce-Multi-Org-Fetcher/1.02025-11-18 22:05:132025-11-19 22:24:01Leveraged by risk actor for unauthorized entry; additionally noticed in Salesloft Drift exercise. ​

Comply with us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Breach, Claims, Companies, Data, Gainsight, Salesforce, ShinyHunters, Theft

Post navigation

Previous Post: Matrix Push C2 Uses Browser Notifications for Fileless, Cross-Platform Phishing Attacks
Next Post: 15 Best Remote Monitoring Tools

Related Posts

20 Best SNMP Monitoring Tools in 2025 Cyber Security News
F5 Breached – Hackers Stole BIG-IP Source Code and Undisclosed Vulnerabilities Data Cyber Security News
UNC2891 Threat Actors Hacked ATM Networks Using 4G Raspberry Pi Device Cyber Security News
Critical HIKVISION ApplyCT Vulnerability Exposes Devices to Code Execution Attacks Cyber Security News
AI Coding Assistant Creating a Perfect Blueprints for Attackers Cyber Security News
Splunk Universal Forwarder on Windows Lets Non-Admin Users Access All Contents Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details
  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • CrowdStrike Insider Helped Hackers Falsely Claim System Breach
  • New Fluent Bit Flaws Expose Cloud to RCE and Stealthy Infrastructure Intrusions

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details
  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • CrowdStrike Insider Helped Hackers Falsely Claim System Breach
  • New Fluent Bit Flaws Expose Cloud to RCE and Stealthy Infrastructure Intrusions

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark