Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

ShinyHunters Claims Data Theft from 200+ Companies via Salesforce Gainsight Breach

Posted on November 22, 2025November 22, 2025 By CWS

A classy provide chain assault has reportedly compromised information throughout a whole lot of organizations, linking the breach to a vital integration between buyer success platform Gainsight and CRM big Salesforce.

The infamous hacking collective ShinyHunters is claiming duty for the intrusion, which allegedly impacts over 200 firms. The assault vector didn’t depend on breaking into Salesforce instantly however as an alternative on exploiting the trusted connection established by way of third-party purposes.

On November 20, 2025, Salesforce took emergency motion to include the risk. The corporate formally disabled the connection between Gainsight-published purposes and the Salesforce ecosystem after detecting “uncommon exercise.”

In accordance with an announcement from Salesforce, their investigation means that the exercise facilitated unauthorized entry to buyer information, particularly by way of the app’s exterior connection.

Exploiting Trusted OAuth Tokens

The mechanics of this marketing campaign spotlight a rising pattern in fashionable cyber warfare: focusing on the “keys” fairly than the “locks.”

The Google Risk Intelligence Group (GTIG), together with researchers from Mandiant, recognized the risk actors as associates of ShinyHunters. These adversaries compromised third-party OAuth tokens.

Within the SaaS surroundings, OAuth tokens perform like digital permissions slips, permitting apps like Gainsight to speak to Salesforce with out requiring a consumer to log in each time.

By stealing these tokens, the attackers may probably bypass multi-factor authentication and customary login defenses, masquerading because the trusted utility to exfiltrate delicate company information. This methodology permits risk actors to maneuver laterally inside cloud environments whereas remaining undetected by conventional perimeter safety.

Whereas the scope of the info loss is probably large, Salesforce has been clear in its distinction concerning the place the fault lies. The corporate emphasised that there’s “no indication that this situation resulted from any vulnerability within the Salesforce platform.” As a substitute, the breach is strictly associated to the exterior connection and the administration of credentials for the Gainsight integration.

At present, clients are unable to attach their Gainsight-published purposes to Salesforce till additional discover. Each Salesforce and Mandiant are actively notifying organizations that present indicators of compromise.

This incident mirrors related campaigns noticed just lately, comparable to assaults focusing on Salesloft Drift, suggesting a concerted effort by risk teams to audit and exploit SaaS ecosystems the place third-party permissions are sometimes granted and forgotten.

Pressing Actions for SaaS Directors

This incident serves as a vital wake-up name for organizations counting on interconnected SaaS platforms. Safety groups are urged to instantly deal with this as a sign to audit their complete cloud surroundings.

The first advice is to evaluate all related apps inside Salesforce cases and revoke OAuth tokens for any integration that’s unused, suspicious, or associated to the affected Gainsight purposes.

Organizations utilizing Gainsight integrations ought to monitor for official communications from each distributors, Salesforce and Gainsight.

Nevertheless, proactive protection is required. If any anomalous exercise is detected from an integration, directors ought to rotate credentials instantly and assume a possible compromise.

As risk actors more and more pivot towards identity-based assaults and token theft, the upkeep of third-party permissions has change into simply as very important as patching software program vulnerabilities.

Right here is the desk of Indicators of Compromise (IoCs) related to the ShinyHunters marketing campaign focusing on Salesforce and Gainsight integrations.

IOC TypeValueFirst Seen (UTC)Final Seen (UTC)Noticed ActivityIP Address104.3.11[.]12025-11-08 13:11:292025-11-08 13:15:23AT&T IP; reconnaissance and unauthorized entry. ​IP Address198.54.135[.]1482025-11-16 21:48:032025-11-16 21:48:03Mullvad VPN proxy IP; reconnaissance and unauthorized entry. ​IP Address198.54.135[.]1972025-11-16 22:00:562025-11-16 22:06:57Mullvad VPN proxy IP; reconnaissance and unauthorized entry. ​IP Address198.54.135[.]2052025-11-18 10:43:552025-11-18 12:09:35Mullvad VPN proxy IP; reconnaissance and unauthorized entry. obsi​IP Address146.70.171[.]2162025-11-18 20:21:482025-11-18 20:50:13Mullvad VPN proxy IP; reconnaissance and unauthorized entry. ​IP Address169.150.203[.]2452025-11-18 20:54:022025-11-18 23:04:12Surfshark VPN proxy IP; reconnaissance and unauthorized entry. ​IP Address172.113.237[.]482025-11-18 21:23:292025-11-18 21:51:32NSocks VPN proxy IP; reconnaissance and unauthorized entry. ​IP Address45.149.173[.]2272025-11-18 22:05:152025-11-18 22:05:18Surfshark VPN proxy IP; reconnaissance and unauthorized entry. ​IP Address135.134.96[.]762025-11-19 08:26:182025-11-19 10:30:37IProxyShop VPN proxy IP; reconnaissance and unauthorized entry. ​IP Address65.195.111[.]212025-11-19 10:57:372025-11-19 10:59:19IProxyShop VPN proxy IP; reconnaissance and unauthorized entry. ​IP Address65.195.105[.]812025-11-19 11:17:512025-11-19 11:48:07Nexx VPN proxy IP; reconnaissance and unauthorized entry. ​IP Address65.195.105[.]1532025-11-19 12:23:172025-11-19 12:23:35ProxySeller VPN proxy IP; reconnaissance and unauthorized entry. ​IP Address45.66.35[.]352025-11-19 12:47:432025-11-19 12:47:45Tor VPN proxy IP; reconnaissance and unauthorized entry. ​IP Address146.70.174[.]692025-11-19 12:47:492025-11-19 12:47:49Proton VPN proxy IP; reconnaissance and unauthorized entry. ​IP Address82.163.174[.]832025-11-19 14:30:362025-11-19 22:26:46ProxySeller VPN proxy IP; reconnaissance and unauthorized entry. ​IP Address3.239.45[.]432025-10-23 00:17:222025-10-23 00:45:36AWS IP; reconnaissance in opposition to clients with compromised Gainsight entry token. ​Person Agentpython-requests/2.28[.]12025-11-08 13:11:192025-11-08 13:15:01Not an anticipated consumer agent string utilized by Gainsight related app; use together with different IOCs shared. ​Person Agentpython-requests/2.32[.]32025-11-16 21:48:032025-11-16 21:48:03Not an anticipated consumer agent string utilized by Gainsight related app; use together with different IOCs shared. ​Person Agentpython/3.11 aiohttp/3.13[.]12025-10-23 00:00:002025-10-23 00:01:00Not an anticipated consumer agent string utilized by Gainsight related app; use together with different IOCs shared. ​Person AgentSalesforce-Multi-Org-Fetcher/1.02025-11-18 22:05:132025-11-19 22:24:01Leveraged by risk actor for unauthorized entry; additionally noticed in Salesloft Drift exercise. ​

Comply with us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Breach, Claims, Companies, Data, Gainsight, Salesforce, ShinyHunters, Theft

Post navigation

Previous Post: Matrix Push C2 Uses Browser Notifications for Fileless, Cross-Platform Phishing Attacks
Next Post: 15 Best Remote Monitoring Tools

Related Posts

Malicious Android Apps Mimic as Popular Indian Banking Apps Steal Login Credentials Cyber Security News
Microsoft Unveils New Tool to Migrate VMware Virtual Machines From vCenter to Hyper-V Cyber Security News
Massistant Chinese Mobile Forensic Tooling Gain Access to SMS Messages, Images, Audio and GPS Data Cyber Security News
UK Police Arrested Man Linked to Ransomware Attack That Crippeled European Airports Cyber Security News
Scattered Spider Upgraded Their Tactics to Abuse Legitimate Tools to Evade Detection and Maintain Persistence Cyber Security News
Chinese Salt Typhoon and UNC4841 Hackers Teamed Up to Attack Government and Corporate Infrastructure Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Leveraging OSINT Tools for Enhanced Cybersecurity Threat Intelligence
  • Data Breach at Texas Gas Station Operator Exposes Info of 377,000+ Customers
  • MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors
  • Europol Arrests 34 Black Axe Members in Spain Over €5.9M Fraud and Organized Crime
  • New MacSync Stealer Uses Signed macOS App to Evade Gatekeeper and Steal Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Leveraging OSINT Tools for Enhanced Cybersecurity Threat Intelligence
  • Data Breach at Texas Gas Station Operator Exposes Info of 377,000+ Customers
  • MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors
  • Europol Arrests 34 Black Axe Members in Spain Over €5.9M Fraud and Organized Crime
  • New MacSync Stealer Uses Signed macOS App to Evade Gatekeeper and Steal Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark