Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Salesforce AI Hack Enabled CRM Data Theft

Posted on September 25, 2025September 25, 2025 By CWS

Immediate injection and an expired area might have been used to focus on Salesforce’s Agentforce platform for knowledge theft.

The assault technique, dubbed ForcedLeak, was found by researchers at Noma Safety, an organization that not too long ago raised $100 million for its AI agent safety platform.

Salesforce Agentforce allows companies to construct and deploy autonomous AI brokers throughout features equivalent to gross sales, advertising and marketing, and commerce. These brokers act independently to finish multi-step duties with out fixed human intervention.

The ForcedLeak assault technique recognized by Noma researchers concerned Agentforce’s Net-to-Lead performance, which allows the creation of an internet type that exterior customers equivalent to convention attendees or people focused in a advertising and marketing marketing campaign can fill out to supply lead info. This info is saved into the shopper relationship administration (CRM) system.

The researchers found that attackers can abuse types created with the Net-to-Lead performance to submit specifically crafted info, which when processed by Agentforce brokers causes them to hold out varied actions on the attacker’s behalf. 

The potential influence was demonstrated by submitting a payload that included innocent directions alongside directions asking the AI agent to gather electronic mail addresses and add them to the parameters of a request going to a distant server.

When an worker asks Agentforce to course of the lead that features the malicious payload, the immediate injection triggers and the info saved within the CRM is collected and exfiltrated to the attacker’s server.

The assault had important probabilities of remaining undetected as a result of Noma researchers found {that a} trusted Salesforce area had been left to run out. An attacker might have registered that area and used it for the server receiving the exfiltrated CRM knowledge.

After being notified, Salesforce regained management of the expired area and carried out modifications to forestall AI agent output from being despatched to untrusted domains. Commercial. Scroll to proceed studying.

Some of these assaults should not unusual. Researchers in latest months demonstrated a number of theoretical assaults the place integration between AI assistants and enterprise instruments have been abused for knowledge theft. 

Associated: ChatGPT Focused in Server-Aspect Knowledge Theft Assault

Associated: ChatGPT Tricked Into Fixing CAPTCHAs

Associated: Prime 25 MCP Vulnerabilities Reveal How AI Brokers Can Be Exploited

Security Week News Tags:CRM, Data, Enabled, Hack, Salesforce, Theft

Post navigation

Previous Post: Salesforce Patches Critical ForcedLeak Bug Exposing CRM Data via AI Prompt Injection
Next Post: New LNK Malware Uses Windows Binaries to Bypass Security Tools and Execute Malware

Related Posts

Cyber Intelligence Firm iCOUNTER Emerges From Stealth With $30 Million in Funding Security Week News
Fog Ransomware Attack Employs Unusual Tools Security Week News
VerifTools Fake ID Operation Dismantled by Law Enforcement Security Week News
Vietnamese Hackers Distribute Malware via Fake AI-Themed Websites Security Week News
Booz Allen Invests in Machine Identity Firm Corsha Security Week News
100,000 Impacted by Cornwell Quality Tools Data Breach  Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News