Salesforce has started notifying customers after it detected unusual activity involving Gainsight-published applications connected to Salesforce orgs. According to the security advisory, this activity may have enabled ๐ฝ๐ผ๐๐ฒ๐ป๐๐ถ๐ฎ๐น ๐๐ป๐ฎ๐๐๐ต๐ผ๐ฟ๐ถ๐๐ฒ๐ฑ ๐ฎ๐ฐ๐ฐ๐ฒ๐๐ ๐๐ผ ๐ฐ๐ฒ๐ฟ๐๐ฎ๐ถ๐ป ๐ฐ๐๐๐๐ผ๐บ๐ฒ๐ฟ๐โ ๐ฆ๐ฎ๐น๐ฒ๐๐ณ๐ผ๐ฟ๐ฐ๐ฒ ๐ฑ๐ฎ๐๐ฎ through those appsโ OAuth connections rather than any flaw in the core Salesforce platform.
Salesforce revoked all active access and refresh tokens associated with Gainsight-published apps, pulled those apps from the AppExchange, and stressed that the โunusual activityโ appears related to the appsโ external connection, not to a Salesforce vulnerability.ย Meanwhile, multiple threat-intel teams and SaaS security vendors now link this activity to the same broader OAuth-abuse ecosystem that powered the Salesloft Drift Salesforce campaign earlier this year widely attributed to ShinyHunters and related clusters.ย
For defenders, this incident reinforces a hard truth: once you grant a third-party connected app broad OAuth scopes into a CRM, that app effectively becomes an extension of your data perimeter. If attackers compromise the app or its tokens, they inherit that trust.
๐ช๐ต๐ฎ๐ ๐๐ฎ๐ฝ๐ฝ๐ฒ๐ป๐ฒ๐ฑ ๐ถ๐ป ๐ง๐ต๐ถ๐ ๐ฆ๐ฎ๐น๐ฒ๐๐ณ๐ผ๐ฟ๐ฐ๐ฒโ๐๐ฎ๐ถ๐ป๐๐ถ๐ด๐ต๐ ๐๐ฎ๐๐ฒ
In the latest status message, Salesforce explains that it identified unusual activity on integrations that customers set up using applications published by Gainsight. Those apps sit inside customer-managed orgs and connect back into Salesforce via OAuth.
Salesforceโs investigation indicates that this activity may have enabled attackers to access certain customersโ Salesforce data through those connected apps. As a direct containment step, Salesforce:
-
revoked all active access and refresh tokens tied to Gainsight-published apps, and
-
temporarily removed those apps from the AppExchange while the investigation continues.
At the same time, Gainsight has confirmed that it is working with Salesforce to investigate and has published its own FAQ for affected customers. Neither company has yet published a final object-level impact assessment, and they have not publicly named specific tenants beyond describing โcertain customersโ and hundreds of potentially affected orgs in related briefings.
๐ช๐ต๐ฒ๐ฟ๐ฒ ๐ข๐๐๐๐ต ๐๐ถ๐๐ ๐๐ป๐๐ผ ๐ง๐ต๐ถ๐ ๐๐ฎ๐บ๐ฝ๐ฎ๐ถ๐ด๐ป
In modern SaaS environments, OAuth scopes often quietly become the most powerful keys in the ecosystem. Gainsight-published apps typically request broad access to Salesforce objects so they can provide customer-success analytics, health scores, and usage insights. Those capabilities require read or read-write access to Accounts, Contacts, Cases, Opportunities, and custom objects.
Threat-intel reporting around this incident and the broader 2025 Salesforce breach wave suggests attackers now actively hunt for over-privileged OAuth integrations. In the Salesloft Drift / UNC6395 campaign, for example, attackers stole OAuth tokens from a third-party integration and then used those tokens to access hundreds of Salesforce orgs, exfiltrating CRM data and even cloud secrets embedded in support data.
In this Gainsight case, investigators and vendors describe a similar pattern:
-
threat actors obtain or abuse OAuth tokens issued to Gainsight apps;
-
those tokens grant access into customer Salesforce orgs with whatever scopes the admins originally approved;
-
attackers use that foothold to list objects, query records, and pull data at scale.
Salesforce, for its part, continues to emphasize that it has not found evidence of an exploit in the core platform. Instead, the issue lives in the trust chain between customer orgs, their installed Gainsight apps, and the OAuth tokens that bind them together.
๐ช๐ต๐ฎ๐ ๐๐ฎ๐๐ฎ ๐ฆ๐ฐ๐ผ๐ฝ๐ฒ ๐๐ ๐๐ ๐ฆ๐๐ฎ๐ธ๐ฒ?
Public reporting around this campaign and neighboring ones paints a consistent picture of the type of data that attackers target when they land inside Salesforce via OAuth:
-
core CRM records such as Accounts, Contacts, Opportunities, and Cases;
-
business contact information names, corporate emails, phone numbers, titles, and account hierarchies;
-
support-case content, licensing data, usage telemetry, and in some cases secrets or tokens embedded in notes and attachments.
In the Salesloft Drift driven campaign earlier this year, ShinyHunters claimed to have stolen roughly 1.5 billion records across hundreds of Salesforce instances and focused specifically on credentials and cloud tokens buried in CRM objects. Early commentary around Gainsight-linked access now suggests a smaller but still significant cohort on the order of a few hundred orgs experienced some level of unauthorized data access before Salesforce revoked tokens.
For most organizations, that kind of exposure does not necessarily involve credit-card data or regulated secrets. However, it does expose dense relationship graphs and account intelligence that adversaries can weaponize in subsequent phishing, extortion, and supply-chain operations.
๐๐ผ๐ ๐ง๐ต๐ถ๐ ๐๐ฐ๐ต๐ผ๐ฒ๐ ๐๐ต๐ฒ ๐ช๐ถ๐ฑ๐ฒ๐ฟ ๐ฆ๐ฎ๐น๐ฒ๐๐ณ๐ผ๐ฟ๐ฐ๐ฒ ๐๐ฟ๐ฒ๐ฎ๐ฐ๐ต ๐ช๐ฎ๐๐ฒ
This incident does not exist in a vacuum. Throughout 2025, ShinyHunters and related clusters (UNC6040, UNC6395) have repeatedly targeted Salesforce tenants via either third-party integrations or fake tooling. In one track, they convinced employees to install a trojanized variant of Salesforceโs Data Loader and then abused OAuth to export data from compromised orgs.
In another track, they stole OAuth tokens from integrations like Salesloft Drift and reused them at scale against hundreds of Salesforce environments. Analysts now view the Gainsight-linked access as part of the same strategic playbook: target integration points that sit between large SaaS platforms, compromise one partner, and inherit trust into many customer orgs at once.
As a result, the โSalesforce breach wave of 2025โ increasingly looks like an ecosystem problem, not a series of isolated accidents. The connective tissue OAuth, connected apps, and shared APIs has become the primary attack surface.
๐๐บ๐บ๐ฒ๐ฑ๐ถ๐ฎ๐๐ฒ ๐ฆ๐๐ฒ๐ฝ๐ ๐๐ผ๐ฟ ๐ข๐ฟ๐ด๐ ๐ง๐ต๐ฎ๐ ๐จ๐๐ฒ ๐๐ฎ๐ถ๐ป๐๐ถ๐ด๐ต๐ ๐ช๐ถ๐๐ต ๐ฆ๐ฎ๐น๐ฒ๐๐ณ๐ผ๐ฟ๐ฐ๐ฒ
If your organization connects Salesforce to Gainsight, you should treat this as a live security incident until you prove otherwise. Salesforce already revoked Gainsight app tokens, yet that action only stops further OAuth use; it does not retroactively remove any data that attackers may have pulled.
At a minimum, you should:
-
identify all Gainsight-published apps that ever connected to your Salesforce orgs and confirm which business units own them;
-
review login history, connected-app usage, and API request logs around the advisory timeframe for anomalous queries, bulk exports, or large report runs;
-
rotate credentials and tokens associated with integration users, related service accounts, and any secrets that might appear in Salesforce cases or attachments;
-
tighten OAuth scopes for all third-party apps, ensuring they align with strict least-privilege rather than convenience
While you complete that work, you should assume that attackers could have pulled contact-level data and other business metadata. That assumption helps you plan realistic downstream controls, such as heightened phishing detection against exposed accounts and extra scrutiny around account-takeover attempts that leverage leaked details.
๐ฆ๐๐ฟ๐ฎ๐๐ฒ๐ด๐ถ๐ฐ ๐๐ฒ๐๐๐ผ๐ป๐: ๐ง๐ฟ๐ฒ๐ฎ๐ ๐๐ผ๐ป๐ป๐ฒ๐ฐ๐๐ฒ๐ฑ ๐๐ฝ๐ฝ๐ ๐ฎ๐ ๐ฃ๐ฟ๐ถ๐๐ถ๐น๐ฒ๐ด๐ฒ๐ฑ ๐๐ป๐ณ๐ฟ๐ฎ๐๐๐ฟ๐๐ฐ๐๐๐ฟ๐ฒ
Beyond immediate response, this incident underscores a broader mindset shift. Many organizations still view Salesforce connected apps as โjust business tooling,โ not as privileged infrastructure that needs the same governance as VPNs or identity providers. In reality, any app that holds a broad OAuth token into Salesforce effectively becomes an extension of your identity plane.
Therefore, security teams should:
-
classify high-privilege Salesforce connected apps as Tier-1 assets with named owners and explicit risk acceptance;
-
audit those apps regularly for scope creep, dormant integrations, and misaligned permissions;
-
enforce conditional-access policies and IP restrictions on integration users where the platform allows it;
-
integrate connected-app events into their SIEM so they can detect unusual query patterns or off-hours bulk exports.
If you already weathered the Drift-related Salesforce incidents earlier this year, you can treat the Gainsight incident as another signal that this threat model will persist. Attackers now specialize in OAuth abuse, and they will continue to probe any integration that yields high-value CRM data.
๐ช๐ต๐ฎ๐ ๐ฆ๐ฎ๐น๐ฒ๐๐ณ๐ผ๐ฟ๐ฐ๐ฒ ๐ฎ๐ป๐ฑ ๐๐ฎ๐ถ๐ป๐๐ถ๐ด๐ต๐ ๐ก๐ฒ๐ฒ๐ฑ ๐๐ผ ๐๐ผ ๐ก๐ฒ๐ ๐
Salesforce has already taken important first steps: revoking tokens, removing Gainsight apps from AppExchange, and publishing a security advisory that clarifies the current view of platform impact. However, customers will expect more than emergency levers. They need granular answers to three questions:
-
which objects and fields did attackers access through these Gainsight apps,
-
how long did the unauthorized access persist, and
-
what additional controls will Salesforce and Gainsight enforce to prevent re-use of this vector?
Gainsight, in particular, will need to show how it protects its own environment, secrets, and OAuth token handling, especially given reports that threat actors claim to have used stolen Gainsight tokens to reach hundreds of Salesforce instances. Transparency here directly influences whether enterprises continue to trust Gainsight as a CSM layer atop their CRMs.
For Salesforce, the long-term answer likely involves stronger default guardrails for connected apps: better discovery, richer built-in risk scoring for over-privileged integrations, and more prescriptive guidance for customers who lack dedicated SaaS security expertise. Until then, customers must treat OAuth governance as a first-class security practice rather than an afterthought.
๐ง๐ต๐ฒ ๐ฅ๐ฒ๐ฎ๐น ๐๐ฒ๐๐๐ผ๐ป ๐๐ฟ๐ผ๐บ ๐ฌ๐ฒ๐ ๐๐ป๐ผ๐๐ต๐ฒ๐ฟ ๐ฆ๐ฎ๐น๐ฒ๐๐ณ๐ผ๐ฟ๐ฐ๐ฒ ๐๐ฐ๐ผ๐๐๐๐๐ฒ๐บ ๐๐ป๐ฐ๐ถ๐ฑ๐ฒ๐ป๐
This Gainsight-linked incident reinforces a pattern that 2025 has already made painfully clear: attackers do not need a zero-day in Salesforce to steal Salesforce data. Instead, they compromise the ecosystem around it integrations, partner tools, and connected apps which often hold OAuth tokens with expansive scopes and weak oversight.
If your organization relies on Salesforce as a system of record, you now need a threat model that explicitly covers ๐ผ๐๐๐๐ถ๐ฑ๐ฒ ๐ฎ๐ฝ๐ฝ๐ ๐ต๐ผ๐น๐ฑ๐ถ๐ป๐ด ๐ถ๐ป๐๐ถ๐ฑ๐ฒ ๐ฎ๐ฐ๐ฐ๐ฒ๐๐. That means disciplined OAuth governance, active monitoring of connected-app behavior, and a clear, repeatable playbook whenever a third-party integration lands in the headlines.
๐๐๐ค๐ฆ
Q: Does this incident mean Salesforceโs core platform is insecure?
A: No. Salesforce stated there is no indication the issue resulted from a vulnerability in its core platform. The risk lies in third-party applications that integrate via OAuth and may misuse that trust.
Q: How can attackers use connected applications to access Salesforce data?
A: Attackers may gain or misuse OAuth tokens for a connected app, granting it substantial access rights. With that access the app can query objects like Accounts, Users, Cases, and Opportunities, and extract data without needing a platform exploit.
Q: Which organizations are most at risk in this scenario?
A: Companies that allow broad connected-app permissions, do not audit token usage, or have publicly exposed integrations. Particularly at risk are high-value cloud tenants, SaaS-hungry organizations, and businesses with multiple third-party Salesforce apps.
Q: What immediate actions should an org take following this threat?
A: Perform an immediate audit of connected apps, revoke suspicious OAuth tokens, enforce least-privilege scopes, monitor API usage for anomalies, and ensure token rotation and token lifetimes are enforced.
Q: How can companies reduce the risk of this type of incident in the longer term?
A: Maintain an inventory of all connected applications, require admin-approved user access for app installs, limit refresh token lifetime, apply network controls (IP restrictions, regional controls), and treat token misuse as part of vendor/supply-chain risk management.
One thought on “Unauthorized Data Access in Salesforce Published Applications”