Demo Request
Take a personalized product tour with a member of our team to see how we can help make your existing security teams and tools more effective within minutes.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Home
Blog

Gainsight OAuth Attack: What Salesforce Users Must Do Now

Tal Shapira
Updated
November 21, 2025
November 25, 2025
6 min read
Ready to Close the SaaS Security Gap?
Chat with us

Salesforce issued a security advisory today regarding unusual activity involving Gainsight-published applications. If your organization uses or has ever used Gainsight's Salesforce integration, you need to read this immediately.

What Happened?

Salesforce has detected suspicious activity related to Gainsight apps available on the AppExchange. In response, the company has taken swift action by:

  • Revoking all Gainsight access and refresh tokens
  • Temporarily removing Gainsight apps from the AppExchange marketplace

While these are important containment measures, this OAuth compromise raises serious concerns about potential data exposure and the possibility of persistent unauthorized access to Salesforce environments.

IOC Type Value First Seen Last Seen Observed Activity
IP Address 104.3.11.1 2025-11-08 2025-11-08 AT&T IP; reconnaissance and unauthorized access.
IP Address 198.54.135.148 2025-11-16 2025-11-16 Mullvad VPN proxy IP; reconnaissance and unauthorized access.
IP Address 198.54.135.197 2025-11-16 2025-11-16 Mullvad VPN proxy IP; reconnaissance and unauthorized access.
IP Address 198.54.135.205 2025-11-18 2025-11-18 Mullvad VPN proxy IP; reconnaissance and unauthorized access.
IP Address 146.70.171.216 2025-11-18 2025-11-18 Mullvad VPN proxy IP; reconnaissance and unauthorized access.
IP Address 169.150.203.245 2025-11-18 2025-11-18 Surfshark VPN proxy IP; reconnaissance and unauthorized access.
IP Address 172.113.237.48 2025-11-18 2025-11-18 NSocks VPN proxy IP; reconnaissance and unauthorized access.
IP Address 45.149.173.227 2025-11-18 2025-11-18 Surfshark VPN proxy IP; reconnaissance and unauthorized access.
IP Address 135.134.96.76 2025-11-19 2025-11-19 IProxyShop VPN proxy IP; reconnaissance and unauthorized access.
IP Address 65.195.111.21 2025-11-19 2025-11-19 IProxyShop VPN proxy IP; reconnaissance and unauthorized access.
IP Address 65.195.105.81 2025-11-19 2025-11-19 Nexx VPN proxy IP; reconnaissance and unauthorized access.
IP Address 65.195.105.153 2025-11-19 2025-11-19 ProxySeller VPN proxy IP; reconnaissance and unauthorized access.
IP Address 45.66.35.35 2025-11-19 2025-11-19 Tor VPN proxy IP; reconnaissance and unauthorized access.
IP Address 146.70.174.69 2025-11-19 2025-11-19 Proton VPN proxy IP; reconnaissance and unauthorized access.
IP Address 82.163.174.83 2025-11-19 2025-11-19 ProxySeller VPN proxy IP; reconnaissance and unauthorized access.
IP Address 3.239.45.43 2025-10-23 2025-10-23 AWS IP; reconnaissance against customers with compromised Gainsight access token.
User Agent python-requests/2.28.1 2025-11-08 2025-11-08 Not an expected user agent string used by Gainsight connected app; use in conjunction with other IOCs shared.
User Agent python-requests/2.32.3 2025-11-16 2025-11-16 Not an expected user agent string used by Gainsight connected app; use in conjunction with other IOCs shared.
User Agent python/3.11 aiohttp/3.13.1 2025-10-23 2025-10-23 Not an expected user agent string used by Gainsight connected app; use in conjunction with other IOCs shared.
User Agent Salesforce-Multi-Org-Fetcher/1.0 2025-11-18 2025-11-19 Leveraged by threat actor for unauthorized access; also observed in Salesloft Drift activity

Are You Affected?

You should assume you're affected if:

  • You currently have any Gainsight app connected to your Salesforce org
  • You've ever had a Gainsight integration in the past (even if it's no longer active)
  • This applies to both production environments and sandboxes

The scope of this breach means that even organizations that previously disconnected Gainsight may have had their data exposed during the period when the integration was active.

Immediate Action Steps

Don't wait for more information. Take these steps right now to protect your organization:

1. Identify and Review the Gainsight Integration User

Locate the integration user account that Gainsight used to access your Salesforce environment. Review its permission sets and profile to understand what data it could access.

2. Audit Recent Activity

Examine login history and API call logs for:

  • Unusual access patterns
  • Suspicious timing of requests
  • Large data exports
  • Access from unexpected IP addresses or locations

3. Revoke Access Immediately

Remove Gainsight's access from your Salesforce environment right away. This includes:

  • Disconnecting any active integrations
  • Removing the connected app authorization
  • Deactivating any integration user accounts

4. Rotate Credentials

If any credentials might have been compromised or were shared with the Gainsight integration, rotate them immediately. This includes:

  • API keys
  • Integration user passwords
  • Service account credentials

5. Review All Connected Apps

Don't stop at Gainsight. Use this incident as an opportunity to audit all third-party apps connected to your Salesforce environment. Remove any that are no longer needed or haven't been reviewed recently.

Reco's SaaS-to-SaaS discovery

How Reco Can Help

Our platform enables security teams to instantly search for Gainsight (and any other third-party plugin) across your entire SaaS environment. With Reco, you can:

  • Quickly identify where Gainsight is deployed and review permissions
  • Assess your risk exposure by auditing recent login and API actiivty for unusual patterns or large data exports
  • Review all connected apps and third-party apps in your environment, not just Gainsight
  • Monitor for similar vulnerabilities across your SaaS stack

The Bigger Picture: Why OAuth Governance Matters

This incident serves as a critical reminder that OAuth governance and connected app visibility aren't just nice-to-haves, they're essential security controls.

Revoking tokens stops new unauthorized access, but it doesn't erase what may have already been accessed or exfiltrated. If an attacker gained access through the compromised OAuth credentials, they could have:

  • Downloaded sensitive customer data
  • Exported confidential business information
  • Created backdoor access methods
  • Established persistent access through other means

Key Takeaways

Even if your organization didn't use Gainsight, this breach underscores several critical security principles:

  1. Visibility is paramount: You can't protect what you can't see. Maintain an up-to-date inventory of all connected apps.
  2. Regular audits are essential: Periodically review which third-party applications have access to your critical systems and what permissions they hold.
  3. Assume breach: Plan for compromises by limiting the permissions granted to third-party integrations to only what's absolutely necessary.
  4. Act quickly: When a breach is announced, speed matters. The faster you respond, the less damage can occur.
  5. Don't forget historical access: Just because an integration is no longer active doesn't mean it didn't have access when the breach occurred.

What's Next?

Monitor Salesforce's security advisories and Gainsight's official communications for updates on this incident. Document all actions you take in response to this breach. This information may be crucial for compliance reporting and incident response procedures.

Most importantly, use this as a catalyst to strengthen your overall SaaS security posture. The next breach might not come with an advisory, will you be ready to detect and respond to it?

No items found.

Dr. Tal Shapira

ABOUT THE AUTHOR

Tal is the Cofounder & CTO of Reco. Tal has a Ph.D. from the school of Electrical Engineering at Tel Aviv University, where his research focused on deep learning, computer networks, and cybersecurity. Tal is a graduate of the Talpiot Excellence Program, and a former head of a cybersecurity R&D group within the Israeli Prime Minister's Office. In addition to serving as the CTO, Tal is a member of the AI Controls Security Working Group with the Cloud Security Alliance.

Technical Review by:
Gal Nakash
Technical Review by:
Dr. Tal Shapira

Tal is the Cofounder & CTO of Reco. Tal has a Ph.D. from the school of Electrical Engineering at Tel Aviv University, where his research focused on deep learning, computer networks, and cybersecurity. Tal is a graduate of the Talpiot Excellence Program, and a former head of a cybersecurity R&D group within the Israeli Prime Minister's Office. In addition to serving as the CTO, Tal is a member of the AI Controls Security Working Group with the Cloud Security Alliance.

Ready to Close the SaaS Security Gap?
Chat with us
Table of Contents
Get the Latest SaaS Security Insights
Subscribe to receive updates on the latest cyber security attacks and trends in SaaS Security.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Explore Related Posts

When AI Becomes the Insider Threat: Understanding Risks in Modern SaaS Environments
Tal Shapira
As AI becomes deeply embedded across SaaS platforms, it is increasingly operating with trusted internal access once reserved for employees and service accounts. This article examines how AI can function as an insider threat, why these risks are harder to detect than traditional insider activity, and what signals security teams should watch for. It also explores common governance gaps, real-world scenarios, and practical approaches organizations can take to reduce AI-driven insider risk without limiting legitimate AI use.
The SaaS Attack Surface Just Expanded to Clawdbot
Gal Nakash
Clawdbot, the viral AI assistant that went mainstream in January 2026, exposes a new class of shadow AI risk: autonomous agents with shell access, plaintext credential storage, and over 1,200 misconfigured instances leaking API keys and chat logs. Unlike traditional shadow AI tools, Clawdbot represents a qualitative shift in attack surface—if your employees installed it and connected it to work systems, you now have an unmanaged endpoint with persistent access to sensitive data and zero visibility.
Google AuraInspector: What the New Salesforce Security Tool Means for Your Organization
Nitay Bachrach
Google's Mandiant released AuraInspector, a tool that exploits misconfigured guest user sharing rules in Salesforce Experience Cloud sites through GraphQL endpoints. While the first public tool to use this specific technique, the underlying vulnerabilities have been exploitable since at least 2022 through other tools. Organizations should audit their Salesforce permissions, disable unnecessary guest user API access, and implement continuous monitoring to prevent data exposure.
See more featured resources

Ready for SaaS Security that can keep up?

Request a demo