Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026

SmarterMail Fixes Critical Unauthenticated RCE Flaw with CVSS 9.3 Score

February 6, 2026

Here’s what you should know

February 6, 2026
Facebook X (Twitter) Instagram
Saturday, February 7
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Gainsight Cyber-Attack Affect More Salesforce Customers
News

Gainsight Cyber-Attack Affect More Salesforce Customers

Team-CWDBy Team-CWDNovember 27, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


The cyber-attack targeting Gainsight has affected more Salesforce customers than initially expected.

In a customer FAQ, first posted on November 20 and regularly updated since, the customer support platform provider said Salesforce initially provided a list of three customers impacted by the breach.

Gainsight later found that the number “has been expanded to a larger list.”

The firm has not confirmed how many customers this list now contains. However, Gainsight told Infosecurity that the company “promptly notified the handful of affected customers,” suggesting that the number of affected customers remains limited.

Those affected were also notified of the incident by Salesforce on November 21.

Precautionary Measures Affecting Gainsight Applications

In the FAQ, Gainsight listed products for which the ability to read and write from Salesforce is temporarily unavailable due to precautionary measures. These include:

  • Customer Success (CS)
  • Community (CC)
  • Northpass – Customer Education (CE)
  • Skilljar (SJ)
  • Staircase (ST) 

Gainsight emphasized that Salesfroce removed the Staircase connection as a precautionary measure only and that there was no evidence that the application was affected by the breach.

“Staircase operates on a completely isolated and separate infrastructure from other Gainsight products, with no shared systems or data paths,” the company wrote.

Three additional companies, Gong.io, Zendesk and HubSpot, have also disabled their connectors to Gainsight applications “out of an abundance of caution.”

In a separate November 24 update, HubSpot stated that there is no evidence the company or its customers were affected by the attacks. However, as a precaution, its Gainsight integration will remain disabled until the investigation concludes.

Gainsight shares regular updates on its Gainsight Status site and host regular customer town halls, called Office Hours.

“We also have created solutions to help customers manage their Gainsight Customer Success instances while the Salesforce connected app remains offline,” the Gainsight spokesperson told Infosecurity.

Forensic Investigation Delivers Early Results

In a blog post addressing the incident, published on November 25, Gainsight’s CEO, Chuck Ganapathi, confirmed that Gainsight’s security, support, product, and customer success teams are working with Salesforce to investigate the incident.

Additionally, Gainsight has engaged Mandiant, Google Cloud’s incident response branch, to conduct an independent forensic investigation.

According to Salesforce’s indicators of compromise (IOCs), shared to customers and the public via the Gainsight FAQ, the first unauthorized access was achieved on November 8 via an AT&T IP address, alleged to conduct reconnaissance.

Salesforce then identified about twenty suspicious intrusions between November 16 and 23, which used a range of tools, including or and commercial VPN services (e.g. Mullvad, Surfshark).

Gainsight advised customers to restrict the identified IP addresses at the profile level.

The threat actors also leveraged Salesforce-Multi-Org-Fetcher/1.0, a technique observed in the Salesloft Drif attack.

Gainsight said it has taken several steps to harden its environment, including rotating multifactor credentials used to access VPN and critical systems. 

Customers are being asked to:

  • Rotate their S3 keys as a precautionary measure
  • Log in to Gainsight NXT directly, rather than through Salesforce until the Salesforce Connected App functionality is fully restored
  • Reset NXT user passwords for any users who do not authenticate via single sign-on (SSO)
  • Re-authorize any connected applications or integrations that rely on user credentials or tokens

Gainsight also recommended users implement preventative actions outlined by Google Threat Intelligence Group (GTIG) in September 2025 to mitigate the threat of the Shiny Hunter-Scattered Spider-Lapssus$ collective.

Photo credits: Gainsight / JHVEPhoto / Shutterstock

Read more: Google Among Victims in Ongoing Salesforce Data Theft Campaign



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleSeven npm Packages Use Adspect Cloaking to Trick Victims Into Crypto Scam Pages
Next Article Scattered Lapsus$ Hunters Take Aim At Zendesk Users
Team-CWD
  • Website

Related Posts

News

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026
News

SmarterMail Fixes Critical Unauthenticated RCE Flaw with CVSS 9.3 Score

February 6, 2026
News

Chinese-Made Malware Kit Targets Chinese-Based Edge Devices

February 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

Beware of threats lurking in booby-trapped PDF files

October 7, 2025

Why LinkedIn is a hunting ground for threat actors – and how to protect yourself

January 16, 2026

What’s at stake if your employees post too much online

December 1, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.