Article Details
Scrape Timestamp (UTC): 2025-11-27 07:07:05.967
Source: https://thehackernews.com/2025/11/gainsight-expands-impacted-customer.html
Original Article Text
Click to Toggle View
Gainsight Expands Impacted Customer List Following Salesforce Security Alert. Gainsight has disclosed that the recent suspicious activity targeting its applications has affected more customers than previously thought. The company said Salesforce initially provided a list of 3 impacted customers and that it has "expanded to a larger list" as of November 21, 2025. It did not reveal the exact number of customers who were impacted, but its CEO, Chuck Ganapathi, said "we presently know of only a handful of customers who had their data affected." The development comes as Salesforce warned of detected "unusual activity" related to Gainsight-published applications connected to the platform, prompting the company to revoke all access and refresh tokens associated with them. The breach has been claimed by a notorious cybercrime group known as ShinyHunters (aka Bling Libra). A number of other precautionary steps have been enacted to contain the incident. This includes Zendesk, Gong.io, and HubSpot temporarily suspending their Gainsight integrations, and Google disabling OAuth clients with callback URIs like gainsightcloud[.]com. HubSpot, in its own advisory, said it found no evidence to suggest any compromise of its own infrastructure or customers. In an FAQ, Gainsight has also listed the products for which the ability to read and write from Salesforce has been temporarily unavailable - The company, however, emphasized that Staircase is not affected by the incident and that Salesforce removed the Staircase connection out of caution in response to an ongoing investigation. Both Salesforce and Gainsight have published indicators of compromise (IoCs) associated with the breach, with one user agent string, "Salesforce-Multi-Org-Fetcher/1.0", used for unauthorized access, also flagged as previously employed in the Salesloft Drift activity. According to information from Salesforce, reconnaissance efforts against customers with compromised Gainsight access tokens were first recorded from the IP address "3.239.45[.]43" on October 23, 2025, followed by subsequent waves of reconnaissance and unauthorized access starting November 8. To further secure their environments, customers are asked to follow the steps below - "These steps are preventative in nature and are designed to ensure your environment remains secure while the investigation continues," Gainsight said. The development comes against the backdrop of a new ransomware-as-a-service (RaaS) platform called ShinySp1d3r (also spelled Sh1nySp1d3r) that's being developed by Scattered Spider, LAPSUS$, and ShinyHunters (SLSH). Data from ZeroFox has revealed that the cybercriminal alliance has been responsible for at least 51 cyberattacks over the past year. "While the ShinySp1d3r encryptor has some features common to other encryptors, it also boasts features that have never been seen before in the RaaS space," the company said. "These include: Hooking the EtwEventWrite function to prevent Windows Event Viewer logging, terminating processes that keep files open – which would normally prevent encryption – by iterating over processes before killing them, [and] filling free space in a drive by writing random data contained in a .tmp file, likely to overwrite any deleted files." ShinySp1d3r also comes with the ability to search for open network shares and encrypt them, as well as propagate to other devices on the local network through deployViaSCM, deployViaWMI, and attemptGPODeployment. In a report published Wednesday, independent cybersecurity journalist Brian Krebs said the individual responsible for releasing the ransomware is a core SLSH member named "Rey" (aka @ReyXBF), who is also one of the three administrators of the group's Telegram channel. Rey was previously an administrator of BreachForums and the data leak website for HellCat ransomware. Rey, whose identity has been unmasked as Saif Al-Din Khader, told Krebs that ShinySp1d3r is a rehash of HellCat that has been modified with artificial intelligence (AI) tools and that he has been cooperating with law enforcement since at least June 2025. "The emergence of a RaaS program, in conjunction with an EaaS [extortion-as-a-service] offering, makes SLSH a formidable adversary in terms of the wide net they can cast against organizations using multiple methods to monetize their intrusion operations," Palo Alto Networks Unit 42 researcher Matt Brady said. "Additionally, the insider recruitment element adds yet another layer for organizations to defend against."
Daily Brief Summary
Gainsight has expanded the list of customers impacted by a security incident linked to its Salesforce applications, following initial reports of suspicious activity.
The breach has been associated with the cybercrime group ShinyHunters, prompting Gainsight to revoke access and refresh tokens for affected applications.
Companies like Zendesk, Gong.io, and HubSpot have temporarily suspended Gainsight integrations, while Google has disabled certain OAuth clients to mitigate risks.
Salesforce and Gainsight have released indicators of compromise, including specific user agent strings and IP addresses, to aid in identifying unauthorized access.
The incident coincides with the emergence of ShinySp1d3r, a new ransomware-as-a-service platform developed by ShinyHunters and associated groups.
ShinySp1d3r features advanced capabilities, such as disabling Windows Event Viewer logging and encrypting open network shares, posing significant threats to organizations.
Gainsight and affected partners are actively investigating the breach, while urging customers to implement recommended security measures to protect their environments.