Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Iran’s Infy APT resurfaces with new malware activity after years of silence

‘It felt so wrong’: Colin Angle on iRobot, the FTC, and the Amazon deal that never was

New York Governor Kathy Hochul signs RAISE Act regulating AI safety

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Gainsight expands list of affected customers following Salesforce security alert
Identity

Gainsight expands list of affected customers following Salesforce security alert

userBy userNovember 27, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

November 27, 2025Ravi LakshmananRansomware/Cloud Security

Gainsight has revealed that recent suspicious activity targeting its applications is impacting more customers than previously thought.

The company said Salesforce initially provided a list of three affected customers, but as of November 21, 2025, it had “expanded to a larger list.” The company did not reveal the exact number of customers affected, but CEO Chuck Ganapati said, “At this time, we are only aware of a few customers whose data has been affected.”

The development comes after Salesforce warned that it had detected “anomalous activity” related to Gainsight published applications connected to the platform, prompting the company to revoke all access and refresh tokens associated with them. The breach is claimed by a notorious cybercrime group known as ShinyHunters (also known as Bling Libra).

Many other precautionary measures have been taken to contain this incident. This includes Zendesk, Gong.io, and HubSpot temporarily suspending their Gainsight integrations, and Google disabling OAuth clients that use callback URIs, such as Gainsightcloud.[.]Com. In its own advisory, HubSpot said it found no evidence to suggest a compromise of its infrastructure or customers.

DFIR retainer service

In its FAQ, Gainsight also listed products for which the ability to read and write from Salesforce is temporarily unavailable.

Customer Success (CS) Community (CC) Northpath – Customer Education (CE) Skillger (SJ) Stairs (ST)

However, the company emphasized that Staircase is not affected by this incident and that Salesforce has prudently removed the Staircase connection in response to the ongoing investigation.

Both Salesforce and Gainsight have published indicators of compromise (IoCs) related to this breach, including one user agent string used for unauthorized access, “Salesforce-Multi-Org-Fetcher/1.0,” which was also flagged as previously used in Salesloft Drift activity.

According to information from Salesforce, reconnaissance activity against customers with compromised Gainsight access tokens was first recorded from IP address 3.239.45.[.]43” occurred on October 23, 2025, and reconnaissance and unauthorized access began on November 8.

To make the environment even safer, customers are asked to follow the steps below.

Rotate the S3 bucket access keys used to connect with Gainsight and other connectors such as BigQuery, Zuora, and Snowflake. Log in directly to Gainsight NXT instead of through Salesforce until the integration is fully restored. Reset NXT user passwords for users who do not authenticate via SSO. Reauthenticate any connected applications or integrations that rely on user credentials or tokens.

“These measures are precautionary in nature and are designed to keep the environment safe while the investigation continues,” Gainsight said.

The development comes on the back of a new ransomware-as-a-service (RaaS) platform called ShinySp1d3r (also spelled Sh1nySp1d3r), which is being developed by Scattered Spider, LAPSUS$, and ShinyHunters (SLSH). Data from ZeroFox revealed that the Cybercrime Alliance was involved in at least 51 cyberattacks over the past year.

“While the ShinySp1d3r encryptor has some features in common with other encryptors, it also has features never seen before in the RaaS space,” the company said.

“These include hooking the EtwEventWrite function to prevent Windows Event Viewer logging, terminating processes that leave files open (which typically prevents encryption) by iterating through the process before killing it, [and] Filling free space on the drive by writing random data contained in .tmp files can overwrite deleted files. ”

ShinySp1d3r has the ability to search and encrypt open network shares, as well as propagate to other devices on the local network through deployViaSCM, deployViaWMI, and TryGPODeployment.

CIS build kit

In a report published Wednesday, independent cybersecurity journalist Brian Krebs said the ransomware was published by a core member of SLSH named “Rey” (also known as @ReyXBF) and one of the three administrators of the group’s Telegram channel. Rey previously managed the BreachForums and HellCat ransomware data breach websites.

Ray, whose identity was revealed as Saif al-Din Kader, told Krebs that ShinySp1d3r was a rehash of HellCat modified with artificial intelligence (AI) tools and that he had been cooperating with law enforcement since at least June 2025.

“Emergence of RaaS programs linked to EaaS” [extortion-as-a-service] “SLSH is a formidable adversary in that it casts a wide net against organizations that use multiple methods to monetize intrusion operations,” said Palo Alto Networks Unit 42 researcher Matt Brady. “Additionally, the element of insider recruitment adds an additional layer of defense for organizations.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleThe future is explained in Palo Alto
Next Article NASA telescope may reveal first direct evidence of dark matter
user
  • Website

Related Posts

Iran’s Infy APT resurfaces with new malware activity after years of silence

December 21, 2025

US Department of Justice charges $54 for ATM jackpotting scheme using Ploutus malware

December 20, 2025

Russian-linked hackers use Microsoft 365 device code phishing to take over accounts

December 19, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Iran’s Infy APT resurfaces with new malware activity after years of silence

‘It felt so wrong’: Colin Angle on iRobot, the FTC, and the Amazon deal that never was

New York Governor Kathy Hochul signs RAISE Act regulating AI safety

US Department of Justice charges $54 for ATM jackpotting scheme using Ploutus malware

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.