Gainsight Breach Wider Than Thought, Linked to ShinyHunters Ransomware

  • Gainsight reported that more customers were affected by the recent suspicious activity on its applications than initially identified.
  • Salesforce revoked all access and refresh tokens linked to Gainsight apps after detecting unusual activity.
  • The cybercrime group ShinyHunters (aka Bling Libra) claimed responsibility for the breach.
  • A new Ransomware-as-a-service platform named ShinySp1d3r is linked to the same actors involved in the Gainsight incident.
  • Customers are advised to follow security measures including rotating keys, resetting passwords, and reauthorizing connected apps.

Gainsight disclosed on November 27, 2025, that the suspicious activity affecting its applications impacted more customers than first reported. Initially, Salesforce listed three affected customers but has since expanded the list, though the exact number remains undisclosed. CEO Chuck Ganapathi stated that only a handful of customers had their data affected, according to the company’s update.

- Advertisement -

Salesforce detected unusual activity involving Gainsight-published applications connected to its platform. As a result, all access and refresh tokens were revoked. The breach was claimed by the cybercrime group ShinyHunters (also known as Bling Libra). Precautionary measures caused companies such as Zendesk, Gong.io, and HubSpot to suspend their Gainsight integrations temporarily, while Google disabled OAuth clients with callback URLs containing gainsightcloud[.]com. HubSpot reported no compromise to its systems or customers, detailed in their security advisory.

According to an FAQ released by Gainsight, the following products had their Salesforce read/write capabilities temporarily disabled: Customer Success (CS), Community (CC), Northpass – Customer Education (CE), Skilljar (SJ), and Staircase (ST). Gainsight clarified that Staircase was not affected, and Salesforce removed its connection out of caution during the ongoing investigation.

Both Salesforce and Gainsight have published indicators of compromise (IoCs), including the user agent string “Salesforce-Multi-Org-Fetcher/1.0,” linked to unauthorized access. Salesforce’s logs show reconnaissance efforts beginning from IP address “3.239.45[.]43” on October 23, 2025, with further unauthorized access waves starting November 8, as described in Salesforce’s security details.

Customers are recommended to secure their environments by rotating S3 bucket access keys and other connector credentials (e.g., BigQuery, Zuora, Snowflake), logging into Gainsight NXT directly rather than via Salesforce until integration is restored, resetting non-SSO user passwords, and reauthorizing all connected applications and integrations. Gainsight noted these steps are preventative while investigations continue.

- Advertisement -

The incident occurs amid the emergence of a ransomware-as-a-service (RaaS) platform called ShinySp1d3r, developed by the alliance of Scattered Spider, LAPSUS$, and ShinyHunters (SLSH). Data from ZeroFox indicates this group has conducted over 50 cyberattacks in the past year. ShinySp1d3r includes advanced functions like disabling Windows Event Viewer logging, terminating processes that block encryption, and overwriting deleted files with random data.

The ransomware can also search and encrypt open network shares and spread to other devices locally via deployViaSCM, deployViaWMI, and attemptGPODeployment techniques.

An independent Cybersecurity journalist, Brian Krebs, identified the ransomware’s developer as “Rey,” a core SLSH figure, who revealed that ShinySp1d3r is based on the HellCat ransomware, enhanced with Artificial Intelligence tools. Rey, whose real name is Saif Al-Din Khader, has reportedly cooperated with law enforcement since mid-2025, as reported in Krebs’s detailed article.

Palo Alto Networks Unit 42 researcher Matt Brady commented that the combination of ransomware and extortion-as-a-service offerings make SLSH a significant threat, with insider recruitment adding further risk layers, as outlined in Unit 42’s report.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Robinhood: Crypto Investors Diversify Beyond Bitcoin, Ethereum

Retail investors are using the market downturn as a chance to diversify beyond Bitcoin...

Trump Raises Global Tariffs to 15% After Court Loss

President Trump raised a proposed global tariff from 10% to 15%, effective immediately, following...

Ethereum’s FOCIL Aims to Force Censorship-Resistant Transactions

The FOCIL proposal is the headlining feature of Ethereum's upcoming Hegota upgrade, scheduled for...

Trump’s New Tariffs Draw Bipartisan Criticism as ‘Tax’

President Trump announced a new 10% global tariff in response to the Supreme Court...

XRP, SOL ETF Inflows Defy Bitcoin, Ethereum Outflows

Spot ETFs for XRP and Solana (SOL) recorded net inflows of $4.05 million and...

Must Read

7 Best NFT Marketplaces for Every Need

Open Sea | Pianity | Foundation | Magic Eden | SuperRare | Rarible | Theta Drop | Other Platforms | About NFTs | FAQ...
🔥 #AD Get 20% OFF any new 12 month hosting plan from Hostinger. Click here!