Company Details
gainsight
1,099
158,852
5112
gainsight.com
0
GAI_2637636
In-progress


Gainsight Company CyberSecurity Posture
gainsight.comAt Gainsight, our mission is to be living proof you can win in business while being human first. Gainsight, the world’s leading Customer Success platform, helps businesses drive efficient growth by unifying the post-sales customer journey. Our innovative suite of solutions—including customer success, customer education, product experience, community management, and conversational AI insights—are trusted by companies of all sizes and industries, including nearly 200 publicly traded organizations. With Gainsight, businesses can leverage AI-driven insights from real-time customer interactions to enhance engagement, improve retention, and drive expansion. Our platform makes it easier for customer success, product, and community teams to scale efficiently and gain a holistic view of their customers, driving product adoption and building thriving customer communities. Gainsight joined the Vista Equity Partners portfolio in 2020. In 2021, we won their Excellence in Engineering award in recognition for our product and engineering advancements. A remote-friendly company, we have offices in the US, UK, Netherlands, Israel, and India. Gainsight received the top spot in Glassdoor's Best Places to Work for 2023. It has also been named as one of the top 100 private cloud companies in the world by Forbes, one of the fastest-growing private companies in America by Inc. Magazine, and one of 20 Great Workplaces in Tech by Fortune Magazine.
Company Details
gainsight
1,099
158,852
5112
gainsight.com
0
GAI_2637636
In-progress
Between 0 and 549

Gainsight Global Score (TPRM)XXXX

Description: The Salesforce data breach involved the ShinyHunters (UNC6240) hacking group, which exploited stolen OAuth tokens from Salesloft’s GitHub account to infiltrate Drift’s Salesforce integration and subsequently compromise Gainsight, a customer process management platform. The attackers gained unauthorized access to over 200 Salesforce instances, exfiltrating enterprise customer data through third-party service integrations (including HubSpot and Zendesk). While Salesforce revoked access keys and removed affected apps from the AppExchange, the breach exposed sensitive customer data, though the full scope of the leak remains undisclosed. The attack leveraged supply-chain vulnerabilities rather than a direct Salesforce platform flaw. ShinyHunters claimed delayed detection (1–2 weeks post-intrusion) and sought internal accomplices for further exploitation. Salesforce refused ransom demands, but the incident highlights risks in third-party integrations and credential-based attacks.
Description: The incident at Gainsight stemmed from a downstream effect of the August 2025 Salesloft breach, where the Scattered Lapsus$ Hunters group stole OAuth tokens tied to Salesloft’s Drift AI chat integration with Salesforce. These tokens granted unauthorized API access to 760 Salesforce instances, leading to the exfiltration of 1.5 billion records, including passwords, AWS keys, and Snowflake tokens.A subgroup, ShinyHunters, exploited the stolen credentials to breach Gainsight’s systems, extracting customer contact data (names, business emails, phone numbers, regional details), licensing information, and support case contents. Salesforce responded by revoking all active Gainsight-associated tokens and temporarily removing its apps from the AppExchange to mitigate further exposure. While Salesforce clarified that its platform itself was not vulnerable, the breach originated from Gainsight’s external app connections, compromising sensitive corporate and customer data across hundreds of organizations.
Description: Gainsight, a customer management software firm, experienced a security breach that compromised a limited number of its clients' data. The incident was confirmed by CEO Chuck Ganapathi and involved the exposure of Salesforce customer tokens, which are critical for authentication and access control within Salesforce ecosystems. While the breach did not result in a large-scale data leak, the compromise of these tokens poses risks such as unauthorized access to customer accounts, potential phishing attacks, or further exploitation of linked systems. The breach highlights vulnerabilities in third-party integrations, particularly those tied to major platforms like Salesforce. Although the impact was contained to a subset of clients, the exposure of authentication tokens could lead to reputational damage for Gainsight, erosion of customer trust, and potential financial repercussions if affected clients face downstream security incidents. The company has not disclosed whether the breach was due to a targeted cyber attack, a vulnerability exploitation, or an internal misconfiguration, but the involvement of Salesforce tokens suggests a sophisticated intrusion method.
Description: Gainsight, a customer success management software firm, experienced a security breach that compromised a limited number of its clients' data. The incident was linked to the exposure of Salesforce customer tokens, which are critical for authentication and access within the Salesforce ecosystem. CEO Chuck Ganapathi confirmed that while the breach impacted Gainsight’s systems, only a subset of clients had their data compromised. The nature of the breach suggests unauthorized access to sensitive customer-related credentials, potentially enabling further exploitation if misused. Although the exact scope of the stolen data remains undisclosed, the involvement of Salesforce tokens indicates a risk of downstream attacks, such as unauthorized access to client accounts or systems integrated with Gainsight. The breach underscores vulnerabilities in third-party SaaS platforms and the cascading risks posed by credential-based attacks in enterprise software supply chains.


No incidents recorded for Gainsight in 2026.
No incidents recorded for Gainsight in 2026.
No incidents recorded for Gainsight in 2026.
Gainsight cyber incidents detection timeline including parent company and subsidiaries

At Gainsight, our mission is to be living proof you can win in business while being human first. Gainsight, the world’s leading Customer Success platform, helps businesses drive efficient growth by unifying the post-sales customer journey. Our innovative suite of solutions—including customer success, customer education, product experience, community management, and conversational AI insights—are trusted by companies of all sizes and industries, including nearly 200 publicly traded organizations. With Gainsight, businesses can leverage AI-driven insights from real-time customer interactions to enhance engagement, improve retention, and drive expansion. Our platform makes it easier for customer success, product, and community teams to scale efficiently and gain a holistic view of their customers, driving product adoption and building thriving customer communities. Gainsight joined the Vista Equity Partners portfolio in 2020. In 2021, we won their Excellence in Engineering award in recognition for our product and engineering advancements. A remote-friendly company, we have offices in the US, UK, Netherlands, Israel, and India. Gainsight received the top spot in Glassdoor's Best Places to Work for 2023. It has also been named as one of the top 100 private cloud companies in the world by Forbes, one of the fastest-growing private companies in America by Inc. Magazine, and one of 20 Great Workplaces in Tech by Fortune Magazine.

Baidu is a leading AI company with strong Internet foundation, driven by our mission to “make the complicated world simpler through technology”. Founded in 2000 as a search engine platform, we were an early adopter of artificial intelligence in 2010. Since then, we have established a full AI stack,

Trimble is a global technology company that connects the physical and digital worlds, transforming the ways work gets done. With relentless innovation in precise positioning, modeling and data analytics, Trimble enables essential industries including construction, geospatial and transportation. Whet
Upwork is the world’s work marketplace that connects businesses with independent talent from across the globe. We serve everyone from one-person startups to large, Fortune 100 enterprises with a powerful, trust-driven platform that enables companies and talent to work together in new ways that unloc

At DoorDash, our mission to empower local economies shapes how our team members move quickly and always learn and reiterate to support merchants, Dashers and the communities we serve. We are a technology and logistics company that started with door-to-door delivery, and we are looking for team membe
Pitney Bowes is a technology-driven company that provides digital shipping solutions, mailing innovation, and financial services to clients around the world – including more than 90 percent of the Fortune 500. Small businesses to large enterprises, and government entities rely on Pitney Bowes to red

About KPIT KPIT is reimagining the future of mobility, forging ahead with group companies and partners to shape a world that is cleaner, smarter, and safer. With over 25 years of specialized expertise in Mobility, KPIT is accelerating the transformation towards Software and AI-Defined Vehicles thr

[24]7.ai™ customer engagement solutions use conversational artificial intelligence to understand customer intent, enabling companies to create personalized, predictive, and effortless customer experiences across all channels; attract and retain customers; boost agent productivity and satisfaction; a

Thomson Reuters (TSX/NDAQ: TRI) informs the way forward by bringing together the trusted content and technology that people and organizations need to make the right decisions. We serve professionals across legal, tax, accounting, compliance, government, and media. Our products combine highly special

NiCE is transforming the world with AI that puts people first. Our purpose-built AI-powered platforms automate engagements into proactive, safe, intelligent actions, empowering individuals and organizations to innovate and act, from interaction to resolution. Trusted by organizations throughout 150
.png)
The past year has seen an unprecedented number of cyber-attacks targeting large enterprises and globally recognized brands.
Salesforce-Gainsight breach impacts over 200 firms, London councils targeted and a major vendor's cyber incident exposes U.S. banks.
Salesforce has confirmed another third-party breach affecting Gainsight applications integrated with customer instances, enabling attackers...
Here's an overview of some of last week's most interesting news, articles, interviews and videos: Quantum encryption is pushing satellite...
Gainsight, the leading customer success platform, has confirmed that a security incident involving its Salesforce integration compromised...
Salesforce (CRM) Stock Before the Bell: AI Bets, Informatica Deal and Cybersecurity Risks – What to Watch on November 28, 2025 - TechStock².
Gainsight widens its breach fallout as ShinyHunters push an AI-tuned ShinySp1d3r ransomware alliance.
Gainsight CEO Chuck Ganapathi assured customers in a blog post published Tuesday that it was actively working with Salesforce and third-party...
Gainsight CEO Chuck Ganapathi downplayed the victim count related to his company's recent breach, saying he's only aware of "a handful of...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Gainsight is https://www.gainsight.com.
According to Rankiteo, Gainsight’s AI-generated cybersecurity score is 455, reflecting their Critical security posture.
According to Rankiteo, Gainsight currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Gainsight has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, Gainsight is not certified under SOC 2 Type 1.
According to Rankiteo, Gainsight does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Gainsight is not listed as GDPR compliant.
According to Rankiteo, Gainsight does not currently maintain PCI DSS compliance.
According to Rankiteo, Gainsight is not compliant with HIPAA regulations.
According to Rankiteo,Gainsight is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Gainsight operates primarily in the Software Development industry.
Gainsight employs approximately 1,099 people worldwide.
Gainsight presently has no subsidiaries across any sectors.
Gainsight’s official LinkedIn profile has approximately 158,852 followers.
Gainsight is classified under the NAICS code 5112, which corresponds to Software Publishers.
No, Gainsight does not have a profile on Crunchbase.
Yes, Gainsight maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/gainsight.
As of January 24, 2026, Rankiteo reports that Gainsight has experienced 4 cybersecurity incidents.
Gainsight has an estimated 28,180 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach.
Detection and Response: The company detects and responds to cybersecurity incidents through an containment measures with token revocation (oauth/refresh tokens), containment measures with appexchange removal, and remediation measures with customer notifications, remediation measures with investigation, and communication strategy with direct customer notifications, communication strategy with public statement, and and third party assistance with google mandiant (threat intelligence), and containment measures with revoked oauth tokens, containment measures with removed gainsight apps from appexchange, containment measures with limited hubspot/zendesk connector functionality, and remediation measures with internal reviews by affected companies, remediation measures with token rotation, and communication strategy with public disclosure via media (redazione rhc), communication strategy with no direct comment from salesforce on specifics, and enhanced monitoring with google threat intelligence group analysis, and public disclosure by with ceo chuck ganapathi, and public disclosure by with ceo chuck ganapathi..
Title: Gainsight Unauthorized Salesforce Data Access via Stolen OAuth Tokens
Description: Gainsight applications enabled unauthorized access to Salesforce customer data due to stolen OAuth tokens linked to the August 2025 Salesloft breach. The threat actor group ShinyHunters exploited these tokens to exfiltrate Gainsight customer contact and licensing data. Salesforce revoked all active and refresh tokens associated with Gainsight-published apps and temporarily removed them from the AppExchange. The incident is a downstream effect of the Salesloft Drift breach, where 1.5 billion records (including passwords, AWS keys, and Snowflake tokens) were exfiltrated from 760 Salesforce instances by the Scattered Lapsus$ Hunters group.
Type: Data Breach
Attack Vector: Stolen OAuth TokensAPI AbuseSupply Chain Attack
Vulnerability Exploited: Weak or Stolen OAuth Token Management (External App Connection to Salesforce)
Threat Actor: ShinyHuntersScattered Lapsus$ Hunters
Motivation: Data TheftFinancial Gain (Potential Dark Web Sale)Reputation Damage
Title: Salesforce Data Breach: ShinyHunters Hack via Gainsight Integration
Description: The ShinyHunters group announced its involvement in a data breach affecting the Salesforce ecosystem, particularly through the compromise of Gainsight and Salesloft integrations. Attackers leveraged stolen OAuth tokens from Salesloft’s GitHub account to access enterprise customer data across multiple CRM-related services, including Gainsight, HubSpot, and Zendesk. Over 200 Salesforce instances were reportedly affected. Salesforce revoked access keys and removed Gainsight apps from the AppExchange as a response. The breach is linked to the UNC6240 (ShinyHunters) threat group, which claims to have evaded detection for weeks and is seeking internal accomplices.
Date Detected: 2025-11-24
Date Publicly Disclosed: 2025-11-24
Type: Data Breach
Attack Vector: Stolen OAuth TokensThird-Party Integration Exploitation (Drift, Gainsight)GitHub Account Compromise
Vulnerability Exploited: Weak OAuth Token SecurityThird-Party Application Misconfiguration
Threat Actor: ShinyHuntersUNC6240
Motivation: Data TheftExtortionFinancial GainEspionage
Title: Gainsight Data Breach Impacting Salesforce Customer Tokens
Description: A limited number of Gainsight clients had their data compromised following a breach of the customer management software firm's systems, which impacted Salesforce customer tokens.
Date Publicly Disclosed: 2025-11-26
Type: Data Breach
Title: Gainsight Data Breach Impacting Salesforce Customer Tokens
Description: A limited number of Gainsight clients had their data compromised following a breach of the customer management software firm's systems, which impacted Salesforce customer tokens.
Date Publicly Disclosed: 2025-11-26
Type: Data Breach
Common Attack Types: The most common types of attacks the company has faced is Breach.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Stolen OAuth Tokens (Salesloft Drift Integration) and Compromised Salesloft GitHub AccountStolen OAuth Tokens for Drift Integration.

Systems Affected: Salesforce Instances (760 in Salesloft breach)Gainsight-published Applications
Operational Impact: Token RevocationAppExchange RemovalCustomer Notifications
Brand Reputation Impact: Loss of TrustNegative Publicity
Identity Theft Risk: ['Business Contact Details Exposed']

Systems Affected: Salesforce Instances (200+)GainsightSalesloftDriftHubSpotZendesk
Downtime: ['Temporary Disruption of Gainsight Apps on Salesforce AppExchange', 'Limited Functionality of HubSpot/Zendesk Connectors']
Operational Impact: Revocation of Access KeysRemoval of Gainsight Apps from AppExchangeInternal Reviews by Affected Companies
Brand Reputation Impact: Potential Erosion of Trust in Salesforce EcosystemNegative Publicity for Gainsight, HubSpot, Zendesk
Identity Theft Risk: ['High (Enterprise Customer Data Exposed)']

Systems Affected: Salesforce customer tokens

Systems Affected: Salesforce customer tokens
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Business Contact Details (Names, Emails, Phone Numbers), Licensing Information, Support Case Contents, Regional/Location Details, Passwords (Salesloft Breach), Aws Keys (Salesloft Breach), Snowflake Tokens (Salesloft Breach), , Enterprise Customer Data, Crm Records, Integration Logs, , Salesforce Customer Tokens, , Salesforce Customer Tokens and .

Entity Name: Gainsight
Entity Type: Customer Success Platform Provider
Industry: SaaS/Enterprise Software
Customers Affected: Hundreds (Potential)

Entity Name: Salesforce Customers (via Gainsight Apps)
Entity Type: B2B Enterprises, SaaS Users
Industry: Multiple (Salesforce Ecosystem)
Location: Global

Entity Name: Salesloft (Upstream Breach)
Entity Type: Sales Engagement Platform
Industry: SaaS
Customers Affected: 760 Salesforce Instances (1.5B Records Exfiltrated)

Entity Name: Salesforce
Entity Type: CRM Platform
Industry: Technology
Location: Global (HQ: San Francisco, USA)
Size: Enterprise
Customers Affected: 200+ instances

Entity Name: Gainsight
Entity Type: Customer Success Platform
Industry: SaaS/Technology
Location: Global (HQ: San Francisco, USA)
Size: Enterprise

Entity Name: Salesloft
Entity Type: Sales Engagement Platform
Industry: SaaS/Technology
Location: Global (HQ: Atlanta, USA)
Size: Enterprise

Entity Name: Drift
Entity Type: Conversational Marketing Platform
Industry: SaaS/Technology
Location: Global (HQ: Boston, USA)
Size: Enterprise

Entity Name: HubSpot
Entity Type: CRM & Marketing Platform
Industry: SaaS/Technology
Location: Global (HQ: Cambridge, USA)
Size: Enterprise

Entity Name: Zendesk
Entity Type: Customer Service Platform
Industry: SaaS/Technology
Location: Global (HQ: San Francisco, USA)
Size: Enterprise

Entity Name: Gainsight
Entity Type: Customer Management Software Firm
Industry: Technology / SaaS
Customers Affected: Limited number of clients

Entity Name: Salesforce (indirectly impacted via tokens)
Entity Type: CRM Platform
Industry: Technology / Cloud Services

Entity Name: Gainsight
Entity Type: Customer Management Software Firm
Industry: Technology / SaaS
Customers Affected: Limited number of clients

Entity Name: Salesforce (indirectly impacted via tokens)
Entity Type: CRM Platform
Industry: Technology / Cloud Services

Incident Response Plan Activated: True
Containment Measures: Token Revocation (OAuth/Refresh Tokens)AppExchange Removal
Remediation Measures: Customer NotificationsInvestigation
Communication Strategy: Direct Customer NotificationsPublic Statement

Incident Response Plan Activated: True
Third Party Assistance: Google Mandiant (Threat Intelligence).
Containment Measures: Revoked OAuth TokensRemoved Gainsight Apps from AppExchangeLimited HubSpot/Zendesk Connector Functionality
Remediation Measures: Internal Reviews by Affected CompaniesToken Rotation
Communication Strategy: Public Disclosure via Media (Redazione RHC)No Direct Comment from Salesforce on Specifics
Enhanced Monitoring: Google Threat Intelligence Group Analysis

Communication Strategy: Public Disclosure By: CEO Chuck Ganapathi.

Communication Strategy: Public Disclosure By: CEO Chuck Ganapathi.
Third-Party Assistance: The company involves third-party assistance in incident response through Google Mandiant (Threat Intelligence), .

Type of Data Compromised: Business contact details (names, emails, phone numbers), Licensing information, Support case contents, Regional/location details, Passwords (salesloft breach), Aws keys (salesloft breach), Snowflake tokens (salesloft breach)
Number of Records Exposed: 1.5 Billion (Salesloft Breach), Undisclosed (Gainsight Breach)
Sensitivity of Data: Moderate to High (Business PII, Credentials, API Keys)
Personally Identifiable Information: Business PII (Names, Emails, Phone Numbers)

Type of Data Compromised: Enterprise customer data, Crm records, Integration logs
Sensitivity of Data: High (Potential PII, Business-Critical CRM Data)
Personally Identifiable Information: Likely (Enterprise Customer Data)

Type of Data Compromised: Salesforce customer tokens
Sensitivity of Data: High (authentication tokens)

Type of Data Compromised: Salesforce customer tokens
Sensitivity of Data: High (authentication tokens)
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Customer Notifications, Investigation, , Internal Reviews by Affected Companies, Token Rotation, .
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by token revocation (oauth/refresh tokens), appexchange removal, , revoked oauth tokens, removed gainsight apps from appexchange, limited hubspot/zendesk connector functionality and .

Data Exfiltration: True

Data Exfiltration: True

Lessons Learned: OAuth token security requires stricter rotation and monitoring., Third-party integrations introduce significant supply chain risks., Delayed detection (1–2 weeks) highlights gaps in anomaly monitoring., Collaboration with threat intelligence firms (e.g., Mandiant) is critical for attribution.

Recommendations: Implement multi-layered authentication for third-party OAuth tokens., Conduct regular audits of integration partners’ security postures., Enhance real-time monitoring for unauthorized access patterns., Establish clear incident response protocols for supply chain breaches., Publicly disclose breaches transparently to maintain customer trust.Implement multi-layered authentication for third-party OAuth tokens., Conduct regular audits of integration partners’ security postures., Enhance real-time monitoring for unauthorized access patterns., Establish clear incident response protocols for supply chain breaches., Publicly disclose breaches transparently to maintain customer trust.Implement multi-layered authentication for third-party OAuth tokens., Conduct regular audits of integration partners’ security postures., Enhance real-time monitoring for unauthorized access patterns., Establish clear incident response protocols for supply chain breaches., Publicly disclose breaches transparently to maintain customer trust.Implement multi-layered authentication for third-party OAuth tokens., Conduct regular audits of integration partners’ security postures., Enhance real-time monitoring for unauthorized access patterns., Establish clear incident response protocols for supply chain breaches., Publicly disclose breaches transparently to maintain customer trust.Implement multi-layered authentication for third-party OAuth tokens., Conduct regular audits of integration partners’ security postures., Enhance real-time monitoring for unauthorized access patterns., Establish clear incident response protocols for supply chain breaches., Publicly disclose breaches transparently to maintain customer trust.
Key Lessons Learned: The key lessons learned from past incidents are OAuth token security requires stricter rotation and monitoring.,Third-party integrations introduce significant supply chain risks.,Delayed detection (1–2 weeks) highlights gaps in anomaly monitoring.,Collaboration with threat intelligence firms (e.g., Mandiant) is critical for attribution.

Source: TechRadar

Source: BleepingComputer

Source: Salesforce Public Announcement
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: TechRadar, and Source: BleepingComputer, and Source: Salesforce Public Announcement, and Source: Redazione RHCDate Accessed: 2025-11-24, and Source: CyberScoopDate Accessed: 2025-11-26, and Source: CyberScoopDate Accessed: 2025-11-26.

Investigation Status: Ongoing (Customer Notifications in Progress)

Investigation Status: Ongoing (Led by Google Mandiant)
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Direct Customer Notifications, Public Statement, Public Disclosure Via Media (Redazione Rhc) and No Direct Comment From Salesforce On Specifics...

Stakeholder Advisories: Direct Notifications To Affected Customers.
Customer Advisories: Revoked TokensApp Removal from AppExchange

Stakeholder Advisories: Salesforce Revoked Access Keys, Gainsight/Hubspot/Zendesk Limited Connector Functionality.
Customer Advisories: No Direct Communication Mentioned

Customer Advisories: Disclosed By: CEO Chuck Ganapathi, Scope: Limited number of clients affected.
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Direct Notifications To Affected Customers, Revoked Tokens, App Removal From Appexchange, , Salesforce Revoked Access Keys, Gainsight/Hubspot/Zendesk Limited Connector Functionality, No Direct Communication Mentioned, , disclosed_by: CEO Chuck Ganapathi, scope: Limited number of clients affected and .

Entry Point: Stolen OAuth Tokens (Salesloft Drift Integration)
High Value Targets: Salesforce Customer Data, Gainsight Licensing Data,
Data Sold on Dark Web: Salesforce Customer Data, Gainsight Licensing Data,

Entry Point: Compromised Salesloft Github Account, Stolen Oauth Tokens For Drift Integration,
Reconnaissance Period: Several Months (Undetected for 1–2 Weeks Post-Intrusion)
High Value Targets: Salesforce Crm Data, Gainsight Customer Process Management Platform,
Data Sold on Dark Web: Salesforce Crm Data, Gainsight Customer Process Management Platform,

High Value Targets: Salesforce Customer Tokens,
Data Sold on Dark Web: Salesforce Customer Tokens,

Root Causes: Weak Oauth Token Security (Salesloft), Supply Chain Vulnerability (Gainsight Apps Relying On Compromised Tokens), Insufficient Api Access Controls,

Root Causes: Inadequate Oauth Token Security In Third-Party Integrations (Drift, Gainsight)., Lack Of Real-Time Monitoring For Anomalous Access Patterns., Supply Chain Vulnerabilities Via Github Account Compromise.,
Corrective Actions: Token Revocation And Rotation Across Affected Systems., Removal Of Vulnerable Apps From Appexchange., Engagement Of Threat Intelligence (Mandiant) For Attribution.,
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Google Mandiant (Threat Intelligence), , Google Threat Intelligence Group Analysis, .
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Token Revocation And Rotation Across Affected Systems., Removal Of Vulnerable Apps From Appexchange., Engagement Of Threat Intelligence (Mandiant) For Attribution., .
Last Attacking Group: The attacking group in the last incident were an ShinyHuntersScattered Lapsus$ Hunters and ShinyHuntersUNC6240.
Most Recent Incident Detected: The most recent incident detected was on 2025-11-24.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2025-11-26.
Most Significant System Affected: The most significant system affected in an incident was Salesforce Instances (760 in Salesloft breach)Gainsight-published Applications and Salesforce Instances (200+)GainsightSalesloftDriftHubSpotZendesk and Salesforce customer tokens and Salesforce customer tokens.
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was google mandiant (threat intelligence), .
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident were Token Revocation (OAuth/Refresh Tokens)AppExchange Removal and Revoked OAuth TokensRemoved Gainsight Apps from AppExchangeLimited HubSpot/Zendesk Connector Functionality.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 1.5B.
Most Significant Lesson Learned: The most significant lesson learned from past incidents was Collaboration with threat intelligence firms (e.g., Mandiant) is critical for attribution.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Enhance real-time monitoring for unauthorized access patterns., Establish clear incident response protocols for supply chain breaches., Conduct regular audits of integration partners’ security postures., Publicly disclose breaches transparently to maintain customer trust. and Implement multi-layered authentication for third-party OAuth tokens..
Most Recent Source: The most recent source of information about an incident are Salesforce Public Announcement, BleepingComputer, CyberScoop, TechRadar and Redazione RHC.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing (Customer Notifications in Progress).
Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was Direct Notifications to Affected Customers, Salesforce Revoked Access Keys, Gainsight/HubSpot/Zendesk Limited Connector Functionality, .
Most Recent Customer Advisory: The most recent customer advisory issued were an Revoked TokensApp Removal from AppExchange, No Direct Communication Mentioned, disclosed_by: CEO Chuck Ganapathi, scope: Limited number of clients affected and .
Most Recent Entry Point: The most recent entry point used by an initial access broker was an Stolen OAuth Tokens (Salesloft Drift Integration).
Most Recent Reconnaissance Period: The most recent reconnaissance period for an incident was Several Months (Undetected for 1–2 Weeks Post-Intrusion).
Most Significant Root Cause: The most significant root cause identified in post-incident analysis was Weak OAuth Token Security (Salesloft)Supply Chain Vulnerability (Gainsight Apps Relying on Compromised Tokens)Insufficient API Access Controls, Inadequate OAuth Token Security in Third-Party Integrations (Drift, Gainsight).Lack of Real-Time Monitoring for Anomalous Access Patterns.Supply Chain Vulnerabilities via GitHub Account Compromise..
Most Significant Corrective Action: The most significant corrective action taken based on post-incident analysis was Token Revocation and Rotation Across Affected Systems.Removal of Vulnerable Apps from AppExchange.Engagement of Threat Intelligence (Mandiant) for Attribution..
.png)
Improper validation of specified type of input in M365 Copilot allows an unauthorized attacker to disclose information over a network.
Improper access control in Azure Front Door (AFD) allows an unauthorized attacker to elevate privileges over a network.
Azure Entra ID Elevation of Privilege Vulnerability
Moonraker is a Python web server providing API access to Klipper 3D printing firmware. In versions 0.9.3 and below, instances configured with the "ldap" component enabled are vulnerable to LDAP search filter injection techniques via the login endpoint. The 401 error response message can be used to determine whether or not a search was successful, allowing for brute force methods to discover LDAP entries on the server such as user IDs and user attributes. This issue has been fixed in version 0.10.0.
Runtipi is a Docker-based, personal homeserver orchestrator that facilitates multiple services on a single server. Versions 3.7.0 and above allow an authenticated user to execute arbitrary system commands on the host server by injecting shell metacharacters into backup filenames. The BackupManager fails to sanitize the filenames of uploaded backups. The system persists user-uploaded files directly to the host filesystem using the raw originalname provided in the request. This allows an attacker to stage a file containing shell metacharacters (e.g., $(id).tar.gz) at a predictable path, which is later referenced during the restore process. The successful storage of the file is what allows the subsequent restore command to reference and execute it. This issue has been fixed in version 4.7.0.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.