The Containment Era is here. →Explore

Executive Summary

In November 2025, Gainsight reported a security incident involving its SaaS applications integrated with Salesforce, after Salesforce observed suspicious API calls from non-allowlisted IP addresses linked to Gainsight services. This prompted Salesforce to revoke affected access tokens, limit integration capabilities, and initiate investigations, temporarily disrupting data flows for several customers and connected platforms such as Zendesk and HubSpot. Forensic analysis revealed threat activity tied to proxy/VPN infrastructure and IPs previously associated with the UNC6040 threat cluster, which had targeted Salesforce CRMs in past extortion campaigns, though no confirmed data exfiltration occurred.

This incident exemplifies the persistent risk of supply-chain compromise through interconnected SaaS platforms, emphasizing how attackers can leverage trusted applications to pivot laterally and exploit enterprise data pipelines. With the steady rise in OAuth-based integrations and API dependency, businesses face mounting urgency to reevaluate third-party access, enforce zero-trust principles, and proactively monitor for anomalous behaviors within their SaaS ecosystems.

Why This Matters Now

The incident highlights how supply-chain vulnerabilities in popular SaaS integrations can be exploited by financially motivated threat actors, even when no direct customer data breach is confirmed. With organizations rapidly expanding their web of trusted applications using OAuth and API keys, a single compromise can cascade across critical business systems, making continuous monitoring and integration hardening urgent priorities.

Attack Path Analysis

Related CVEs

MITRE ATT&CK® Techniques

Potential Compliance Exposure

Sector Implications

Sources

Frequently Asked Questions

The incident was triggered by unauthorized API access via non-allowlisted IPs through Gainsight's Salesforce integrations, exploiting supply-chain trust and SaaS connector vulnerabilities.

Cloud Native Security Fabric Mitigations and ControlsCNSF

Applying Zero Trust segmentation, east-west workload controls, and egress policy enforcement would have severely limited the attacker's ability to exploit integrations, move laterally through SaaS-connected environments, and extract sensitive data. CNSF controls—especially identity-based segmentation, traffic visibility, token governance, and inline anomaly detection—provide both prevention and real-time threat response across hybrid and multi-cloud SaaS ecosystems.

Initial Compromise

Control: Zero Trust Segmentation

Mitigation: Unauthorized integration calls from untrusted sources are automatically blocked.

Privilege Escalation

Control: Threat Detection & Anomaly Response

Mitigation: Suspicious privilege escalation and token abuse trigger real-time alerts and workflow automation.

Lateral Movement

Control: East-West Traffic Security

Mitigation: Lateral movement between SaaS and internal cloud services is segmented and monitored, limiting attacker reach.

Command & Control

Control: Cloud Firewall (ACF) & Inline IPS

Mitigation: Malicious API traffic from Tor/proxy endpoints is detected and automatically blocked.

Exfiltration

Control: Egress Security & Policy Enforcement

Mitigation: Unapproved outbound data transfers are denied and generate incident alerts.

Impact (Mitigations)

Rapid visibility into integration abuse and automated response contain escalation and limit business impact.

Impact at a Glance

Affected Business Functions

  • Customer Relationship Management
  • Sales Operations
  • Customer Support
Operational Disruption

Estimated downtime: 7 days

Financial Impact

Estimated loss: $5,000,000

Data Exposure

Unauthorized access to customer contact details, business emails, phone numbers, support-case content, and internal CRM metadata.

Recommended Actions

  • Implement Zero Trust Segmentation for all SaaS integrations and enforce identity-based access policies for API endpoints.
  • Apply continuous egress filtering and anomaly detection to surface and block unsanctioned API exports or unusual data access patterns.
  • Baseline normal user and system behavior to rapidly alert on privilege escalations, token misuse, or suspicious traffic sources.
  • Review and regularly rotate all OAuth tokens, API keys, and privileged credentials, enforcing device trust and MFA for connected app identities.
  • Ensure centralized visibility, logging, and control across all cloud and SaaS assets, enabling real-time detection, response, and automated remediation of integration abuse.

Secure the Paths Between Cloud Workloads

A cloud-native security fabric that enforces Zero Trust across workload communication—reducing attack paths, compliance risk, and operational complexity.

Cta pattren Image