Loading

Security Advisory: Unusual Activity related to the Gainsight application

Дата публикации: Apr 22, 2026
Описание

Update: Dec 10, 2025 

Salesforce has re-enabled integrations with Gainsight. This decision follows security measures and remediation steps implemented by Gainsight, which were independently validated by Mandiant and CrowdStrike.

For Gainsight's latest investigation and remediation updates, see https://communities.gainsight.com/community-news-2/salesforce-security-advisory-relating-to-gainsight-faqs-29809

 


 

Original Advisory: Nov 24, 2025

 

At Salesforce, we understand that the confidentiality, integrity, and availability of your data is vital to your business, and we take the protection of your data very seriously. This Security Advisory was created to inform our customers that Salesforce detected unusual activity involving Gainsight-published applications, which are installed and managed directly by customers. Our investigation indicates this activity may have enabled unauthorized access to certain customers’ Salesforce data through the applications’ connection. 

 

On November 20, 2025, Salesforce disabled the connection between Gainsight-published applications and Salesforce. As of December 10, 2025, Salesforce has re-enabled integrations with Gainsight following security measures and remediation steps implemented by Gainsight which were independently validated by Mandiant and CrowdStrike.

 

There is no indication that this issue resulted from any vulnerability in the Salesforce platform. For Gainsight's latest investigation and remediation updates, see:

https://communities.gainsight.com/community-news-2/salesforce-security-advisory-relating-to-gainsight-faqs-29809

 

IMPORTANT: Salesforce's revocation of the Gainsight application’s OAuth tokens on November 20, 2025, did NOT delete your historical audit trails or hinder your ability to investigate this activity. All Setup Audit Trail entries, Event Monitoring logs, and API activity records remain intact and accessible. Salesforce strongly recommends that customers conduct a comprehensive review of all available logs when investigating potential compromise. Guidance on log review can be found in the Salesforce Log Analysis Guide.

 

Known Indicators of Compromise (IoCs)

The following table lists known Indicators of Compromise (IoCs) associated with the threat actor activity detected in connection with the Gainsight application. The following known IoCs include IP addresses associated with VPN proxy services (including Mullvad, Surfshark, Proton, and Tor) and anomalous user agent strings not associated with Gainsight's connected app. Customers should check their Event Monitoring logs for activity from these IPs between October and November 2025. 

 

IOC Type

Value

First Seen 

Last Seen 

Observed Activity

IP Address

104.3.11.1

2025-11-08

2025-11-08

AT&T IP; reconnaissance and unauthorized access.

IP Address

198.54.135.148

2025-11-16

2025-11-16

Mullvad VPN proxy IP; reconnaissance and unauthorized access.

IP Address

198.54.135.197

2025-11-16

2025-11-16

Mullvad VPN proxy IP; reconnaissance and unauthorized access.

IP Address

198.54.135.205

2025-11-18

2025-11-18

Mullvad VPN proxy IP; reconnaissance and unauthorized access.

IP Address

146.70.171.216

2025-11-18

2025-11-18

Mullvad VPN proxy IP; reconnaissance and unauthorized access.

IP Address

169.150.203.245

2025-11-18

2025-11-18

Surfshark VPN proxy IP; reconnaissance and unauthorized access.

IP Address

172.113.237.48

2025-11-18

2025-11-18

NSocks VPN proxy IP; reconnaissance and unauthorized access.

IP Address

45.149.173.227

2025-11-18

2025-11-18

Surfshark VPN proxy IP; reconnaissance and unauthorized access.

IP Address

135.134.96.76

2025-11-19

2025-11-19

IProxyShop VPN proxy IP; reconnaissance and unauthorized access.

IP Address

65.195.111.21

2025-11-19

2025-11-19

IProxyShop VPN proxy IP; reconnaissance and unauthorized access.

IP Address

65.195.105.81

2025-11-19

2025-11-19

Nexx VPN proxy IP; reconnaissance and unauthorized access.

IP Address

65.195.105.153

2025-11-19

2025-11-19

ProxySeller VPN proxy IP; reconnaissance and unauthorized access.

IP Address

45.66.35.35

2025-11-19

2025-11-19

Tor VPN proxy IP; reconnaissance and unauthorized access.

IP Address

146.70.174.69

2025-11-19

2025-11-19

Proton VPN proxy IP; reconnaissance and unauthorized access.

IP Address

82.163.174.83

2025-11-19

2025-11-19

ProxySeller VPN proxy IP; reconnaissance and unauthorized access.

IP Address

3.239.45.43

2025-10-23

2025-10-23

AWS IP; reconnaissance against customers with compromised Gainsight access token.

User Agent

python-requests/2.28.1

2025-11-08

2025-11-08

Not an expected user agent string used by Gainsight connected app; use in conjunction with other IOCs shared.

User Agent

python-requests/2.32.3

2025-11-16

2025-11-16

Not an expected user agent string used by Gainsight connected app; use in conjunction with other IOCs shared.

User Agent

python/3.11 aiohttp/3.13.1

2025-10-23

2025-10-23

Not an expected user agent string used by Gainsight connected app; use in conjunction with other IOCs shared.

User Agent

Salesforce-Multi-Org-Fetcher/1.0

2025-11-18

2025-11-19

Leveraged by threat actor for unauthorized access; also observed in Salesloft Drift activity

 

Recommended Customer Actions 

 

We strongly urge all customers to perform a full review of your logs for any unexpected activity related to the Gainsight connection to Salesforce, not just limited to the IOCs listed above. 

 

Решение

#Resolution

Salesforce recommends all customers who had Gainsight-published applications installed perform a full review of their logs for any unexpected activity. Specific guidance is available in the Salesforce Log Analysis Guide. 

Дополнительные ресурсы

Salesforce Trust post

Salesforce Log Analysis Guide

Номер статьи базы знаний

005229029

 
Загрузка
Salesforce Help | Article