Salesforce issues customer alert as ShinyHunters group claims Experience Cloud breach
Threat actors are using a modified version of the AuraInspector tool, according to Salesforce
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
You are now subscribed
Your newsletter sign-up was successful
Salesforce has issued a warning over an ongoing campaign targeting customers using misconfigured Experience Cloud platforms.
In an advisory last week, the CRM giant said a “known threat actor group” has been observed using a modified malicious version of the AuraInspector tool, which as part of the Salesforce Aura framework to identify security misconfigurations in Experience Cloud sites.
Originally developed by Mandiant, threat actors are using the open source tool to “perform mass scanning of public-facing Experience Cloud sites” and extract data.
“While the original Aura Inspector is limited to identifying vulnerable objects by probing API endpoints that these sites expose (specifically the /s/sfsites/aura endpoint), the actor has developed a custom version of the tool capable of going beyond identification to actually extract data — exploiting overly permissive guest user settings,” the company said.
Salesforce emphasized that the incident was not caused by a “vulnerability inherent to our platform”, but instead due to a customer-configured guest user setting.
This is because an exposed Salesforce Experience site accepts guest user profiles to provide access to publicly available data.
However, the company noted that misconfigured profiles with excessive permissions could allow a threat actor to “directly query Salesforce CRM objects” without logging in.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Charles Carmakal, CTO at Mandiant, said the company is aware of the AuraInspector misuse and is working with Salesforce to mitigate risks.
“We are aware of a threat actor attempting to identify misconfigurations within the Salesforce Experience Cloud instances,” he told ITPro.
“We are working closely with Salesforce and our customers to provide the necessary telemetry and detection rules to mitigate potential risk."
ShinyHunters claims responsibility
The “known threat actor group” cited by Salesforce appears to be ShinyHunters, with the group claiming responsibility for the attacks.
According to reports from The Register, the threat group claims to have stolen data from upwards of 400 websites and around 100 “essential high profile companies”.
Companies cited by the group included Snowflake, LastPass, Okta, AMD, and Salesforce. The group told the publication that the campaign has been ongoing “for several months now”.
What can Salesforce customers do?
In its advisory, Salesforce detailed a number of steps customers can take to mitigate potential risks, including:
- Enforcing a “least privilege” access model
- Conduct an audit of guest user permissions
- Set Org Wide Defaults to “Private”
- Switch off portal user visibility and site user visibility
Salesforce also advised customers to disable self-registration unless explicitly required. This is because guest data can be used to create portal accounts, thereby enabling “broader data access”.
“In addition to checking for unusual query volumes, review your Aura Event Monitoring logs for anomalous access patterns — such as queries targeting objects not intended to be public, unexpected spikes from unfamiliar IP addresses, or access outside normal business hours,” Salesforce said.
“If you suspect your environment may have been affected, contact Salesforce Support and complete the guest user audit steps outlined above rather than relying on log volume alone.”
FOLLOW US ON SOCIAL MEDIA
Make sure to follow ITPro on Google News to keep tabs on all our latest news, analysis, and reviews.
You can also follow ITPro on LinkedIn, X, Facebook, and BlueSky.

Ross Kelly is ITPro's News & Analysis Editor, responsible for leading the brand's news output and in-depth reporting on the latest stories from across the business technology landscape. Ross was previously a Staff Writer, during which time he developed a keen interest in cyber security, business leadership, and emerging technologies.
He graduated from Edinburgh Napier University in 2016 with a BA (Hons) in Journalism, and joined ITPro in 2022 after four years working in technology conference research.
For news pitches, you can contact Ross at ross.kelly@futurenet.com, or on Twitter and LinkedIn.
-
What do rising RAM prices mean for businesses?RAM prices have shot up thanks to increased demand by data center operators for AI workloads
-
Datadog announces local UK storage for regulated industriesNews The company is targeting customers and partners with specific UK data residency, privacy, and security requirements
-
Salesforce customers face second third-party incident this year with Gainsight breachNews Customers impacted in the Gainsight breach have been contacted by Salesforce
-
The Salesloft hackers claim they have 1.5 billion compromised Salesforce recordsNews Dozens of big tech companies have been impacted by the Salesloft Drift attacks
-
How to check if you’ve been affected by Salesforce attacks – and stop hackers dead in their tracksNews The FBI has issued a fresh advisory over the threat posed to Salesforce customers by two threat groups. Here's how you can stay safe and mitigate any risks.
-
Warning issued to Salesforce customers after hackers stole Salesloft Drift dataNews Customers were targeted through compromised OAuth access tokens from Salesloft Drift integrations
-
The Allianz Life data breach just took a huge turn for the worseNews Around 1.1 million Allianz Life customers are believed to have been impacted in a recent data breach, making up the vast majority of the insurer's North American customers.
-
Everything we know about the Workday data breach so farNews HR technology firm Workday has confirmed a data breach after threat actors gained access to a third-party CRM platform.
-
Google cyber researchers were tracking the ShinyHunters group’s Salesforce attacks – then realized they’d also fallen victimNews In an update to an investigation on the ShinyHunters group, Google revealed it had also been affected
-
Foreign AI model launches may have improved trust in US AI developers, says Mandiant CTO – as he warns Chinese cyber attacks are at an “unprecedented level”News Concerns about enterprise AI deployments have faded due to greater understanding of the technology and negative examples in the international community, according to Mandiant CTO Charles Carmakal.