Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»‘Overly Permissive’ Salesforce Cloud Configs in the Crosshairs
    Cybersecurity

    ‘Overly Permissive’ Salesforce Cloud Configs in the Crosshairs

    adminBy adminMarch 11, 2026No Comments4 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    'Overly Permissive' Salesforce Cloud Configs in the Crosshairs
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Threat actors are exploiting “customers’ overly permissive” Salesforce Experience Cloud guest user configurations to steal sensitive data, Salesforce Security said in a March 7 blog post.

    Salesforce said this issue is unrelated to a vulnerability inherent to its platform and that Salesforce remains secure. “Our investigation to date confirms that this activity relates to a customer-configured guest user setting,” the blog post read. 

    Salesforce instances have faced a wide range of campaigns over the past year or so. Most prominently, financially motivated threat groups including ShinyHunters targeted Salesforce instances through social engineering attacks that began last summer. Federal law enforcement ultimately shuttered a dedicated extortion site tied to the campaign, but even then, attacks apparently continued. 

    In a second distinct threat campaign last year, an actor known as Scattered Lapsus$ Hunters (supposedly combining Scattered Spider, Lapsus$, and ShinyHunters) reportedly stole a wide range of data belonging to dozens of Salesforce customers before using it to extort them. And these campaigns were separate from the Salesloft Drift supply chain attack from the summer of 2025.

    Related:Microsoft Patches 83 CVEs in March Update

    In order to address the issue laid out in Salesforce’s blog post, the CRM giant made multiple recommendations for customers to check for and protect themselves against compromise. 

    Attackers Steal Salesforce Customer Data

    In its blog post, Salesforce says an unidentified “known threat actor group” has been leveraging a modified version of the open-source tool Aura Inspector to mass scan public-facing Experience Cloud sites. While Aura Inspector originally only identified vulnerable objects through probing API endpoints that sites expose, “the actor has developed a custom version of the tool capable of going beyond identification to actually extract data — exploiting overly permissive guest user settings,” the vendor noted.

    “In a publicly accessible Salesforce Experience site, anonymous visitors share a ‘guest user profile.’ Typically this is used to allow an unauthenticated user access to view data that is expected to be made publicly available,” Salesforce explained. “However, if this profile is misconfigured with excessive permissions, data that is not intended to be made public may be accessible, allowing a threat actor to directly query Salesforce CRM objects without logging in.”

    Salesforce declined to share any threat actor attribution with Dark Reading, though ShinyHunters apparently has taken credit for some attacks. 

    Related:Are We Ready for Auto Remediation With Agentic AI?

    Experience Cloud customers are considered “at risk” if they are using the guest user profile and have configured permissions to allow public access to objects and fields not intended to be available according to Salesforce’s recommended configuration guidance. Follow-on activity has consisted of targeted social engineering (including voice phishing) attacks, which is in line with ShinyHunters’ MO. 

    Due to the risk posed by this campaign, Salesforce urged Experience Cloud customers to audit guest user configurations, set company-wide defaults to “private,” disable public APIs, restrict visibility, disable self-registration if not required, regularly review event monitoring logs, and add a security contact. Instructions for all these recommendations are in the blog. 

    More Threats Against Salesforce Instances

    Because CRMs inherently hold valuable data and because of Salesforce’s dominance in that sector, it’s no surprise that threat actors are targeting Salesforce customers. However, it is notable that so many prominent campaigns have taken root in so short a time.

    Louis Eichenbaum, federal chief technology officer (CTO) at microsegmentation security vendor ColorTokens, tells Dark Reading that these attacks are increasing because attackers have identified that “they are easy [to conduct] and Salesforce stores a very large amount of sensitive data.” 

    Related:Cyberattack on Mexico’s Gov’t Agencies Highlight AI Threat

    He adds that when organizations enable Experience Cloud, the platform automatically creates a guest user profile, which allows unauthenticated users to access the site. “I would recommend that Salesforce disable the automatic creation of guest user profiles and let organizations decide if they want to create a guest account,” Eichanbaum says.

    Trey Ford, chief security and trust officer at Bugcrowd, explains that platform ecosystems are hard to secure because they’re compromised through exploiting trust relationships and poorly managed credentials, particularly via third-party integrations and non-human identities (NHI).

    “Over the last five to 10 years we’ve seen a number of SaaS security startups specifically aimed at permissions for human and NHI accounts, the scope of permissions applied, and the age and usage of those credentials,” Ford says. “Companies need to review those integrations and account access patterns, and take steps to harden their usage, apply IP integration limits where possible, and use the latest reference patterns for authentication and authorization for their integrations.”

    Cloud Configs Crosshairs Overly Permissive Salesforce
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous Article10 Best VPNs for iPhone & iPad in 2026
    Next Article Summoners War X The LOTR 9.1.6 APK Download by Com2uS
    admin
    • Website

    Related Posts

    Researchers Trick Perplexity’s Comet AI Browser Into Phishing Scam in Under Four Minutes

    March 11, 2026

    ShinyHunters claims new campaign targeting Salesforce Experience Cloud sites

    March 11, 2026

    Google completes $32B acquisition of Wiz

    March 11, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Datalec targets rapid infrastructure deployment with new modular data centers

    March 12, 2026

    What Is Landing Page Optimization? And How to Do It

    March 11, 2026

    Researchers Trick Perplexity’s Comet AI Browser Into Phishing Scam in Under Four Minutes

    March 11, 2026

    Change Google Play Region Guide

    March 11, 2026
    Categories
    • Blogging (37)
    • Cybersecurity (723)
    • Privacy & Online Earning (109)
    • SEO & Digital Marketing (456)
    • Tech Tools & Mobile / Apps (890)
    • WiFi / Internet & Networking (120)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Datalec targets rapid infrastructure deployment with new modular data centers

    March 12, 2026

    What Is Landing Page Optimization? And How to Do It

    March 11, 2026

    Researchers Trick Perplexity’s Comet AI Browser Into Phishing Scam in Under Four Minutes

    March 11, 2026
    Most Popular
    • Datalec targets rapid infrastructure deployment with new modular data centers
    • What Is Landing Page Optimization? And How to Do It
    • Researchers Trick Perplexity’s Comet AI Browser Into Phishing Scam in Under Four Minutes
    • Change Google Play Region Guide
    • GrapheneOS coming to Motorola phones is exactly the Android news I wanted
    • ShinyHunters claims new campaign targeting Salesforce Experience Cloud sites
    • WordPress Security Release 6.9.4 Fixes Issues 6.9.2 Failed To Address
    • Android System WebView Beta 147.0.7727.2 APK Download by Google LLC
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.