Major organizations have recently suffered data breaches targeting their Salesforce environments. Unlike traditional, hands-on hacking, these incidents often relied on insider manipulation and social engineering to steal sensitive customer data. In September, the Federal Bureau of Investigation (FBI) issued an FBI Flash addressing this threat.
Since mid-2024, English-speaking threat groups like ShinyHunters and GRUB1 have led these attack campaigns. Their tactics include exploiting open authorization (OAuth) misconfigurations and over-permissioned users and using voice phishing (vishing) to infiltrate Salesforce environments and extract sensitive data.
The good news is that organizations can take proactive action to protect themselves. Following is a breakdown of threat actors’ tactics and practical steps organizations can take to harden their Salesforce environments against OAuth and excess permissions exploitation and vishing attacks.
Here’s how attackers breached Salesforce environments in recent incidents:
These attacks affected millions of data records. In some instances, they could have been stopped or limited through regular security hygiene best practices.
To better understand how these attacks happened – and how organizations can mitigate risk – it’s helpful to dive into how each attack vector works.
OAuth has become a standard for modern applications because it simplifies integration between identity providers and business systems. Employees benefit by using a single set of credentials, and IT and security teams can centrally manage access and maintain an inventory of connected applications.
Despite these advantages, OAuth’s complexity can lead to misconfigurations. Overly permissive setups tend to grant users more access than they need. In real-world incidents, attackers have exploited excessive OAuth permissions to bypass traditional authentication and approval steps. For example, allowing employees to add tools, such as a corrupted Salesforce data loader tool, without proper review opens the environment up to risk.
OAuth hardening should be treated like any other critical system hardening:
By tightening controls and reducing unnecessary permissions, organizations can reap OAuth’s benefits without opening the door to abuse.
The Salesforce platform stores sensitive customer data and powers key business operations, but its flexibility often leads to users being granted excessive permissions. Employees are often granted broad access rights to simplify onboarding, speed up business processes, or through the accumulation of technical debt, but this practice increases the risk of accidental data exposure and insider threats. Attackers who compromise an over-permissioned account can gain far more access than they should, which puts sensitive records and business workflows at risk.
Performing regular access reviews and using a role-based access control (RBAC) framework are foundational components of critical system security and should be applied to Salesforce instances as well.
Crowe specialists use a unique RBAC model: a scalable permission framework specifically designed to address challenges within Salesforce instances. By building on a jobs-to-be-done-based design strategy, it follows a structured approach to permission sets (three per personae), uses read-only profiles, and provisions with user access policies. This framework simplifies user permissioning for business reviewers and technical staff, allows for greater security, and offers the benefit of speed and scale as opposed to legacy approaches.
Vishing is a social engineering tactic attackers employ to impersonate trusted individuals or organizations via phone calls. Their goal is often to extract sensitive information, such as login credentials, or to pressure employees into taking immediate actions, like transferring funds or approving access.
Because these calls often sound convincing and exploit urgency, they can bypass technical defenses. In short, they rely on human error. Building awareness across the workforce is critical: Employees should be trained to slow down, question unexpected requests, and verify caller identities through trusted, independent channels.
Organizations can bolster defenses by incorporating vishing simulations and scenarios into their broader security awareness programs. This proactive step helps employees practice real-world responses and reinforces a culture of skepticism toward unsolicited calls. In addition, establishing clear escalation paths helps employees know where to report suspicious activity without fear of reprisal.
Crowe combines decades of leading risk, compliance, and cybersecurity experience with an experienced Salesforce team to deliver specialized Salesforce services in the marketplace.
Contact our team to schedule an initial 60-minute Salesforce security review to understand the best strategies to harden your Salesforce defenses.
From permission sets to monitoring, Crowe Salesforce specialists can help you close security gaps and maximize return on investment. Connect with us to build a fortress, not a soft shell.