Skip to main content
Data CleansingMachine Learning

Guarding Salesforce – Learning from Recent OAuth Breaches and Strengthening Security

By September 4, 2025September 7th, 2025No Comments
Guarding Salesforce

You may have seen the news this week about a malicious version of the Salesforce Data Loader app being used in a targeted phishing campaign. Attackers, identified by Google’s Threat Intelligence Group, tricked employees into installing a fake app that looked like the real thing. Once connected, the app allowed hackers to pull sensitive Salesforce data out of company environments. 

The good news: this wasn’t a Salesforce vulnerability. Instead, it was a reminder of how far social engineering tactics have come, and why admins and end users need to stay vigilant. 


What’s Gone Wrong: OAuth-Based Breaches 

In recent months, organizations using Salesforce have been hit hard – not due to vulnerability in Salesforce itself, but through misuse of trusted OAuth-connected third-party apps. Administrators must now adopt stricter security controls, including the savvy use of IP restrictions. 

Salesloft Drift OAuth Exploits 

  • Between August 8–18, 2025, threat actor UNC6395 exploited stolen OAuth tokens from Salesloft’s Drift integration to extract data – including AWS access keys, passwords, and Snowflake tokens – from hundreds of Salesforce instances. 
  • Major organizations like Zscaler have confirmed breaches via the same vector. Attackers accessed contact info, job titles, licensing data, and support case content, though no misuse has been confirmed – Zscaler has revoked tokens and rotated credentials. 

Broader Social Engineering Attacks 

  • Beyond Drift, groups like ShinyHunters (also referred to as UNC6040 or UNC6240) have targeted Salesforce via voice phishing (vishing) and malicious tools like spoofed Data Loader apps to trick users into granting access. 
  • These breaches span sectors – including aviation, retail, luxury, and insurance, affecting brands like Chanel, Louis Vuitton, Google, Adidas, and Farmers Insurance. 

Risks Highlighted: 

  1. Connected app vulnerabilities are a blind spot. 
  1. OAuth tokens, once compromised, grant deep access. 
  1. Social engineering remains a top threat vector. 

Strengthening Security: IP-Based Restrictions + Best Practices 

Why IP Restrictions Matter 

Salesforce supports Login IP Ranges and Trusted IPs to control where users and connected apps can authenticate from: 

  • Enabling these can block or flag unauthorized access attempts outside approved networks. 
  • Profile-level IP restrictions can even block logins entirely from outside specified addresses. 

When you configure IP restrictions for connected apps: 

  • Only traffic coming from known, trusted IPs will be accepted. 
  • Even if an OAuth token is stolen, an attacker outside the trusted IP range will be blocked. 
  • You gain tighter control and clearer visibility over integrations. 

This approach aligns perfectly with Zero Trust principles: “Never trust, always verify.” 

How to Set Up IP Ranges 

For Org-wide Trust: 

  1. In Setup, search for “Network Access” 
  1. Click New to define a start and end IPv4 range (or single address). 
  1. Optionally add a description (good for documentation!) and save. 

For Profile-specific Restrictions: 

  1. Go to Profiles → choose a profile → navigate to Login IP Ranges 
  1. Add desired IPv4 (and/or IPv6) ranges. 
  1. Salesforce will block all login attempts outside this range – for non-admins especially. 

Securing Datagroomr with IP Restrictions 

If your organization uses Datagroomr for Salesforce data quality and verification and is looking to explicitly whitelist their IP addresses in Salesforce. 

Current Datagroomr IPs to allow: 

52.14.107.230   
18.220.63.130   

These are the current Datagroomr IPs as of September, 2025. Please reach out to support if you require the most up-to-date ranges or if your compliance policies require confirmation. 


Additional Best Practices 

Beyond IP whitelisting, Salesforce admins should: 

  • Audit connected apps regularly: Remove unused or suspicious apps. 
  • Restrict OAuth scopes: Grant only the minimum permissions needed. 
  • Enable event monitoring: Track unusual login or API activity. 
  • Train staff: Watch for phishing, vishing, and fake app prompts 
salesforce security best practices

How DataGroomr Keeps You Secure 

As a reminder, rest assured that DataGroomr takes security seriously. 

🔒 Verified AppExchange Listing 
DataGroomr has passed Salesforce’s rigorous security review and is SOC2 Type II certified. We never ask customers to download apps from external sites or sideload software. 

🌐 Dedicated IPs 
All DataGroomr services run on trusted, dedicated IP ranges. This makes it easier for admins to whitelist our traffic and block unknown connections. 

⚖️ Scoped Permissions 
We follow Salesforce’s “least privilege” model, only requesting the access needed to perform deduplication, imports, or updates. Nothing more. 

🔑 Secure Authentication 
Connections to DataGroomr happen through Salesforce-approved OAuth flows. Admins can also layer on IP restrictions and MFA policies to strengthen protections. 


Conclusion 

The recent wave of Salesforce-related breaches underscores the importance of defending every integration point. Connected apps like Datagroomr deliver critical value, but they must be secured. 

By enforcing IP restrictions, you greatly reduce the attack surface and move closer to a Zero Trust Salesforce environment

Next step: Review all connected apps in your org and apply IP restrictions today. It’s one of the simplest, most effective protections against modern threats. 

Ben Novoselsky

Ben Novoselsky, DataGroomr CTO, is a hands-on software architect involved in the design and implementation of distributed systems, with over 19 years of experience. He is the author of multiple publications about the design of the distributed databases. Ben holds a Ph.D. in Computer Science from St. Petersburg State University.