Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity NewswireCybersecurity News

Why Are Platform Ecosystems — Like Salesforce — Often Targeted?

By Jordyn Alger, Managing Editor
Monitors with keyboard
Fotis Fotopoulos via Unsplash
March 13, 2026

Salesforce recently issued a warning to users regarding an “increase in threat actor activity targeting misconfigurations of publicly accessible sites.” Specifically, cybercriminals are leveraging permissive guest user configurations for Experience Cloud to gain unauthorized access to data. This harvested data can be exploited for targeted social engineering attempts or even “vishing” (voice phishing) campaigns. 

This threat activity is under active investigation, and follows a breach in October 2025 in which hackers claimed to steal 1 billion records from Salesforce customer databases. So why is this platform — and other platforms like it — such an attractive target to cybercriminals?

Why Platform Ecosystems Are Often Targeted

There are a few key reasons why platform ecosystems are a popular target; it is because they often: 

  • Possess sensitive customer information
  • Contain credential data that can be leveraged for lateral movement 
  • Can be challenging to secure 

Trey Ford, Chief Strategy and Trust Officer at Bugcrowd, explains what makes these platforms difficult to secure.

“Platform ecosystems are notoriously hard to secure because the way they’re compromised is not easily scanned for using automation. This is specifically because these application stacks use non-human identities (NHI) and have deep integrations with other software and data platforms. Trust relationships, and long-lived and poorly monitored credentials grant access to treasure troves of systems and data,” says Ford. “By targeting and compromising software trusted to communicate, query, or operate in the context of the Salesforce integration creates a threat to the Salesforce ecosystem, and it’s not something Salesforce can directly secure. The failure is in the third party integrations.” 

Another reason these ecosystems attract cybercriminals is due to the valuable data stored within databases. Not only can that data be leveraged for targeted cyberattacks against individuals, but it can also be used to navigate laterally through an environment to access more data. 

Vincenzo Iozzo, CEO and Co-Founder at SlashID, explains, “Salesforce is a great target for attackers for a few reasons. First, Salesforce instances often contain highly sensitive customer data including credentials and secrets that can be used for lateral movement as we’ve seen with the Drift breach. Second, Salesforce makes it relatively hard for security teams to detect attacks, and very few SOC teams have deep knowledge of Salesforce internals. Third, Salesforce has an incredibly complex and not very well understood access control architecture: profiles, permission sets, sharing rules, org-wide defaults, object-level security, which lends itself to accidental data exposure and privilege escalation. And when you add the third-party app ecosystem and OAuth integrations on top of that, the attack surface multiplies well beyond what any single security team can realistically monitor. This is a much easier target to go after than an heavily guarded endpoint or server.” 

What Is the New Threat Activity Against Salesforce Customers? 

Salesforce’s Cyber Security Operations Center (CSOC) is monitoring a known threat actor group’s campaign in which an altered version of the open-source tool Aura Inspector is deployed for “mass scanning of public-facing Experience Cloud sites.” The modified version of this tool extracts data rather than just identify it and exploits permissive guest user settings.

An Experience Cloud customer will be at risk if they: 

  • Use the guest user profile 
  • Configured permissions to enable public access to objects/fields not authorized for public access  

Shane Barney, Chief Information Security Officer at Keeper Security, says, “The activity being reported centers on how guest user access is configured in public-facing Experience Cloud environments. When a guest profile is granted broader permissions than necessary, it can allow unauthenticated users to access data that was never intended to be public. That is a configuration exposure rather than a flaw in the underlying platform. Automated tools can quickly identify environments where access controls are too permissive and extract accessible data in a matter of minutes, amplifying both the scale and potential impact. Any system exposed to the internet must be configured with the expectation that it will be continuously scanned.” 

How Can Security Leaders Mitigate This Risk? 

Salesforce is recommending the following steps: 

  1. Review guest user configurations
  2. Put “Private” as the organization-wide default 
  3. Disable public APIs
  4. Limit visibility in sharing settings 
  5. Disallow self-registration (if it is unnecessary for the site)
  6. Audit configuration for Enhanced Personal Information Masking (EPIM)
  7. Allow profile filtering
  8. Enable “Show Nicknames” setting 
  9. Manually review non-user object field-level security

“At its core, this is an access governance issue,” states Barney. “Guest accounts, service accounts and API integrations must be treated with the same discipline as privileged users. Applying least privilege, restricting API access and continuously auditing permissions are foundational security controls. Privileged access management plays an important role here by providing visibility and control over who, or what, can access sensitive systems and data, including non-human identities and externally exposed accounts. In cloud environments, identity defines the security boundary. Organizations that maintain clear oversight of permissions and enforce strong access controls significantly reduce the risk of unintended data exposure.” 

KEYWORDS: data breach platform platform as a service

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jordynalger

Jordyn Alger is the managing editor for Security magazine. Alger writes for topics such as physical security and cyber security and publishes online news stories about leaders in the security industry. She is also responsible for multimedia content and social media posts. Alger graduated in 2021 with a BA in English – Specialization in Writing from the University of Michigan. Image courtesy of Alger

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Top Cybersecurity Leaders
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

Popular Stories

Pixelated brain

Critical Thinking Erosion: A Hidden Threat to Security Career Resilience

Red block among white blocks

Plenty of Associations, But Not Enough Association

Person on iPhone

The Olympics Are Going Mobile — Your Security Strategy Has to Follow

Phone showing hearts and flirty emojis

Valentine’s Day 2026: Inside the Industrial-Scale Romance Scam Economy

Red and blue pawns with thought bubbles

Implementing Meaningful De-Escalation Training in Your Security Program

SEC 2026 Benchmark Banner

Events

April 8, 2026

The Future of Executive Protection: Layering Technology, Intelligence, and Response

Digital threats to executives and other high-profile employees are evolving faster than most corporate protection programs. Learn why modern executive protection programs require data-driven, intelligence-led strategies to keep pace with the magnitude of today’s threats.

April 15, 2026

How AI is Closing the Decision Gap in Leading GSOCs

Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • Gift cards and credit cards

    Why Are Cyberattacks Targeting Retail? Experts Share Their Thoughts

    See More
  • Coding on monitor

    Windows users targeted with zero-day attacks via Internet Explorer

    See More
  • Man in suit

    Executives targeted in mobile spearphishing attacks

    See More

Related Products

See More Products
  • The Database Hacker's Handboo

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing