The Salesforce data breach 2025 is already being called one of the most significant SaaS security incidents in history. A hacker group known as Scattered LAPSUS$ Hunters claims to have exfiltrated nearly one billion customer records after a wave of vishing and social engineering attacks targeting Salesforce clients.
While Salesforce has confirmed it is investigating the claims, cybersecurity experts warn that this event could mark a dangerous new era of human-targeted cloud breaches.
Table of Contents
- What Happened in the Salesforce Data Breach 2025
- How the Hackers Pulled It Off
- What Data Was Allegedly Stolen
- How Salesforce and Clients Are Responding
- Why This Breach Matters (Beyond Salesforce)
- How to Protect Your Company from Similar Attacks
- Expert Insight
- Final Thoughts
What Happened in the Salesforce Data Breach 2025
According to a Reuters report published on October 3, 2025, the hacking group posted on underground forums claiming responsibility for a massive Salesforce data breach.
The attackers said they accessed CRM databases and API endpoints belonging to multiple Salesforce clients — rather than Salesforce’s internal infrastructure itself.
Stolen data allegedly included:
- Contact names, emails, and phone numbers
- Sales pipeline records and deal values
- Internal sales notes and communication logs
If confirmed, this would represent one of the largest CRM data leaks in history, potentially even surpassing the 2021 Facebook and LinkedIn exposures.
How the Hackers Pulled It Off
Investigators believe the breach was carried out using vishing (voice phishing). Attackers impersonated Salesforce or IT support staff, tricking employees into approving multi-factor authentication (MFA) requests or handing over session tokens.
“This wasn’t a technical exploit — it was psychological warfare,” said David Carver, senior analyst at SentinelOne.
“They bypassed security not by hacking software, but by hacking trust.”
The hackers are thought to have combined stolen credentials from earlier breaches with real-time social engineering calls, exploiting human error rather than software flaws.
What Data Was Allegedly Stolen
While Salesforce has not confirmed the scope of the incident, leaked samples circulating online reportedly contain:
- Full client contact lists and email addresses
- Sales activity data and company deal pipelines
- Logs from integrated apps such as Slack, Gmail, and Outlook
- API keys for third-party service connections
Experts warn this information could be weaponized in targeted phishing campaigns, business email compromise (BEC) scams, or even competitive espionage.
How Salesforce and Clients Are Responding
In a statement, Salesforce acknowledged that it is aware of the claims and is investigating the authenticity of the data. The company has advised enterprise customers to:
- Reset all API tokens and OAuth keys
- Enable conditional access and IP-based restrictions
- Audit recent login activity for anomalies
- Temporarily restrict external API access if necessary
Some Fortune 500 clients have already taken precautionary steps to limit third-party integrations.
Why This Breach Matters (Beyond Salesforce)
The Salesforce data breach 2025 is not just about one platform — it represents a shift in attack strategy. Instead of exploiting software flaws, cybercriminals are increasingly targeting people.
Even organizations that invest millions in firewalls and encryption remain vulnerable if an attacker can trick one employee during a 10-minute phone call.
This trend highlights the urgency of security awareness training and phishing-resistant MFA solutions across all industries.
How to Protect Your Company from Similar Attacks
Best Practices for SaaS Security:
- Train staff to verify all phone or email requests involving MFA.
- Implement phishing-resistant MFA (e.g., hardware keys like YubiKey).
- Regularly rotate API tokens and disable unused app integrations.
- Restrict CRM access by IP and user role.
- Use endpoint security solutions such as Bitdefender or CrowdStrike.
- Establish clear reporting channels for suspicious activity.
Expert Insight
Cybersecurity strategist Lisa Palmer summarized the situation:
“We’re entering a phase where attackers don’t need to breach Salesforce — they just need to breach you.”
Experts predict SaaS vendors will adopt AI-driven anomaly detection and contextual MFA verification to protect against human-centered attacks.

