Credential compromise is one of the oldest tricks in cybercrime, and still the most successful if looking at the statistics. In 2025, stolen or reused credentials accounted for 22% of all breaches globally according to the Verizon Data Breach Investigations Report. The IBM Cost of a Data Breach Report 2025 found that these incidents cost organizations an average of USD 4.81 million and take 292 days to contain, which is longer than any other breach vector.
Salesforce is not immune. WithSecure telemetry revealed an average of 900 malicious URLs per Salesforce org (not environment, but a single org) last year, many tied to phishing and credential-stealing attempts within trusted workflows.
The reason for this trend is simple, and already an unfortunate cliche in cybersecurity: attackers don’t need to break in if they can they log in. Once they log into Salesforce, they act from within the most trusted, connected business platform that hoards a plethora of valuable data.
Once attackers get in, compromise rarely stays neatly contained. What begins as one exposed login can quickly evolve into a chain of trust abuse between identities: from identity to identity, not just system to system. The attacker uses one foothold to harvest information, impersonate colleagues, and move laterally across accounts and integrations. Each new identity they compromise widens the breach.
How credential compromise unfolds in Salesforce
Salesforce identities are everywhere: employees, administrators, contractors, suppliers, customers, and integrated systems all authenticate into the same environment. Each of those identities – internal or external – can become a pathway for compromise.
Credential compromise often starts far away from Salesforce itself. An employee reuses a password on a personal SaaS account. A partner’s login credentials are leaked in a breach on a third-party portal. Those credentials are then tested through automated credential-stuffing attacks until one works.
The Jira credential breach in 2025 followed this exact pattern: attackers reused valid credentials exposed in previous incidents, logged in legitimately, and harvested data at scale. In Salesforce, the same playbook applies. When a valid user account is compromised, every API, integration, and connected app that trusts it becomes part of the attack surface.
This is how lateral movement happens inside modern SaaS environments. A compromised user can not only access data, but inherit trust. With that trust, they can authorize connected apps, generate OAuth tokens, or trigger automations that act on their behalf. Without early detection, this chain reaction can silently cascade through Salesforce and any system linked to it.
The unseen attack surface: community and external users
Salesforce Experience Cloud portals enable partners, suppliers, and customers to collaborate and share data directly. But these external users often fall outside the reach of corporate IAM or security policies.
They might authenticate with separate credentials, use weak passwords, or reuse them across systems. Unlike employees, they’re rarely covered by single sign-on (SSO) or strong MFA enforcement. Their login activity may never appear in enterprise identity logs.
This is where attackers find leverage.
A compromised community account can impersonate a partner, modify cases, download attachments, or trigger automations that connect deeper into the environment. From there, they can pivot laterally – moving from an overlooked external identity to privileged internal accounts through trust and integrations.
Salesforce’s strength as a connected ecosystem is also what makes it a target. Each connection represents an identity, and every identity is a potential entry point.

The impact of a single compromised identity
When an attacker gains valid credentials to access Salesforce, they inherit trust, which has consequences.
Data exposure
Salesforce stores some of the most sensitive data in the enterprise: customer records, sensitive business details in case attachments, contracts, and financial details. A compromised account can access and export that data quietly.
Lateral movement
A single valid login can set off a chain reaction. What begins with one compromised account can expand identity to identity: a community or partner user might impersonate internal staff, authorize connected apps, or trigger automations that open new paths of access. This interconnectedness is what enables lateral movement: spreading through legitimate trust rather than exploits, and chaining identities across systems until the initial breach becomes a multi-platform compromise.
Supply chain compromise
Salesforce integrations connect to ERP, HR, and various operational, collaboration and business systems. Once attackers gain access, they may pivot laterally across systems, turning one compromised login into a multi-platform breach.
Fraud and manipulation
Attackers can exploit compromised accounts to submit fake orders, modify invoices, or manipulate workflows. In one observed case, attackers used compromised community logins to insert fraudulent bank details into legitimate customer records.
Impersonation and social engineering
Using valid Salesforce identities, attackers can impersonate employees or partners to send credible requests, distribute phishing links, or gain further access through highly convincing social engineering.
Malware and phishing delivery
Attackers increasingly use Salesforce itself to deliver malware or phishing (we’ve seen a 20 fold increase in 2025 vs. 2024) embedding malicious links in case files or QR codes in attachments. Because it all happens within a trusted domain, users are far more likely to click.
These risks mirror patterns seen in real incidents: credential compromise leading to data theft, fraud, and abuse of trust across connected cloud ecosystems.
Why credential compromise is hard to detect
There are several practical steps you can take to harden your Salesforce environment against identity risks. But it’s important to keep in mind that traditional identity controls like MFA and SSO while essential, are insufficient alone.
They verify how a user logs in, not whether that user’s credentials are already exposed elsewhere.
Salesforce doesn’t monitor for leaked credentials. IAM and XDR tools don’t have visibility into community Salesforce accounts. Identity breach monitoring tools operate externally, disconnected from Salesforce’s user directory.
That leaves a blind zone between most global breach intelligence tools and the identities that live inside Salesforce.
When attackers exploit that space, they gain legitimate access with no alarms triggered.
Introducing Identity Protection in WithSecure Cloud Protection for Salesforce
Identity Protection capability in WithSecure Cloud Protection for Salesforce was created to eliminate the unseen credential exposure – and to help defenders mitigate credential exposure risks before the attackers abuse them.
The feature continuously monitors Salesforce user accounts, covering internal and community users, against threat intelligence, including the latest dark-web breach intelligence. It identifies credentials that appear in known or emerging data leaks and flags those users directly inside Salesforce for rapid response.
If a user’s credentials appear in a known data leak, the system flags it with detailed breach and severity information.
You’ll know:
- Which users were exposed – and when
- The breach source and password format
- How severe the risk is and what to do next

Scans run automatically, ensuring organizations are alerted when a user’s credentials are found in breach data. Each detection is logged for audit and compliance, supporting compliance frameworks besides incident response.
Identity Protection operates entirely within Salesforce, as a protection layer in the WithSecure Cloud Protection for Salesforce app. Identity Protection capability complements MFA, SSO, and Event Monitoring by adding what those tools can’t: continuous awareness of credential exposure.

In Salesforce, a single compromised login can open access to customer data, business processes, and integrated systems.
Identity Protection turns that risk into an early-warning system by detecting exposed credentials before they can be used against you. Identity Protection protects your business from credential-based fraud, impersonation, and supply-chain abuse that can start with a single compromised user account.
Use cases and risk scenarios
Credential compromise risks – and mitigating them – can be realized in many ways across different Salesforce environments. It can look like the examples below.
Financial services
A supplier’s community account credentials were leaked in a third-party retail breach. Attackers reused them to submit fraudulent requests and access contract data. Identity Protection detected the exposure before the next login attempt, allowing admins to reset credentials and prevent financial loss.

Technology company
An engineer reused their corporate email and password on a personal code repository. When that repository was breached, the same credentials appeared in breach data. Identity Protection flagged the user during a routine scan, preventing a potential lateral move to Salesforce environments containing intellectual property.
Public sector organization
A consultant’s partner-portal account appeared in a dark-web credential dump. Identity Protection identified the compromised identity and notified administrators immediately. The account was suspended, and access logs were reviewed before any data exposure occurred.
Across all these examples, the outcome is the same: detection before exploitation.
Strategic impact: stopping breaches at their first step
Every major breach begins with an initial access event – and more often than not, that access is legitimate. As highlighted at the Dreamforce 2025 Security Keynote, attackers now move “identity to identity” rather than the traditional “server to server.” Identity Protection in WithSecure Cloud Protection for Salesforce breaks that chain early by detecting exposed credentials before attackers can pivot laterally through trusted accounts.
By identifying compromised users before attackers act, Identity Protection transforms the early phase of the attack chain from silence into signal. It’s a visibility layer that maps real-world breach intelligence directly onto the people and user accounts that define your Salesforce environment.
The result is shorter dwell time, faster response, and demonstrable reduction in identity-related risk.
Identity Protection gives security teams something they’ve never had in Salesforce before: the ability to see and act on credential exposure before it turns into a breach.
































