Overview
On August 19, 2025, Workday disclosed a security incident stemming from the breach of a third-party customer relationship management (CRM) platform (reportedly Salesforce).
While Workday's core systems and customer tenants were not affected, attackers leveraged social engineering and OAuth abuse to gain unauthorized CRM access, highlighting the growing risks of SaaS supply-chain dependencies.
Incident Overview
| Field | Details |
|---|---|
| Breach Discovered | August 6, 2025 |
| Public Disclosure | August 15, 2025 |
| Attack Type | Phishing (voice & text), Impersonation, OAuth exploitation |
| Impacted Systems | Third-party CRM (Salesforce reported) |
| Workday Systems | Core systems and tenants not impacted |
How the Breach Happened
The incident followed a phishing-to-OAuth exploitation chain:
- Initial Access – Workday staff targeted by voice phishing (vishing) and SMS phishing (smishing) campaigns.
- Impersonation – Attackers posed as HR/IT staff to lure employees into malicious actions.
- Credential Harvesting – Victims tricked into authorizing malicious OAuth apps.
- CRM Exploitation – OAuth integrations enabled unauthorized access to the CRM platform.
- Data Exfiltration – Contact data (names, emails, phone numbers) was stolen for follow-on phishing and extortion.
Tactics closely resembled those used in the ShinyHunters campaign against major CRM/SaaS platforms.
Data Exposed
Data compromised in this breach included business contact information:
- Names
- Email addresses
- Phone numbers
➡️ While not highly sensitive individually, this information enables escalated phishing, impersonation, and social engineering campaigns.
Threat Actor Profile
| Attribute | Details |
|---|---|
| Suspected Group | ShinyHunters |
| Motivation | Data theft, resale, extortion |
| Techniques Used | Vishing, Smishing, Malicious OAuth integrations |
| Linked Campaigns | Adidas, Qantas, Allianz Life, Louis Vuitton, Dior, Chanel, Google |
| Historical Activity | Breaches at Snowflake, AT&T, PowerSchool |
| Threat Level | High – persistent SaaS/CRM targeting |
Lessons Learned
- Third-Party Weakness – Even when vendor systems are secure, integrated SaaS tools like CRMs can be exploited.
- "Low-Risk" Data Value – Emails and phone numbers fuel secondary phishing and impersonation attacks.
- OAuth Exploitation – Malicious OAuth apps represent a growing SaaS exploitation vector.
- Supply-Chain Vigilance – Enterprises must evaluate SaaS resilience as carefully as core systems.
Recommendations
Workday recommends proactive defensive measures for customers and partners:
1. Employee Awareness
- Run phishing + vishing simulation training.
- Reinforce reporting of suspicious calls/SMS promptly.
2. Stronger Authentication & Access Control
- Enforce adaptive MFA across CRM/SaaS accounts.
- Apply least-privilege principles to CRM access.
- Regularly audit and revoke dormant accounts.
3. OAuth Governance
- Require formal approval for third-party app integrations into SaaS/CRMs.
- Continuously monitor for malicious or unverified OAuth apps.
4. Vendor & SaaS Risk Management
- Run security assessments for SaaS providers.
- Confirm resilience to OAuth/social engineering.
- Limit data stored in CRMs (data minimization).
5. Incident Response Improvements
- Expand IR playbooks to include OAuth-integrated app exploits and CRM-targeted phishing.
- Monitor login and token usage for anomalies.
Conclusion
The Workday CRM breach underscores how attackers exploit supply-chain SaaS platforms, targeting OAuth integrations and CRM logins through phishing campaigns.
While Workday's main systems were not breached, the exposure of contact data enables large-scale impersonation and phishing—potentially more damaging over time than the initial incident.
Key Takeaway:
Organizations must harden SaaS integrations, govern OAuth apps strictly, and train employees against phishing and vishing vectors. Supply-chain SaaS dependencies require the same rigor of security monitoring and incident response as core enterprise systems.
Mine2 Team
The MINE2 team consists of cybersecurity experts, researchers, and engineers dedicated to advancing threat detection and cyber deception technologies.
Recent Articles
Weaponization of Cisco Safe Links in Phishing Campaigns
One Token, Dozens of Victims: How the Anodot SaaS Integration Breach Rewrites the Third-Party Risk Playbook
100 Million Downloads, One Poisoned Package: How the Axios npm Attack Proves Developer Credentials Are the New Crown Jewels
Need Security Help?
Protect your organization with MINE2's cyber deception platform.
