A bad actor impersonating users is incredibly difficult to detect in Salesforce. Once a bad actor gains legitimate credentials, they can impersonate admins, access sensitive data, and exfiltrate it — often without raising alarms.
By switching between user identities, attackers can blend into the noise of large organizations. With complex hierarchies of profiles, permission sets, roles, and system permissions, these attacks are hard to pinpoint and prevent in Salesforce.
In this article, we’ll break down a real-world impersonation attack that led to the exfiltration of millions of records and how you can prevent user impersonation attacks.
Anatomy of the breach
A large multinational organization approached us after discovering that millions of records had been exfiltrated from their Salesforce CRM. After an in-depth investigation, we determined how the bad actor managed to get away unnoticed.
Here’s how the breach unfolded:
- A former employee, familiar with the organization’s Salesforce environment, convinced the help desk to reset their password.
- Once reset, they unfroze their account, regaining all previous permissions. They then escalated their permission to super admin.
- Once they had super admin privileges, they began systematically impersonating users and searching for sensitive data.
- At a glance, these sessions appeared routine. Without close scrutiny, the sessions looked like routine IT support activities, but the frequency and timing raised red flags during our risk assessment.
- Finally, the attacker used an unsecured third-party app to exfiltrate millions of records undetected.
Diagnosing Salesforce data risk
With more than a million users, this environment was inherently difficult to manage, but some avoidable key risks contributed to the data breach.
Here’s what we uncovered:
1. Frozen accounts with admin rights
The organization had more than 600 super admin accounts, many of which were frozen. Yet those frozen accounts still retained full permissions. In Salesforce, freezing an account doesn’t remove its permissions. If reactivated, the account regains all prior access.
This creates a significant risk. Threat actors like Scattered Spider use social engineering to convince help desks to reset passwords and MFA, reactivating frozen accounts with intact privileges.
2. Stale app assignments
The organization had dozens of stale app assignments. These stale app assignments often retain OAuth tokens and permissions, creating a backdoor for attackers or malicious insiders to access and exfiltrate sensitive data.
3. Production data in a sandbox environment
Perhaps the most alarming issue is that this organization’s production data was being synced with a massive sandbox environment. Sandboxes typically lack the strict controls of production environments, creating a dangerous mix of sensitive data and weaker access controls.

How to prevent user impersonation in Salesforce
While user impersonation is difficult to spot, this breach was preventable. Here’s how to close the gaps:
Remove unused permissions
Audit and eliminate permissions that are no longer needed. When freezing an account, remove its permissions to reduce the attack surface and simplify audits. Regular reviews help enforce least privilege.
Revoke stale app assignments
Audit third-party app access and remove assignments that are no longer relevant. This eliminates unnecessary exposure and reduces the risk of data exfiltration through forgotten integrations.
Separate production and sandbox data
Best practice is not to sync production data into sandbox environments. Keep environments isolated to prevent accidental exposure and maintain stronger access controls.
How Varonis Helps
The recommendation above can be challenging to implement, especially in a large organization. Varonis provides the most complete Salesforce security solution available for eliminating risk and detecting threats with automated remediations to ensure that security and threat detection scale.
Right-size permissions
Varonis shows you each user’s effective permissions and how they got them with automated remediation, like removing permissions from frozen or stale accounts.
Manage third-party app risk
Varonis discovers all connected third-party apps, evaluates their risk, and monitors their activity. It can automatically remove unsanctioned or unused app connections.
Detect anomalous activity
Varonis proactively monitors Salesforce and your broader data estate for suspicious behavior, including privilege escalation, mass object access, and data exfiltration. Varonis correlates identities across apps to surface threats like a user logging in via Okta, accessing Salesforce, and emailing data to a personal account.
Try Varonis for Salesforce
To protect your sensitive data, you need to know where it lives, who can access it, and what they’re doing with it. Only Varonis brings all of this together in one platform.
Varonis protects Salesforce and other SaaS apps, cloud, and on-premises data.
Interested in uncovering what risks lie in your Salesforce environment? Start a Free Data Risk Assessment today.
What should I do now?
Below are three ways you can continue your journey to reduce data risk at your company:
Schedule a demo with us to see Varonis in action. We'll personalize the session to your org's data security needs and answer any questions.
See a sample of our Data Risk Assessment and learn the risks that could be lingering in your environment. Varonis' DRA is completely free and offers a clear path to automated remediation.
Follow us on LinkedIn, YouTube, and X (Twitter) for bite-sized insights on all things data security, including DSPM, threat detection, AI security, and more.
