Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms

February 7, 2026

Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access

February 7, 2026

China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

February 7, 2026
Facebook X (Twitter) Instagram
Sunday, February 8
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»Cyber Security»Cloudflare and Palo Alto Networks Victimized in Salesloft Drift Breach
Cyber Security

Cloudflare and Palo Alto Networks Victimized in Salesloft Drift Breach

Team-CWDBy Team-CWDSeptember 12, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Cloudflare and Palo Alto Networks are the latest big names to have had their Salesforce instances accessed by threat actors via the Salesloft Drift app, the firms have revealed.

In a post yesterday, Cloudflare said it became aware of suspicious activity in its Salesforce tenant last week.

“Our investigation showed the threat actor compromised and exfiltrated data from our Salesforce tenant between August 12-17, 2025, following initial reconnaissance observed on August 9, 2025,” it continued.

“A detailed analysis confirmed the exposure was limited to Salesforce case objects, which primarily consist of customer support tickets and their associated data within our Salesforce tenant.”

Read more on the Salesloft campaign: Zscaler Customer Info Taken in Salesloft Breach

Salesforce case objects include customer contact information related to support cases, case subject lines and the body of the case correspondence, but not attachments, Cloudflare was keen to point out.

“Cloudflare does not request or require customers to share secrets, credentials, or API keys in support cases,” the firm said.

“However, in some troubleshooting scenarios, customers may paste keys, logs, or other sensitive information into the case text fields. Anything shared through this channel should now be considered compromised.”

Cloudflare urged customers to rotate any credentials shared with it through this channel. It also found 104 Cloudflare API tokens in the compromised dataset, which it has rotated out of an abundance of caution.

Separately, Palo Alto Networks revealed yesterday that it too had its Salesforce data accessed by the same threat actor.

“The data involved includes mostly business contact information, internal sales account and basic case data related to our customers,” it said. “We take this incident seriously and are reaching out to a limited number of customers that have potentially more sensitive data exposed.”

More Targeted Attacks to Come?

Cloudflare confirmed that hundreds of victims have been caught up in this campaign. A threat actor identified as UNC6395 originally compromised OAuth tokens associated with the third-party Salesloft Drift application, which integrates with Salesforce.

In activity between August 8 and August 18, they systematically exfiltrated large volumes of data in order to search for credentials, according to Google’s Threat Intelligence Group (GTIG).

Cloudflare seemed to agree with this analysis.

“Given that hundreds of organizations were affected through this Drift compromise, we suspect the threat actor will use this information to launch targeted attacks against customers across the affected organizations,” it warned.

The tech firm’s revelations came just a few days after Zscaler admitted it was also impacted by the data theft campaign.

Some experts have suggested a nation state actor is to blame. GTIG has thus far found no connection between this and the ShinyHunters vishing campaign targeting Salesforce customers.

Image credit: Saulo Ferreira Angelo / Shutterstock.com



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous Article29,000 Servers Remain Unpatched Against Microsoft Exchange Flaw
Next Article Threat Actors Weaponize HexStrike AI to Exploit Citrix Flaws Within a Week of Disclosure
Team-CWD
  • Website

Related Posts

Cyber Security

Why AI’s Rise Makes Protecting Personal Data More Critical Than Ever

February 6, 2026
Cyber Security

New Hacking Campaign Exploits Microsoft Windows WinRAR Vulnerability

February 5, 2026
Cyber Security

Two Critical Flaws Found in n8n AI Workflow Automation Platform

February 4, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

Is it time for internet services to adopt identity verification?

January 14, 2026

AI-powered financial scams swamp social media

September 11, 2025

When ‘hacking’ your game becomes a security risk

October 17, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.