Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms

February 7, 2026

Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access

February 7, 2026

China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

February 7, 2026
Facebook X (Twitter) Instagram
Sunday, February 8
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Google Warns Salesloft Drift Breach Impacts All Drift Integrations Beyond Salesforce
News

Google Warns Salesloft Drift Breach Impacts All Drift Integrations Beyond Salesforce

Team-CWDBy Team-CWDSeptember 6, 2025No Comments6 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Google has revealed that the recent wave of attacks targeting Salesforce instances via Salesloft Drift is much broader in scope than previously thought, stating it impacts all integrations.

“We now advise all Salesloft Drift customers to treat any and all authentication tokens stored in or connected to the Drift platform as potentially compromised,” Google Threat Intelligence Group (GTIG) and Mandiant said in an updated advisory.

The tech giant said the attackers also used stolen OAuth tokens to access email from a small number of Google Workspace email accounts on August 9, 2025, after compromising the OAuth tokens for the “Drift Email” integration. It’s worth noting that this is not a compromise of Google Workspace or Alphabet itself.

“The only accounts that were potentially accessed were those that had been specifically configured to integrate with Salesloft; the actor would not have been able to access any other accounts on a customer’s Workspace domain,” Google added.

Following the discovery, Google said it notified impacted users, revoked the specific OAuth tokens granted to the Drift Email application, and disabled the integration functionality between Google Workspace and Salesloft Drift amid ongoing investigation into the incident.

The company is also urging organizations using Salesloft Drift to review all third-party integrations connected to their Drift instance, revoke and rotate credentials for those applications, and investigate all connected systems for signs of unauthorized access.

The broadening of the attack radius comes shortly after Google exposed what it described as a widespread and opportunistic data theft campaign that allowed the threat actors, an emerging activity cluster dubbed UNC6395, to leverage compromised OAuth tokens associated with Salesloft Drift to target Salesforce instances from August 8 to 18, 2025.

Salesloft has since revealed that Salesforce has temporarily disabled the Drift integration between Salesforce, Slack, and Pardot, only to follow it up nearly three hours later, saying Salesforce has “elected to temporarily disable all Salesloft integrations with Salesforce.”

“Based on the investigation to date, there is no evidence of malicious activity detected in the Salesloft integrations related to the Drift incident,” it noted. “Additionally, at this time, there are no indications that the Salesloft integrations are compromised or at risk.”

Update

Cybersecurity firm Zcaler has disclosed that it’s the latest victim stemming from the Salesloft Drift breach after threat actors gained access to its Salesforce instance and stole customer information, including the contents of some support cases.

The activity is part of a campaign that involves stealing OAuth tokens connected to Salesloft Drift to obtain access to Salesforce instances for information theft. Google has attributed the activity to a cluster codenamed UNC6395.

The information accessed was limited to commonly available business contact details for points of contact and specific Salesforce related content, including:

  • Names
  • Business email addresses
  • Job titles
  • Phone numbers
  • Regional/location details
  • Zscaler product licensing and commercial information
  • Plain text content from certain support cases [this does NOT include attachments, files, and images]

Zscaler said it has not found any evidence to suggest misuse of this information at this stage, and that swiftly acted to revoke Salesloft Drift’s access to Zscaler’s Salesforce data and rotate other API access tokens.

In a similar alert, Palo Alto Networks revealed itself to be another victim of the attack campaign leveraging the Salesloft Drift integration to compromise customer Salesforce instances. It also said it’s reaching out to a “limited number of customers” that have potentially more sensitive data exposed.

“Our investigation confirms the incident was isolated to our CRM platform; no Palo Alto Networks products or services were impacted, and they remain secure and fully operational,” the company said. “The data involved includes mostly business contact information, internal sales account and basic case data related to our customers.”

Palo Alto Networks Unit 42, which detailed the threat actor’s modus operandi, said its observations indicate mass exfiltration of sensitive data from various Salesforce objects, including Account, Contact, Case and Opportunity records, with the attackers actively scanning the acquired data for credentials to further expand their access.

Other companies that have publicly confirmed the Salesloft Drift breach include Cloudflare, PagerDuty, SpyCloud, and Tanium, underscoring the widening attack radius.

“Most of this information is customer contact information and basic support case data, but some customer support interactions may reveal information about a customer’s configuration and could contain sensitive information like access tokens,” Cloudflare said. “No Cloudflare services or infrastructure were compromised as a result of this breach.”

The web infrastructure company, which is tracking UNC6395 under the name GRUB1, also pointed out that it found among the compromised data set 104 Cloudflare API tokens and that all these tokens have been rotated out of an abundance of caution.

Identity services provider Okta also said it “discovered attempts to use a compromised Salesloft Drift token to access an Okta Salesforce instance” but revealed these efforts were ultimately unsuccessful due to IP allowlisting and securing tokens with Demonstrating Proof of Possession (DPoP), which constrains the use of a token to a specific client.

“The single most important control that prevented this breach was our enforcement of inbound IP restrictions,” its security team said, calling the incident a “wake-up call for the entire SaaS industry.”

“The threat actor attempted to use a compromised token to access our Salesforce instance, but the attack failed because the connection originated from an unauthorized IP address. This security layer proved essential, blocking the unauthorized attempt at the front door before any access could be gained.”

“This expanded understanding of the UNC6395 campaign makes one thing clear: comprehensive OAuth token management across every cloud is non-negotiable,” Astrix Security said. “Revoke suspect grants now, monitor continuously for the indicators we provided, and close the lateral movement paths created by chained OAuth abuse and harvested secrets.”

At this stage, any account associated with Salesloft Drift OAuth application access should be assumed to be compromised and have their activities reviewed for any suspicious or abnormal behavior, WideField added.

(The story was updated after publication on September 2, 2025, with details about companies that have confirmed the breach.)



Source

computer security cyber attacks cyber news cyber security news cyber security news today cyber security updates cyber updates data breach hacker news hacking news how to hack information security network security ransomware malware software vulnerability the hacker news
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleTamperedChef Malware Disguised as Fake PDF Editors Steals Credentials and Cookies
Next Article Feds Seize $6.4M VerifTools Fake-ID Marketplace, but Operators Relaunch on New Domain
Team-CWD
  • Website

Related Posts

News

CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms

February 7, 2026
News

Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access

February 7, 2026
News

China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

February 7, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

Drowning in spam or scam emails lately? Here’s why

January 27, 2026

When ‘hacking’ your game becomes a security risk

October 17, 2025

Why the tech industry needs to stand firm on preserving end-to-end encryption

September 12, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.