Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms

February 7, 2026

Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access

February 7, 2026

China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

February 7, 2026
Facebook X (Twitter) Instagram
Sunday, February 8
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»Cyber Security»Salesloft Attacks Target Google Workspace
Cyber Security

Salesloft Attacks Target Google Workspace

Team-CWDBy Team-CWDSeptember 11, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A recently discovered supply chain attack campaign targeting Salesforce data via the Salesloft Drift app is more extensive than at first thought.

Google (GTIG) revealed in a post late last week that threat actors had not just targeted the Salesforce integration with Salesloft Drift, but also a “very small number” of Google Workspace accounts.

“We now advise all Salesloft Drift customers to treat any and all authentication tokens stored in or connected to the Drift platform as potentially compromised,” it warned.

“We recommend organizations take immediate action to review all third-party integrations connected to their Drift instance, revoke and rotate credentials for those applications, and investigate all connected systems for signs of unauthorized access.”

Read more on Salesloft: New Data Theft Campaign Targets Salesforce via Salesloft App

The campaign came to light last week after GTIG claimed an actor tracked as UNC6395 had targeted “numerous” Salesforce customer instances between August 8 and August 18, systematically exfiltrating large volumes of data.

At the time, it said the focus for the actor was harvesting credentials such as AWS access keys (AKIA), passwords and Snowflake-related access tokens. Hundreds of organizations are thought to have been impacted.

The hackers compromised corporate Salesforce instances after stealing OAuth tokens for Salesloft’s Drift AI chat integration with Salesforce. No vulnerabilities were identified in Salesforce or Google platforms.

New IoCs and Activity Spotted

Security vendor Astrix revealed 183 previously undisclosed IP-based indicators of compromise (IoCs) connected to the campaign, all of which are Tor exit nodes. That activity was linked to a malicious AWS account that used bucket names extracted from the compromised Salesforce environments in an attempt to access S3 buckets.

“Failed authentication attempts inadvertently exposed the threat actor’s AWS account ID,” Astrix explained.

“Our analysis indicates this malicious AWS account initiated operations in early August 2025, coinciding with the broader campaign timeline.”

The security vendor urged organizations to improve OAuth token management across all of their cloud accounts.

Image credit: gguy / Shutterstock.com



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleZscaler Customer Info Taken in Salesloft Breach
Next Article Ransomware Actor Deletes Data and Backups Post-Exfiltration on Azure
Team-CWD
  • Website

Related Posts

Cyber Security

Why AI’s Rise Makes Protecting Personal Data More Critical Than Ever

February 6, 2026
Cyber Security

New Hacking Campaign Exploits Microsoft Windows WinRAR Vulnerability

February 5, 2026
Cyber Security

Two Critical Flaws Found in n8n AI Workflow Automation Platform

February 4, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

Drowning in spam or scam emails lately? Here’s why

January 27, 2026

Common Apple Pay scams, and how to stay safe

January 22, 2026

What are brushing scams and how do I stay safe?

December 24, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.