Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms

February 7, 2026

Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access

February 7, 2026

China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

February 7, 2026
Facebook X (Twitter) Instagram
Sunday, February 8
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»Cyber Security»Salesloft: GitHub Account Breach Was Ground Zero in Drift Campaign
Cyber Security

Salesloft: GitHub Account Breach Was Ground Zero in Drift Campaign

Team-CWDBy Team-CWDSeptember 9, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A major data theft campaign targeting Salesforce data via the Salesloft Drift app began after threat actors compromised a key GitHub account, Salesloft has revealed.

The sales engagement firm said in an update on Sunday that a Google Mandiant investigation traced the malicious activity back to a period between March and June 2025.

This was when the threat actor(s) accessed the Salesloft GitHub account.

“With this access, the threat actor was able to download content from multiple repositories, add a guest user and establish workflows. The investigation noted reconnaissance activities occurring between March 2025 and June 2025 in the Salesloft and Drift application environments,” Salesloft said.

“The threat actor then accessed Drift’s AWS environment and obtained OAuth tokens for Drift customers’ technology integrations. The threat actor used the stolen OAuth tokens to access data via Drift integrations.”

Read more on Salesloft attacks: Qualys, Tenable Latest Victims of Salesloft Drift Hack

The Salesloft Drift app integrates with Salesforce to automate sales processes for customers. However, using its OAuth tokens, threat actors were able to access those customers’ Salesforce instances, before exfiltrating secrets like “AWS access keys, passwords, and Snowflake-related access tokens,” Salesloft said.

Among the customers impacted by the campaign are security vendors such as Tenable, Qualys, Palo Alto Networks, Cloudflare and Zscaler.

The group behind the attack also targeted the Google Workspace integration with Salesloft Drift to access a “very small number” of Google Workspace accounts.

Mandiant Remediates

Salesloft said that forensic investigators from Google Mandiant performed “containment and eradication activities” which involved isolating the Drift infrastructure, application and code, taking the app offline and rotating credentials.

The firm also rotated credentials in the Salesloft environment, hardening it against threat actor tactics, and performed threat hunting to make sure the actors are no longer present.

“Mandiant has verified the technical segmentation between Salesloft and Drift applications and infrastructure environments,” the Salesloft update continued.

“Based on the Mandiant investigation, the findings support the incident has been contained. The focus of Mandiant’s engagement has now transitioned to forensic quality assurance review.”

It remains to be seen how many more corporate victims there are. Earlier reports suggested that hundreds may have been caught in the campaign, with ShinyHunters/Scattered Spider among the suspects.

That group separately targeted Salesforce instances by impersonating customers’ IT helpdesks in vishing attacks targeting employees.

Image credit: PJ McDonnell / Shutterstock.com



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleWhatsApp 0-Day, Docker Bug, Salesforce Breach, Fake CAPTCHAs, Spyware App & More
Next Article Android Droppers Now Deliver SMS Stealers and Spyware, Not Just Banking Trojans
Team-CWD
  • Website

Related Posts

Cyber Security

Why AI’s Rise Makes Protecting Personal Data More Critical Than Ever

February 6, 2026
Cyber Security

New Hacking Campaign Exploits Microsoft Windows WinRAR Vulnerability

February 5, 2026
Cyber Security

Two Critical Flaws Found in n8n AI Workflow Automation Platform

February 4, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

Your information is on the dark web. What happens next?

January 13, 2026

Common Apple Pay scams, and how to stay safe

January 22, 2026

What if your romantic AI chatbot can’t keep a secret?

November 18, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.