Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms

February 7, 2026

Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access

February 7, 2026

China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

February 7, 2026
Facebook X (Twitter) Instagram
Sunday, February 8
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»Cyber Security»Zscaler Customer Info Taken in Salesloft Breach
Cyber Security

Zscaler Customer Info Taken in Salesloft Breach

Team-CWDBy Team-CWDSeptember 11, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Zscaler has revealed itself as the latest corporate victim of a major supply chain campaign targeting Salesforce customer data.

The security vendor said that OAuth tokens linked to the third-party Salesloft Drift application were stolen by an adversary, enabling them to access its Salesforce instance.

According to the update over the weekend, compromised information included “commonly available business contact details for points of contact and specific Salesforce related content.”

Specifically, this included:

  • Names
  • Business email addresses
  • Job titles
  • Phone numbers
  • Regional/location details
  • Zscaler product licensing and commercial information
  • Plain text content from certain support cases, but not attachments, files, or images

Read more on Salesloft: Salesloft Attacks Target Google Workspace

Zscaler said it acted quickly to revoke the Drift app’s access to its Salesforce data and rotated other API access tokens out of an abundance of caution.

It also claimed to have implemented “additional safeguards and strengthening protocols” to prevent a similar incident in the future.

“Although the incident’s scope remains limited (as stated above) and no evidence of misuse has been found, we recommend that customers maintain heightened vigilance. Please be wary of potential phishing attacks or social engineering attempts, which could leverage exposed contact details,” Zscaler advised its customers.

“Given that other organizations have suffered similar incidents stemming from Salesloft Drift, it’s crucial to exercise caution regarding unsolicited communications, including emails, phone calls, or requests for sensitive information. Always verify the source of communication and never disclose passwords or financial data via unofficial channels.”

Just yesterday, Infosecurity reported that the same campaign had targeted not just the Salesforce integration with Salesloft Drift, but also a “very small number” of Google Workspace accounts.

It’s believed to be the work of a threat actor tracked as UNC6395, who targeted “numerous” Salesforce customer instances between August 8 and August 18, exfiltrating large volumes of data. Hundreds of corporate customers may have been impacted.

The scale of the campaign, and operational discipline exercised, have led some to question whether there was nation state involvement.

Image credit: CryptoFX / Shutterstock.com



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleAzure AD Credentials Exposed in Public App Settings File
Next Article Salesloft Attacks Target Google Workspace
Team-CWD
  • Website

Related Posts

Cyber Security

Why AI’s Rise Makes Protecting Personal Data More Critical Than Ever

February 6, 2026
Cyber Security

New Hacking Campaign Exploits Microsoft Windows WinRAR Vulnerability

February 5, 2026
Cyber Security

Two Critical Flaws Found in n8n AI Workflow Automation Platform

February 4, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

Don’t let “back to school” become “back to bullying”

September 11, 2025

How chatbots can help spread scams

October 14, 2025

AI-powered financial scams swamp social media

September 11, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.