
Getty Images/iStockphoto
News brief: Salesloft Drift breach update and timeline
Check out the latest security news from the Informa TechTarget team.
Additional information has surfaced and new victims have come forward in the Salesloft Drift breach, which has affected more than 700 organizations globally.
Salesloft and Salesforce announced on August 20 that they had revoked connections between Drift, an AI chatbot for sales and marketing teams, and the Salesforce CRM after detecting a security issue in the Drift application. On August 26, the companies announced that a threat actor used compromised credentials linked to the chatbot to gain unauthorized access to Salesforce instances between August 8 and 18, though new information has revealed the threat actor gained access to Salesloft's GitHub repositories months prior.
Read a timeline of the attack and its fallout below.
The breach highlights the importance of third-party risk management, fourth-party risk management and supply chain security, especially in SaaS environments, as well as strong authentication, including token security, privileged access controls and strong incident response procedures.
Google warns of credential theft campaign targeting Salesforce users
Google's Threat Intelligence Group reported that threat actor UNC6395 was targeting organizations using compromised OAuth tokens associated with Salesloft Drift.
Attackers used a Python tool to automate data theft from Salesforce instances between August 8 and 18, searching for sensitive credentials, including AWS access keys and Snowflake tokens.
Salesloft and Salesforce revoked the compromised tokens, and Salesforce removed Drift from its AppExchange marketplace. Google later warned that the compromise extended beyond Salesforce integrations, potentially affecting all authentication tokens connected to the Drift platform, including "Drift Email" integration tokens.
Read the full story published Aug. 26 by David Jones on Cybersecurity Dive.
Palo Alto Networks and Zscaler affected by attacks
Palo Alto Networks confirmed it was impacted by the Salesloft Drift supply chain incident that compromised customer Salesforce data, primarily affecting business contact information and sales account data. The company contained the breach by disabling the application from its Salesforce environment and confirmed it had no impact on its products or services.
Zscaler reported a similar breach affecting business contact data, including names, business email addresses, phone numbers and Zscaler product licensing information. It also confirmed the breach did not affect its products or services.
Read the full story published Sept. 2 by David Jones on Cybersecurity Dive.
Cloudflare and Proofpoint join list of victims
Cloudflare and Proofpoint disclosed they were victims of the August 2025 Salesloft Drift attacks.
Between August 9 and 17, attackers accessed Cloudflare's Salesforce support cases containing customer contact information and correspondence, compromising 104 API tokens, which were subsequently rotated. Cloudflare took responsibility despite being part of a larger attack, writing in a company blog post, "We are responsible for the tools we use."
Both companies disabled Drift integration and confirmed there was no impact to their core services, infrastructure or customer-protected data.
Read the full story published Sept. 3 by David Jones on Cybersecurity Dive.
Severity of supply chain attack unclear
The Salesloft Drift attacks continue to expand as numerous cybersecurity companies report compromises, with Tenable joining the list of vendors.
Okta reported that it successfully prevented compromise through IP restrictions and security frameworks, including IPSIE.
Security experts have warned that stolen OAuth tokens are particularly dangerous because they enable attackers to access systems without triggering typical security alerts.
Read the full story published Sept. 4 by Alexander Culafi on Dark Reading.
GitHub compromise revealed as source
Mandiant's investigation revealed that threat actor UNC6395's attack on hundreds of Salesforce instances began with a compromise of Salesloft's GitHub account as early as March 2025.
Between March and June, attackers downloaded repository data and conducted reconnaissance before accessing Drift's AWS environment. There, they stole OAuth tokens for various technology integrations beyond just Salesforce.
Additional Salesloft Drift breach victims include Qualys, Rubrik, Spycloud, BeyondTrust, CyberArk, Elastic, Dynatrace, Cato Networks and BugCrowd.
Read the full story published Sept. 8 by Rob Wright on Dark Reading.
Salesforce restores Salesloft integration, keeps Drift disabled
Salesforce has restored integration with the Salesloft platform following Mandiant's investigation into the attack, but the Drift component remains disabled until further notice.
Read the full story published Sept. 8 by David Jones on Cybersecurity Dive.
Editor's note: An editor used AI tools to aid in the generation of this news brief. Our expert editors always review and edit content before publishing.
Sharon Shea is executive editor of Informa TechTarget's SearchSecurity site.