Palo Alto Networks and Zscaler Hit by Salesloft Data Breach

Published:

spot_img

Widespread Authentication Token Theft: Salesloft Incident Affects Major Companies

In a recent cybersecurity breach, organizations like Palo Alto Networks and Zscaler found themselves victims of a significant authentication token theft campaign aimed at Salesforce instances. This attack exploited vulnerabilities via the Salesloft Drift, a third-party AI chat agent platform, raising concerns about data security for numerous clients.

Timeline of the Incident

Salesloft first reported the breach on August 20, revealing that it had acted swiftly by revoking the connections between its Drift platform and Salesforce. The company urged Drift administrators to re-authenticate their Salesforce connections to enhance security.

In a follow-up statement, Salesloft clarified that, during the period from August 8 to August 18, a threat actor utilized OAuth credentials to extract sensitive data from customer Salesforce instances. This alarming revelation indicated a targeted approach to steal not just any data, but specific credentials such as AWS access keys, passwords, and tokens related to Snowflake.

The Threat Actor: UNC6395

The threat actor behind the campaign has been identified by Google as UNC6395. This group was particularly focused on exploiting compromised OAuth tokens linked to Salesloft Drift, leading to the systematic extraction of vast amounts of data from numerous corporate Salesforce accounts. Their goal appeared to be uncovering secrets that could further compromise these corporate environments.

Google’s threat intelligence unit, along with their partner Coalition, assisted in addressing the breach. They indicated that, in some instances, the attack also extended to a small number of Google Workspace accounts configured to integrate with Salesloft Drift, indicating a broader impact of the incident. However, it’s crucial to note that the breach did not stem from a vulnerability within the core Salesforce platform itself.

The Aftermath for Affected Companies

Following the notification of the breach, Salesforce took immediate action by temporarily removing the Drift application from its AppExchange while further investigations were conducted. Additionally, Google disabled the integration between Google Workspace and Salesloft Drift to minimize further risk.

In response to the attack, Palo Alto Networks released a statement confirming that it was one of “hundreds of organizations” impacted by this supply chain attack. Importantly, they reassured that the breach was isolated to their CRM platform, and none of their products or services were affected. The compromised data primarily consisted of business contact information and basic case data concerning their customers. They emphasized the seriousness of the incident, stating they would proactively reach out to clients potentially affected by the breach.

Conversely, Zscaler reported on August 30 that its operations were also impacted, though it emphasized that the credentials obtained provided only limited access to some Salesforce information like contact and licensing details. After an extensive investigation, Zscaler found no evidence to suggest any misuse of this information.

This incident comes at a time when the frequency of supply chain attacks is soaring. Recent data from Cyble indicates a troubling trend, revealing that supply chain attacks have doubled since April 2025, averaging 26 incidents per month. This doubling rate is attributed to the mass exploitation of zero-day vulnerabilities and unpatched security flaws.

In one noteworthy case, a ransomware group claimed responsibility for an attack that compromised data for 41,000 customers, illustrating the wide-reaching implications of such breaches. Although IT and IT services sectors are commonly targeted, Cyble’s reports show that at least 20 other industries have been affected by supply chain attacks in the past year.

To counter these threats, Cyble recommends organizations conduct regular security audits, assess third-party risks, and implement robust security practices such as network micro-segmentation and stringent access controls. These measures are vital for minimizing potential damage from future supply chain attacks.

Conclusion

The ongoing developments surrounding the Salesloft incident and the increasing trend in supply chain attacks underscore the importance of vigilance in cybersecurity practices. Organizations must prioritize their security measures to protect sensitive data and ensure the integrity of their systems in this evolving threat landscape.

spot_img

Related articles

Recent articles

Last Chance for AT&T Customers: Claim Your Share of $7,500 from $177 Million Settlement!

Deadline Approaches for AT&T Data Settlement Claims Just one week remains for eligible Americans to file claims for a substantial $177 million settlement stemming from...

Do Kwon Sentenced to 15 Years in Prison Following Terraform Labs Collapse

NEW YORK: In a Manhattan courtroom, the fallout from one of cryptocurrency's most significant collapses came to a head. Victims described how their savings...

Security for Tomorrow: Preparing for Future Challenges

Future-Ready Security: Leading Through Learning In an age where threats evolve at an unprecedented pace, the field of security has transcended traditional boundaries, becoming not...

Cyberattack Compromises Russia’s Digital Military Draft System and Leaks Source Code

Cyberattack on Russia's Military Draft System: A Significant Breach A recent cyberattack has raised concerns over the security of Russia's digital military draft system, known...