Salesloft Disables Drift Following OAuth Token Theft
Summary
Hide β²
Show βΌ
Salesloft has taken Drift offline due to a security incident involving the theft of OAuth tokens and unauthorized access to Salesforce data. The breach began with the compromise of Salesloft's GitHub account, affecting multiple major tech companies, including Cloudflare, Google Workspace, PagerDuty, Palo Alto Networks, Proofpoint, SpyCloud, Tanium, Tenable, Zscaler, Tenable, Qualys, Rubrik, Spycloud, BeyondTrust, CyberArk, Elastic, Dynatrace, Cato Networks, and BugCrowd. The incident was attributed to a threat cluster tracked as UNC6395 and GRUB1. The breach occurred on September 5, 2025, affecting the marketing software-as-a-service product Drift. The attackers exploited vulnerabilities to steal authentication tokens, leading to unauthorized access to sensitive data. Salesloft has temporarily disabled Drift to conduct a comprehensive review and enhance security measures. The ShinyHunters extortion gang and threat actors claiming to be Scattered Spider were involved in the Salesloft Drift attacks, in addition to the previous Salesforce data theft attacks. The threat actors primarily focused on stealing support cases from Salesforce instances, which were then used to harvest credentials, authentication tokens, and other secrets shared in the support tickets. The threat actors' primary objective was to steal credentials, specifically focusing on sensitive information like AWS access keys, passwords, and Snowflake-related access tokens. The number of impacted companies has been updated to 29. Cloudflare disclosed that some customer support cases stored in Salesforce included configuration settings and 104 Cloudflare API tokens. Salesforce restored integration with the Salesloft platform, except for the Drift app, which remains disabled until further notice. The breach also affected Qantas, where executives had their short-term compensation reduced by 15% due to a data breach that impacted approximately 5.7 million passengers.
Timeline
-
09.09.2025 22:17 π° 1 articles Β· β± 7d ago
Qantas impacted by Salesloft breach, executives penalized
Qantas Group executives faced a 15% reduction in short-term compensation due to a data breach affecting approximately 5.7 million passengers. The breach was discovered on June 30, 2025, and was facilitated by the ShinyHunters collective, tracked as UNC6040, using Salesforce as a point of entry. The attackers obtained personal information, including names, email addresses, and frequent flyer numbers. Qantas took immediate action to contain the breach and implemented additional protections for customers. The airline also warned of increased scammer activity and urged customers to use two-factor authentication.
Show sources
- Qantas Reduces Executive Pay Following Cyberattack β www.darkreading.com β 09.09.2025 22:17
-
08.09.2025 18:26 π° 3 articles Β· β± 8d ago
Salesloft GitHub Account Compromised MarchβJune 2025
The threat actor UNC6395 compromised Salesloft's GitHub account as early as March 2025. The attack involved downloading data from multiple Salesloft repositories and conducting reconnaissance in the Salesloft and Drift application environments. UNC6395 gained access to Drift's AWS environment and stole OAuth tokens for Drift customers' technology integrations, not just Salesforce.
Show sources
- GitHub Account Compromise Led to Salesloft Drift Breach Affecting 22 Companies β thehackernews.com β 08.09.2025 18:26
- Salesloft: March GitHub repo breach led to Salesforce data theft attacks β www.bleepingcomputer.com β 08.09.2025 18:43
- Salesloft Breached via GitHub Account Compromise β www.darkreading.com β 08.09.2025 23:17
-
08.09.2025 13:02 π° 4 articles Β· β± 8d ago
Salesloft Disables Drift Following OAuth Token Theft
The number of impacted companies has been updated to 29. Cloudflare disclosed that some customer support cases stored in Salesforce included configuration settings and 104 Cloudflare API tokens. Salesforce restored integration with the Salesloft platform, except for the Drift app, which remains disabled until further notice.
Show sources
- β‘ Weekly Recap: Drift Breach Chaos, Zero-Days Active, Patch Warnings, Smarter Threats & More β thehackernews.com β 08.09.2025 13:02
- GitHub Account Compromise Led to Salesloft Drift Breach Affecting 22 Companies β thehackernews.com β 08.09.2025 18:26
- Salesloft: March GitHub repo breach led to Salesforce data theft attacks β www.bleepingcomputer.com β 08.09.2025 18:43
- Salesloft Breached via GitHub Account Compromise β www.darkreading.com β 08.09.2025 23:17
Information Snippets
-
Salesloft took Drift offline on September 5, 2025, due to a security breach.
First reported: 08.09.2025 13:02π° 3 sources, 4 articlesShow sources
- β‘ Weekly Recap: Drift Breach Chaos, Zero-Days Active, Patch Warnings, Smarter Threats & More β thehackernews.com β 08.09.2025 13:02
- GitHub Account Compromise Led to Salesloft Drift Breach Affecting 22 Companies β thehackernews.com β 08.09.2025 18:26
- Salesloft: March GitHub repo breach led to Salesforce data theft attacks β www.bleepingcomputer.com β 08.09.2025 18:43
- Salesloft Breached via GitHub Account Compromise β www.darkreading.com β 08.09.2025 23:17
-
The breach involved the theft of OAuth tokens, leading to unauthorized access to Salesforce data.
First reported: 08.09.2025 13:02π° 3 sources, 4 articlesShow sources
- β‘ Weekly Recap: Drift Breach Chaos, Zero-Days Active, Patch Warnings, Smarter Threats & More β thehackernews.com β 08.09.2025 13:02
- GitHub Account Compromise Led to Salesloft Drift Breach Affecting 22 Companies β thehackernews.com β 08.09.2025 18:26
- Salesloft: March GitHub repo breach led to Salesforce data theft attacks β www.bleepingcomputer.com β 08.09.2025 18:43
- Salesloft Breached via GitHub Account Compromise β www.darkreading.com β 08.09.2025 23:17
-
Multiple major tech companies were impacted, including Cloudflare, Google Workspace, PagerDuty, Palo Alto Networks, Proofpoint, SpyCloud, Tanium, Tenable, and Zscaler.
First reported: 08.09.2025 13:02π° 3 sources, 3 articlesShow sources
- β‘ Weekly Recap: Drift Breach Chaos, Zero-Days Active, Patch Warnings, Smarter Threats & More β thehackernews.com β 08.09.2025 13:02
- Salesloft: March GitHub repo breach led to Salesforce data theft attacks β www.bleepingcomputer.com β 08.09.2025 18:43
- Salesloft Breached via GitHub Account Compromise β www.darkreading.com β 08.09.2025 23:17
-
The breach was attributed to a threat cluster tracked as UNC6395 and GRUB1.
First reported: 08.09.2025 13:02π° 3 sources, 4 articlesShow sources
- β‘ Weekly Recap: Drift Breach Chaos, Zero-Days Active, Patch Warnings, Smarter Threats & More β thehackernews.com β 08.09.2025 13:02
- GitHub Account Compromise Led to Salesloft Drift Breach Affecting 22 Companies β thehackernews.com β 08.09.2025 18:26
- Salesloft: March GitHub repo breach led to Salesforce data theft attacks β www.bleepingcomputer.com β 08.09.2025 18:43
- Salesloft Breached via GitHub Account Compromise β www.darkreading.com β 08.09.2025 23:17
-
The incident highlights the risks associated with third-party integrations in enterprise defenses.
First reported: 08.09.2025 13:02π° 1 source, 1 articleShow sources
- β‘ Weekly Recap: Drift Breach Chaos, Zero-Days Active, Patch Warnings, Smarter Threats & More β thehackernews.com β 08.09.2025 13:02
-
The breach began with the compromise of Salesloft's GitHub account.
First reported: 08.09.2025 18:26π° 3 sources, 3 articlesShow sources
- GitHub Account Compromise Led to Salesloft Drift Breach Affecting 22 Companies β thehackernews.com β 08.09.2025 18:26
- Salesloft: March GitHub repo breach led to Salesforce data theft attacks β www.bleepingcomputer.com β 08.09.2025 18:43
- Salesloft Breached via GitHub Account Compromise β www.darkreading.com β 08.09.2025 23:17
-
The threat actor, tracked as UNC6395, accessed the Salesloft GitHub account from March through June 2025.
First reported: 08.09.2025 18:26π° 3 sources, 3 articlesShow sources
- GitHub Account Compromise Led to Salesloft Drift Breach Affecting 22 Companies β thehackernews.com β 08.09.2025 18:26
- Salesloft: March GitHub repo breach led to Salesforce data theft attacks β www.bleepingcomputer.com β 08.09.2025 18:43
- Salesloft Breached via GitHub Account Compromise β www.darkreading.com β 08.09.2025 23:17
-
The attackers downloaded content from multiple repositories, added a guest user, and established workflows.
First reported: 08.09.2025 18:26π° 3 sources, 3 articlesShow sources
- GitHub Account Compromise Led to Salesloft Drift Breach Affecting 22 Companies β thehackernews.com β 08.09.2025 18:26
- Salesloft: March GitHub repo breach led to Salesforce data theft attacks β www.bleepingcomputer.com β 08.09.2025 18:43
- Salesloft Breached via GitHub Account Compromise β www.darkreading.com β 08.09.2025 23:17
-
Reconnaissance activities occurred between March 2025 and June 2025 in the Salesloft and Drift application environments.
First reported: 08.09.2025 18:26π° 3 sources, 3 articlesShow sources
- GitHub Account Compromise Led to Salesloft Drift Breach Affecting 22 Companies β thehackernews.com β 08.09.2025 18:26
- Salesloft: March GitHub repo breach led to Salesforce data theft attacks β www.bleepingcomputer.com β 08.09.2025 18:43
- Salesloft Breached via GitHub Account Compromise β www.darkreading.com β 08.09.2025 23:17
-
The attackers accessed Drift's AWS environment and obtained OAuth tokens for Drift customers' technology integrations.
First reported: 08.09.2025 18:26π° 3 sources, 3 articlesShow sources
- GitHub Account Compromise Led to Salesloft Drift Breach Affecting 22 Companies β thehackernews.com β 08.09.2025 18:26
- Salesloft: March GitHub repo breach led to Salesforce data theft attacks β www.bleepingcomputer.com β 08.09.2025 18:43
- Salesloft Breached via GitHub Account Compromise β www.darkreading.com β 08.09.2025 23:17
-
Salesloft isolated the Drift infrastructure, application, and code, and took the application offline on September 5, 2025.
First reported: 08.09.2025 18:26π° 2 sources, 2 articlesShow sources
- GitHub Account Compromise Led to Salesloft Drift Breach Affecting 22 Companies β thehackernews.com β 08.09.2025 18:26
- Salesloft: March GitHub repo breach led to Salesforce data theft attacks β www.bleepingcomputer.com β 08.09.2025 18:43
-
Salesloft rotated credentials in the Salesloft environment and hardened the environment with improved segmentation controls.
First reported: 08.09.2025 18:26π° 2 sources, 2 articlesShow sources
- GitHub Account Compromise Led to Salesloft Drift Breach Affecting 22 Companies β thehackernews.com β 08.09.2025 18:26
- Salesloft: March GitHub repo breach led to Salesforce data theft attacks β www.bleepingcomputer.com β 08.09.2025 18:43
-
Salesloft recommended that all third-party applications integrated with Drift via API key revoke the existing key.
First reported: 08.09.2025 18:26π° 1 source, 1 articleShow sources
- GitHub Account Compromise Led to Salesloft Drift Breach Affecting 22 Companies β thehackernews.com β 08.09.2025 18:26
-
Salesforce restored integration with the Salesloft platform on September 7, 2025, except for the Drift app.
First reported: 08.09.2025 18:26π° 3 sources, 3 articlesShow sources
- GitHub Account Compromise Led to Salesloft Drift Breach Affecting 22 Companies β thehackernews.com β 08.09.2025 18:26
- Salesloft: March GitHub repo breach led to Salesforce data theft attacks β www.bleepingcomputer.com β 08.09.2025 18:43
- Salesloft Breached via GitHub Account Compromise β www.darkreading.com β 08.09.2025 23:17
-
The ShinyHunters extortion gang and threat actors claiming to be Scattered Spider were involved in the Salesloft Drift attacks, in addition to the previous Salesforce data theft attacks.
First reported: 08.09.2025 18:43π° 2 sources, 3 articlesShow sources
- Salesloft: March GitHub repo breach led to Salesforce data theft attacks β www.bleepingcomputer.com β 08.09.2025 18:43
- Salesloft Breached via GitHub Account Compromise β www.darkreading.com β 08.09.2025 23:17
- Qantas Reduces Executive Pay Following Cyberattack β www.darkreading.com β 09.09.2025 22:17
-
The threat actors primarily focused on stealing support cases from Salesforce instances, which were then used to harvest credentials, authentication tokens, and other secrets shared in the support tickets.
First reported: 08.09.2025 18:43π° 2 sources, 2 articlesShow sources
- Salesloft: March GitHub repo breach led to Salesforce data theft attacks β www.bleepingcomputer.com β 08.09.2025 18:43
- Salesloft Breached via GitHub Account Compromise β www.darkreading.com β 08.09.2025 23:17
-
The threat actors' primary objective was to steal credentials, specifically focusing on sensitive information like AWS access keys, passwords, and Snowflake-related access tokens.
First reported: 08.09.2025 18:43π° 2 sources, 2 articlesShow sources
- Salesloft: March GitHub repo breach led to Salesforce data theft attacks β www.bleepingcomputer.com β 08.09.2025 18:43
- Salesloft Breached via GitHub Account Compromise β www.darkreading.com β 08.09.2025 23:17
-
Salesloft conducted threat hunting with Mandiant and found no additional indicators of compromise, meaning that the threat actor does not have a foothold on its environment anymore.
First reported: 08.09.2025 18:43π° 1 source, 1 articleShow sources
- Salesloft: March GitHub repo breach led to Salesforce data theft attacks β www.bleepingcomputer.com β 08.09.2025 18:43
-
Mandiant has validated containment and segmentation, and engagement has now shifted to forensic quality assurance review.
First reported: 08.09.2025 18:43π° 1 source, 1 articleShow sources
- Salesloft: March GitHub repo breach led to Salesforce data theft attacks β www.bleepingcomputer.com β 08.09.2025 18:43
-
The threat actor UNC6395 compromised Salesloft's GitHub account as early as March 2025.
First reported: 08.09.2025 23:17π° 1 source, 1 articleShow sources
- Salesloft Breached via GitHub Account Compromise β www.darkreading.com β 08.09.2025 23:17
-
The attack involved downloading data from multiple Salesloft repositories and conducting reconnaissance in the Salesloft and Drift application environments between March and June 2025.
First reported: 08.09.2025 23:17π° 1 source, 1 articleShow sources
- Salesloft Breached via GitHub Account Compromise β www.darkreading.com β 08.09.2025 23:17
-
UNC6395 gained access to Drift's AWS environment and stole OAuth tokens for Drift customers' technology integrations, not just Salesforce.
First reported: 08.09.2025 23:17π° 1 source, 1 articleShow sources
- Salesloft Breached via GitHub Account Compromise β www.darkreading.com β 08.09.2025 23:17
-
Google Threat Intelligence Group (GTIG) urged all Salesloft Drift customers to treat any and all authentication tokens stored in or connected to the Drift platform as potentially compromised.
First reported: 08.09.2025 23:17π° 1 source, 1 articleShow sources
- Salesloft Breached via GitHub Account Compromise β www.darkreading.com β 08.09.2025 23:17
-
GitHub has become a significant attack vector for various threat actors, including code poisoning campaigns and developer-focused supply chain attacks.
First reported: 08.09.2025 23:17π° 1 source, 1 articleShow sources
- Salesloft Breached via GitHub Account Compromise β www.darkreading.com β 08.09.2025 23:17
-
Salesloft's GitHub account compromise led to the breach of hundreds of Salesforce instances, affecting multiple major tech companies, including Zscaler, Proofpoint, Palo Alto Networks, Cloudflare, Tenable, and Qualys.
First reported: 08.09.2025 23:17π° 1 source, 1 articleShow sources
- Salesloft Breached via GitHub Account Compromise β www.darkreading.com β 08.09.2025 23:17
-
Cloudflare disclosed that some customer support cases stored in Salesforce included configuration settings and 104 Cloudflare API tokens.
First reported: 08.09.2025 23:17π° 1 source, 1 articleShow sources
- Salesloft Breached via GitHub Account Compromise β www.darkreading.com β 08.09.2025 23:17
-
Salesforce restored integration with the Salesloft platform, except for the Drift app, which remains disabled until further notice.
First reported: 08.09.2025 23:17π° 1 source, 1 articleShow sources
- Salesloft Breached via GitHub Account Compromise β www.darkreading.com β 08.09.2025 23:17
-
The number of impacted companies has been updated to 29.
First reported: 08.09.2025 23:17π° 1 source, 1 articleShow sources
- Salesloft Breached via GitHub Account Compromise β www.darkreading.com β 08.09.2025 23:17
-
Qantas Group executives will have their short-term compensation reduced by 15% due to a data breach.
First reported: 09.09.2025 22:17π° 1 source, 1 articleShow sources
- Qantas Reduces Executive Pay Following Cyberattack β www.darkreading.com β 09.09.2025 22:17
-
The breach was discovered on June 30, 2025, affecting approximately 5.7 million passengers.
First reported: 09.09.2025 22:17π° 1 source, 1 articleShow sources
- Qantas Reduces Executive Pay Following Cyberattack β www.darkreading.com β 09.09.2025 22:17
-
The attackers obtained names, email addresses, and frequent flyer numbers for most affected customers.
First reported: 09.09.2025 22:17π° 1 source, 1 articleShow sources
- Qantas Reduces Executive Pay Following Cyberattack β www.darkreading.com β 09.09.2025 22:17
-
Some customers had additional personal information exposed, such as addresses, dates of birth, and phone numbers.
First reported: 09.09.2025 22:17π° 1 source, 1 articleShow sources
- Qantas Reduces Executive Pay Following Cyberattack β www.darkreading.com β 09.09.2025 22:17
-
Qantas warned of increased scammer activity and urged customers to use two-factor authentication.
First reported: 09.09.2025 22:17π° 1 source, 1 articleShow sources
- Qantas Reduces Executive Pay Following Cyberattack β www.darkreading.com β 09.09.2025 22:17
-
The breach was facilitated by the ShinyHunters collective, tracked as UNC6040, using Salesforce as a point of entry.
First reported: 09.09.2025 22:17π° 1 source, 1 articleShow sources
- Qantas Reduces Executive Pay Following Cyberattack β www.darkreading.com β 09.09.2025 22:17
-
Qantas took immediate action to contain the breach and implemented additional protections for customers.
First reported: 09.09.2025 22:17π° 1 source, 1 articleShow sources
- Qantas Reduces Executive Pay Following Cyberattack β www.darkreading.com β 09.09.2025 22:17
Similar Happenings
SlopAds Fraud Ring Exploits 224 Android Apps to Drive 2.3 Billion Daily Ad Bids
A fraudulent ad operation, SlopAds, has been identified, exploiting 224 Android apps to generate 2.3 billion ad bids daily. The apps, collectively downloaded 38 million times across 228 countries, use steganography and hidden WebViews to create fraudulent ad impressions and clicks. The operation was disrupted after Google removed the offending apps from the Play Store. The SlopAds campaign is notable for its sophisticated tactics, including conditional fraud execution and the use of AI-themed services for command and control. The fraudulent behavior is triggered only when apps are downloaded via ad clicks, making detection more challenging. The campaign's infrastructure includes multiple domains and a complex feedback loop designed to evade security researchers. The campaign's highest concentration of ad impressions originated from the United States (30%), followed by India (10%) and Brazil (7%).
Supply Chain Attack Targeting npm Registry Compromises 40 Packages
A supply chain attack targeting the npm registry has compromised over 187 packages maintained by multiple developers. The attack uses a malicious script (bundle.js) to steal credentials from developer machines. The compromised packages include various npm modules used in different projects. The attack is capable of targeting both Windows and Linux systems. The malicious script scans for secrets using TruffleHog's credential scanner and transmits them to an external server controlled by the attackers. Developers are advised to audit their environments and rotate credentials if the affected packages are present.
UNC6040 and UNC6395 Target Salesforce Platforms in Data Theft Campaigns
The FBI has issued an alert about two cybercriminal groups, UNC6040 and UNC6395, targeting Salesforce platforms for data theft and extortion. UNC6395 exploited compromised OAuth tokens for the Salesloft Drift application, while UNC6040 used vishing campaigns and modified Salesforce tools to breach Salesforce instances. Both groups have been active since at least October 2024, impacting multiple organizations. UNC6040 has been linked to extortion activities, with Google attributing these to a separate cluster, UNC6240, which has claimed to be the ShinyHunters group. The ShinyHunters group, along with Scattered Spider and LAPSUS$, recently announced they are going dark, but experts warn that the threat persists. UNC6040 impersonated corporate IT support personnel to gain access to Salesforce environments and used modified versions of Salesforce's Data Loader to exfiltrate data. Salesforce re-enabled integrations with Salesloft technologies, except for the Drift app, which remains disabled.
Fourth Spyware Campaign Targeting French Apple Users in 2025
Apple has notified French users of a fourth spyware campaign in 2025. The Computer Emergency Response Team of France (CERT-FR) confirmed the alerts on September 3, 2025. The campaign targets individuals based on their status or function, including journalists, lawyers, activists, politicians, and senior officials. The alerts are part of a series of notifications sent throughout the year, with previous alerts on March 5, April 29, and June 25. These alerts indicate that at least one device linked to the users' iCloud accounts may have been compromised in highly-targeted attacks. The campaign follows a previous incident involving a security flaw in WhatsApp (CVE-2025-55177) and an Apple iOS bug (CVE-2025-43300), which were used in zero-click attacks. Apple has been sending these notifications since November 2021. Apple introduced Memory Integrity Enforcement (MIE) in the latest iPhone models to combat memory corruption vulnerabilities.
Active exploitation of CVE-2025-5086 in DELMIA Apriso
CVE-2025-5086, a critical deserialization flaw in Dassault Systèmes DELMIA Apriso Manufacturing Operations Management (MOM) software, is being actively exploited. The vulnerability, with a CVSS score of 9.0, affects versions from Release 2020 through Release 2025. Exploitation attempts have been observed, targeting the /apriso/WebServices/FlexNetOperationsService.svc/Invoke endpoint with a Base64-encoded payload. The payload decodes to a GZIP-compressed Windows executable that deploys a malicious program designed to spy on user activities. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added the flaw to its Known Exploited Vulnerabilities (KEV) catalog, advising Federal Civilian Executive Branch (FCEB) agencies to apply updates by October 2, 2025. The malware, identified as Trojan.MSIL.Zapchast.gen, captures keyboard input, takes screenshots, and gathers information about active applications. This information is then sent to the attacker via various means, including email, FTP, and HTTP. The exploit involves sending a malicious SOAP request to vulnerable endpoints. The malicious requests were observed originating from the IP 156.244.33[.]162.