Palo Alto Networks

Palo Alto Networks

Palo Alto Networks fell victim to a sophisticated **supply chain cyberattack** after threat actors (UNC6395) exploited a **vulnerability in Salesloft Drift**, a third-party sales/marketing SaaS tool integrated with Salesforce. The attackers stole **OAuth tokens**, granting unauthorized access to Palo Alto’s **Salesforce instance**. While the breach was confined to **business contact details** (names, emails, job titles, phone numbers), **sales account records**, and **case metadata**, it exposed sensitive customer data tied to major tech firms. The company **disabled the compromised integration**, revoked affected tokens, and collaborated with Salesforce/Salesloft for forensic analysis. No evidence suggested misuse of the exposed data, but the incident underscored risks in **third-party dependencies**. Customers were notified, and internal safeguards were reviewed to mitigate future threats. The attack aligns with a broader trend targeting **Salesforce ecosystems**, including TransUnion’s recent breach affecting 4.4M US consumers.

Source: https://hackread.com/palo-alto-networks-zscaler-pagerduty-salesforce-data-breach/

TPRM report: https://www.rankiteo.com/company/palo-alto-networks

"id": "pal505090325",
"linkid": "palo-alto-networks",
"type": "Breach",
"date": "9/2025",
"severity": "85",
"impact": "4",
"explanation": "Attack with significant impact with customers data leaks"
{'affected_entities': [{'customers_affected': 'Not specified (business contact '
                                              'details exposed)',
                        'industry': 'Cybersecurity',
                        'location': 'Santa Clara, California, USA',
                        'name': 'Palo Alto Networks',
                        'size': 'Large Enterprise',
                        'type': 'Public Company'},
                       {'customers_affected': 'Not specified (business contact '
                                              'details exposed)',
                        'industry': 'Cybersecurity',
                        'location': 'San Jose, California, USA',
                        'name': 'Zscaler',
                        'size': 'Large Enterprise',
                        'type': 'Public Company'},
                       {'customers_affected': 'Not specified (business contact '
                                              'details exposed)',
                        'industry': 'IT Operations/Incident Response',
                        'location': 'San Francisco, California, USA',
                        'name': 'PagerDuty',
                        'size': 'Mid-to-Large Enterprise',
                        'type': 'Public Company'},
                       {'customers_affected': '4.4 million US consumers '
                                              '(including Social Security '
                                              'numbers)',
                        'industry': 'Credit Reporting',
                        'location': 'Chicago, Illinois, USA',
                        'name': 'TransUnion',
                        'size': 'Large Enterprise',
                        'type': 'Public Company'},
                       {'customers_affected': 'Hundreds of companies (via '
                                              'OAuth token theft)',
                        'industry': 'Sales Engagement Platform',
                        'location': 'Atlanta, Georgia, USA',
                        'name': 'Salesloft (Drift integration)',
                        'size': 'Mid-to-Large Enterprise',
                        'type': 'Private Company (SaaS)'}],
 'attack_vector': ['Third-Party Vulnerability Exploitation',
                   'OAuth Token Theft',
                   'Salesforce Integration Abuse'],
 'customer_advisories': ["PagerDuty: 'We will never contact anyone by phone to "
                         "request a password or any other secure details.'",
                         "Zscaler: 'No evidence of misuse found, but customers "
                         "should maintain heightened vigilance for phishing.'",
                         'Palo Alto Networks: Reviewing internal safeguards to '
                         'prevent future incidents.'],
 'data_breach': {'data_exfiltration': True,
                 'number_of_records_exposed': ['Undisclosed (Palo Alto '
                                               'Networks, Zscaler, PagerDuty)',
                                               '4.4 million (TransUnion)'],
                 'personally_identifiable_information': ['Names',
                                                         'Email addresses',
                                                         'Job titles',
                                                         'Phone numbers',
                                                         'Social Security '
                                                         'numbers (TransUnion '
                                                         'only)'],
                 'sensitivity_of_data': ['Moderate (business contacts)',
                                         'High (SSNs for TransUnion)'],
                 'type_of_data_compromised': ['Business contact details',
                                              'Sales account records',
                                              'Case metadata',
                                              'Social Security numbers '
                                              '(TransUnion only)']},
 'date_detected': '2025-08-20',
 'date_publicly_disclosed': '2025-08-23',
 'description': 'Hackers exploited the Salesloft Drift app to steal OAuth '
                'tokens and access Salesforce data, exposing customer details '
                'at major tech firms including Palo Alto Networks, Zscaler, '
                'and PagerDuty. The attack was a supply chain breach targeting '
                'a third-party sales/marketing SaaS application, leading to '
                'unauthorized access to Salesforce accounts of hundreds of '
                'companies. Exposed data included business contact details '
                '(names, emails, job titles, phone numbers) but no core '
                'products or infrastructure were compromised.',
 'impact': {'brand_reputation_impact': ['Potential erosion of trust in '
                                        'third-party integrations',
                                        'Reputational risk for affected firms '
                                        '(Palo Alto Networks, Zscaler, '
                                        'PagerDuty)'],
            'data_compromised': ['Business contact details (names, email '
                                 'addresses, job titles, phone numbers)',
                                 'Sales account records',
                                 'Case metadata'],
            'identity_theft_risk': ['Low (business contact details only)',
                                    'Phishing risk elevated'],
            'operational_impact': ['Heightened vigilance required for phishing',
                                   'Third-party risk investigations',
                                   'Customer notifications',
                                   'Authentication protocol reviews'],
            'systems_affected': ['Salesforce instances (via third-party '
                                 'integration)',
                                 'Salesloft Drift app']},
 'initial_access_broker': {'entry_point': 'Salesloft Drift (third-party SaaS '
                                          'application)',
                           'high_value_targets': ['Salesforce instances of '
                                                  'cybersecurity/tech firms']},
 'investigation_status': 'Ongoing (Google’s Threat Intelligence Group and '
                         'affected companies)',
 'lessons_learned': ['Third-party SaaS integrations introduce significant '
                     'supply chain risk, even for cybersecurity firms.',
                     'OAuth token management requires stricter oversight and '
                     'monitoring.',
                     'Rapid revocation of compromised tokens is critical to '
                     'limiting exposure.',
                     'Customer communication and transparency are essential to '
                     'maintaining trust post-breach.'],
 'motivation': ['Data Theft',
                'Potential Phishing/Follow-on Attacks',
                'Financial Gain (likely)'],
 'post_incident_analysis': {'corrective_actions': ['Disabled vulnerable '
                                                   'integrations (Palo Alto '
                                                   'Networks).',
                                                   'Revoked compromised OAuth '
                                                   'tokens.',
                                                   'Enhanced authentication '
                                                   'protocols (Zscaler).',
                                                   'Third-party risk '
                                                   'management investigations '
                                                   'launched.'],
                            'root_causes': ['Inadequate security controls for '
                                            'OAuth tokens in Salesloft Drift.',
                                            'Over-permissive third-party app '
                                            'integrations with Salesforce.',
                                            'Lack of real-time monitoring for '
                                            'anomalous token usage.']},
 'ransomware': {'data_exfiltration': True},
 'recommendations': ['Conduct third-party risk assessments for all SaaS '
                     'integrations, especially those with OAuth access.',
                     'Implement least-privilege access controls for '
                     'third-party apps connected to CRM systems like '
                     'Salesforce.',
                     'Monitor for anomalous OAuth token usage or unexpected '
                     'API calls from integrated apps.',
                     'Enhance authentication protocols for customer support '
                     'interactions to prevent social engineering.',
                     'Educate employees and customers on phishing risks '
                     'following data breaches involving contact details.'],
 'references': [{'date_accessed': '2025-08-23',
                 'source': 'PagerDuty Public Report'},
                {'date_accessed': '2025-08-23',
                 'source': 'Zscaler Official Blog'},
                {'date_accessed': '2025-08-23',
                 'source': 'Palo Alto Networks Customer Notification (via '
                           'LinkedIn)'},
                {'source': 'Google’s Threat Intelligence Group Investigation'}],
 'response': {'communication_strategy': ['Public disclosures (PagerDuty, '
                                         'Zscaler, Palo Alto Networks)',
                                         'Customer advisories (e.g., Palo Alto '
                                         'Networks via LinkedIn)',
                                         'Recommendations for heightened '
                                         'phishing vigilance'],
              'containment_measures': ['Disabled vulnerable Salesloft-Drift '
                                       'integration (Palo Alto Networks)',
                                       'Revoked affected OAuth tokens',
                                       'Launched third-party risk management '
                                       'investigation (Zscaler)'],
              'enhanced_monitoring': ['Heightened vigilance for phishing '
                                      '(recommended to customers)'],
              'incident_response_plan_activated': True,
              'remediation_measures': ['Strengthened customer authentication '
                                       'protocols (Zscaler)',
                                       'Reviewing internal safeguards (Palo '
                                       'Alto Networks)',
                                       'Customer notifications'],
              'third_party_assistance': ['Salesforce',
                                         'Salesloft',
                                         'Google’s Threat Intelligence Group']},
 'stakeholder_advisories': ['Customers advised to monitor for phishing '
                            'attempts (Zscaler, PagerDuty).',
                            'Palo Alto Networks notified impacted customers '
                            'directly.',
                            'TransUnion disclosed breach to affected 4.4 '
                            'million US consumers.'],
 'threat_actor': 'UNC6395',
 'title': 'Supply Chain Breach via Salesloft Drift Exploit Targeting '
          'Salesforce Data',
 'type': ['Supply Chain Attack', 'Data Breach', 'Unauthorized Access'],
 'vulnerability_exploited': "Unspecified vulnerability in Salesloft Drift's "
                            'OAuth token management'}
Great! Next, complete checkout for full access to Rankiteo Blog.
Welcome back! You've successfully signed in.
You've successfully subscribed to Rankiteo Blog.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info has been updated.
Your billing was not updated.