Salesloft

Salesloft

The attack on **Salesloft** began with the compromise of an internal **GitHub repository**, where attackers stole a high-privilege **OAuth token** granting access to its **Drift cloud application**. Exploiting Drift’s trusted integrations, the attackers pivoted to **Salesforce instances** of multiple high-profile customers—including **Palo Alto Networks, Cloudflare, Zscaler, and Tenable**—exfiltrating **customer conversation data, contact details, and sensitive business information**. The breach exposed a **supply-chain vulnerability**, where a single compromised AI-powered integration (Drift’s chatbot) enabled mass data theft across **700+ organizations**, including cybersecurity leaders. The attackers also harvested **OpenAI API credentials**, demonstrating the cascading risks of interconnected AI ecosystems. While companies like **Okta** mitigated damage via **IP allow-listing**, others faced **reputational harm, forensic costs, and erosion of customer trust**. The incident highlighted critical gaps in **third-party risk management, token security, and AI integration monitoring**, with long-term implications for enterprise security postures.

Source: https://www.trendmicro.com/en_us/research/25/i/ai-app-breach.html

TPRM report: https://www.rankiteo.com/company/salesloft

"id": "sal2862828092525",
"linkid": "salesloft",
"type": "Breach",
"date": "9/2025",
"severity": "100",
"impact": "5",
"explanation": "Attack threatening the organization's existence"
{'affected_entities': [{'customers_affected': '700+ (Indirectly via Drift '
                                              'Integration)',
                        'industry': 'Sales Engagement Platform',
                        'name': 'Salesloft',
                        'type': 'SaaS Provider'},
                       {'customers_affected': '700+ (Directly via Salesforce '
                                              'Integrations)',
                        'industry': 'Conversational Marketing/AI Chatbots',
                        'name': 'Drift',
                        'type': 'SaaS Provider'},
                       {'industry': 'Cybersecurity/Web Infrastructure',
                        'name': 'Cloudflare',
                        'type': 'Public Company'},
                       {'industry': 'Cybersecurity',
                        'name': 'Palo Alto Networks',
                        'type': 'Public Company'},
                       {'industry': 'Cybersecurity/Cloud Security',
                        'name': 'Zscaler',
                        'type': 'Public Company'},
                       {'industry': 'Cybersecurity/Vulnerability Management',
                        'name': 'Tenable',
                        'type': 'Public Company'},
                       {'industry': 'Cybersecurity/Email Security',
                        'name': 'Proofpoint',
                        'type': 'Public Company'},
                       {'industry': 'Cybersecurity/Identity Protection',
                        'name': 'SpyCloud',
                        'type': 'Private Company'},
                       {'customers_affected': '0 (Attack Attempted but '
                                              'Blocked)',
                        'industry': 'Identity Management',
                        'name': 'Okta',
                        'type': 'Public Company'}],
 'attack_vector': ['Compromised GitHub Repository',
                   'Stolen OAuth Token',
                   'Privilege Escalation via Drift Integration',
                   'AI-Powered Data Exfiltration'],
 'customer_advisories': ['Security Bulletins',
                         'Remediation Guidance',
                         'Compromised Data Notifications'],
 'data_breach': {'data_exfiltration': ['Confirmed (Systematic via Salesforce '
                                       'Integrations)'],
                 'file_types_exposed': ['Conversation Logs',
                                        'Contact Databases',
                                        'API Tokens',
                                        'Potentially Calendar/Email Data'],
                 'personally_identifiable_information': ['Names',
                                                         'Email Addresses',
                                                         'Potentially Phone '
                                                         'Numbers',
                                                         'Business Roles'],
                 'sensitivity_of_data': ['High (PII, Business Communications, '
                                         'Authentication Tokens)'],
                 'type_of_data_compromised': ['Customer Conversation Logs',
                                              'Contact Information',
                                              'API Credentials',
                                              'Salesforce Data']},
 'description': 'A sophisticated cyberattack began with the compromise of '
                "Salesloft's internal GitHub repository, where attackers stole "
                "an OAuth token granting privileged access to Salesloft's "
                'Drift account. This access was leveraged to exfiltrate data '
                'from connected Salesforce instances of over 700 '
                'organizations, including major cybersecurity firms like '
                'Cloudflare, Palo Alto Networks, and Zscaler. The breach '
                "exploited AI integrations' broad data access patterns and "
                'trust-based architectures, highlighting vulnerabilities in '
                'modern AI ecosystems. Okta was spared due to IP allow-listing '
                'controls.',
 'impact': {'brand_reputation_impact': ['Severe (Especially for Cybersecurity '
                                        'Firms)',
                                        'Loss of Customer Trust',
                                        'Increased Scrutiny of AI Security '
                                        'Practices'],
            'customer_complaints': ['Expected (Not Quantified)'],
            'data_compromised': ['Customer Conversation Data',
                                 'Contact Information',
                                 'Authentication Tokens (Including OpenAI API '
                                 'Credentials)',
                                 'Salesforce Instance Data'],
            'identity_theft_risk': ['High (Due to PII in Conversation Data)'],
            'legal_liabilities': ['Potential Regulatory Fines',
                                  'Contractual Breach Claims',
                                  'Litigation Risk'],
            'operational_impact': ['Forensic Investigations',
                                   'Customer Trust Erosion',
                                   'Integration Audits',
                                   'Security Control Overhauls'],
            'payment_information_risk': ['Low (Not Explicitly Mentioned)'],
            'systems_affected': ['Salesloft GitHub Repositories',
                                 'Drift Cloud Application',
                                 'Connected Salesforce Instances',
                                 'OpenAI API Integrations']},
 'initial_access_broker': {'backdoors_established': ['Stolen OAuth Token for '
                                                     'Drift Access'],
                           'entry_point': 'Salesloft Internal GitHub '
                                          'Repository',
                           'high_value_targets': ['Drift Cloud Application',
                                                  'Connected Salesforce '
                                                  'Instances',
                                                  'OpenAI API Credentials'],
                           'reconnaissance_period': 'March-June 2025 (3-4 '
                                                    'Months)'},
 'investigation_status': 'Ongoing (Forensic Analysis and Impact Assessment)',
 'lessons_learned': ['AI integrations expand attack surfaces beyond '
                     'traditional perimeters',
                     'Trust-based architectures create detection blind spots '
                     'for AI-powered exfiltration',
                     'Authentication tokens for AI systems must be treated as '
                     'crown jewels',
                     'IP allow-listing and geographic restrictions are '
                     'critical for high-privilege AI tokens',
                     'Integration lifecycle management is essential to prevent '
                     'stale credential exposure',
                     'AI behavior baselining is necessary to detect anomalous '
                     'data access patterns',
                     'Third-party AI vendors introduce supply chain risks that '
                     'require defense-in-depth'],
 'motivation': ['Data Theft',
                'Espionage',
                'Financial Gain (Potential)',
                'Supply Chain Disruption'],
 'post_incident_analysis': {'corrective_actions': ['Mandatory IP allow-listing '
                                                   'for all integration tokens',
                                                   'Implementation of '
                                                   'just-in-time access for AI '
                                                   'systems',
                                                   'Enhanced credential '
                                                   'rotation policies with '
                                                   'automated enforcement',
                                                   'AI-specific anomaly '
                                                   'detection for data access '
                                                   'patterns',
                                                   'Supply chain security '
                                                   'reviews for all AI vendors',
                                                   'Integration lifecycle '
                                                   'management automation',
                                                   'Zero-trust architecture '
                                                   'adoption for AI ecosystems',
                                                   'Reduced token permissions '
                                                   'to least-privilege for AI '
                                                   'integrations'],
                            'root_causes': ['Insufficient protection of '
                                            'high-privilege credentials in '
                                            'GitHub repositories',
                                            'Lack of IP restrictions on OAuth '
                                            'tokens',
                                            'Over-permissive API access for AI '
                                            'integrations',
                                            'Failure to deactivate former '
                                            'customer (SpyCloud) credentials',
                                            'Detection gaps for AI-powered '
                                            'data exfiltration patterns',
                                            'Inadequate segmentation between '
                                            'AI systems and core business '
                                            'data']},
 'ransomware': {'data_exfiltration': ['Confirmed (But Not '
                                      'Ransomware-Related)']},
 'recommendations': ['Implement IP allow-listing for all AI integration tokens',
                     'Enforce geographic restrictions on API access',
                     'Use time-based access windows for sensitive integrations',
                     'Segment networks processing sensitive data via AI '
                     'applications',
                     'Rotate OAuth tokens and API keys automatically with '
                     'short lifespans',
                     'Store high-privilege credentials in encrypted vaults or '
                     'HSMs',
                     'Monitor for unusual AI data consumption patterns '
                     '(spikes, off-hours, unusual sources)',
                     'Audit integration lifecycles to deactivate unused or '
                     'former vendor connections',
                     'Treat AI vendors as part of your critical supply chain '
                     'with corresponding security reviews',
                     'Adopt zero-trust principles for AI system '
                     'authentications',
                     'Conduct red-team exercises specifically targeting AI '
                     'integration pathways'],
 'references': [{'source': 'Incident Analysis Report (Hypothetical)'}],
 'regulatory_compliance': {'legal_actions': ['Expected (Not Yet Filed)'],
                           'regulations_violated': ['Potential GDPR (for EU '
                                                    'Customer Data)',
                                                    'CCPA (for California '
                                                    'Residents)',
                                                    'Industry-Specific '
                                                    'Compliance Standards'],
                           'regulatory_notifications': ['Likely Required (Not '
                                                        'Confirmed)']},
 'response': {'communication_strategy': ['Public Disclosures',
                                         'Customer Advisories',
                                         'Transparency Reports'],
              'containment_measures': ['Token Revocation',
                                       'Access Restrictions',
                                       'IP Allow-Listing (Okta)'],
              'enhanced_monitoring': ['AI Behavior Baselining',
                                      'Anomaly Detection for Data Access '
                                      'Patterns'],
              'incident_response_plan_activated': ['Forensic Investigations',
                                                   'Customer Notifications',
                                                   'Integration Audits'],
              'network_segmentation': ['Recommended for AI Applications'],
              'recovery_measures': ['System Restorations',
                                    'Customer Trust Rebuilding'],
              'remediation_measures': ['Credential Rotation',
                                       'Integration Lifecycle Reviews',
                                       'Security Control Enhancements'],
              'third_party_assistance': ['Likely (Not Specified)']},
 'stakeholder_advisories': ['Customer Notifications Issued',
                            'Industry-Wide Alerts Recommended'],
 'title': 'AI-Powered Supply Chain Attack via Compromised Salesloft-Drift '
          'Integration (2025)',
 'type': ['Supply Chain Attack',
          'Data Breach',
          'Unauthorized Access',
          'AI Integration Exploitation'],
 'vulnerability_exploited': ['Improper Credential Management',
                             'Over-Permissive API Access',
                             'Lack of IP Restrictions on Tokens',
                             'Insufficient Integration Lifecycle Management']}
Great! Next, complete checkout for full access to Rankiteo Blog.
Welcome back! You've successfully signed in.
You've successfully subscribed to Rankiteo Blog.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info has been updated.
Your billing was not updated.