Salesforce

Salesforce

Salesforce experienced a data breach originating from a third-party provider, **SalesLoft**, specifically via its **Drift app**—an integration used for automated customer communications. The breach was executed by the hacker group **ShinyHunters**, who exploited compromised **GitHub credentials** at SalesLoft between **March and June**, stealing tokens linking Drift to Salesforce environments. This allowed attackers to infiltrate **Drift’s AWS environment**, obtaining **OAuth tokens** from multiple customer organizations, including **Cloudflare, Zscaler, Palo Alto Networks, and others**.The stolen data primarily included **customer contact details, basic IT support information, access tokens, and IT configuration details**. While Salesforce confirmed no direct vulnerability in its own systems, the breach exposed **CRM fields, support cases, and integration data** across **hundreds of affected organizations**. Salesforce refused to pay ransom demands, emphasizing a **no-negotiation stance** against extortion. The **Drift app remains disabled**, and affected customers were advised to **renew access tokens** to mitigate further risks. The full scope of impacted customers and long-term consequences remain undisclosed.

Source: https://www.techzine.eu/news/security/135246/salesforce-refuses-to-give-in-to-extortion-after-salesloft-data-breach/

TPRM report: https://www.rankiteo.com/company/salesforce

"id": "sal3132231100825",
"linkid": "salesforce",
"type": "Breach",
"date": "3/2025",
"severity": "85",
"impact": "4",
"explanation": "Attack with significant impact with customers data leaks"
{'affected_entities': [{'customers_affected': 'Unknown (Hundreds of '
                                              'organizations)',
                        'industry': 'Cloud Computing / SaaS',
                        'location': 'San Francisco, California, USA',
                        'name': 'Salesforce',
                        'size': 'Enterprise (150,000+ employees)',
                        'type': 'CRM Provider'},
                       {'customers_affected': 'Unknown (Via Drift App)',
                        'industry': 'Sales Technology',
                        'location': 'Atlanta, Georgia, USA',
                        'name': 'SalesLoft',
                        'size': 'Mid-Large (500+ employees)',
                        'type': 'Sales Engagement Platform'},
                       {'industry': 'Cybersecurity',
                        'location': 'San Francisco, California, USA',
                        'name': 'Cloudflare',
                        'size': 'Enterprise',
                        'type': 'Web Infrastructure & Security'},
                       {'industry': 'Cybersecurity',
                        'location': 'San Jose, California, USA',
                        'name': 'Zscaler',
                        'size': 'Enterprise',
                        'type': 'Cloud Security'},
                       {'industry': 'Network Security',
                        'location': 'Santa Clara, California, USA',
                        'name': 'Palo Alto Networks',
                        'size': 'Enterprise',
                        'type': 'Cybersecurity'},
                       {'industry': 'Cybersecurity',
                        'location': 'Petah Tikva, Israel / Newton, '
                                    'Massachusetts, USA',
                        'name': 'CyberArk',
                        'size': 'Enterprise',
                        'type': 'Privileged Access Security'},
                       {'industry': 'Cloud Data Protection',
                        'location': 'Palo Alto, California, USA',
                        'name': 'Rubrik',
                        'size': 'Mid-Large',
                        'type': 'Data Management & Security'},
                       {'industry': 'IT Infrastructure',
                        'location': 'San Jose, California, USA',
                        'name': 'Nutanix',
                        'size': 'Enterprise',
                        'type': 'Hybrid Cloud Computing'},
                       {'industry': 'Networking & 5G',
                        'location': 'Stockholm, Sweden',
                        'name': 'Ericsson',
                        'size': 'Enterprise',
                        'type': 'Telecommunications'},
                       {'industry': 'Software Development',
                        'location': 'Sunnyvale, California, USA',
                        'name': 'JFrog',
                        'size': 'Mid-Large',
                        'type': 'DevOps Platform'}],
 'attack_vector': ['Compromised GitHub Account',
                   'Stolen OAuth Tokens',
                   'AWS Environment Infiltration',
                   'Third-Party App Exploitation (Drift)'],
 'customer_advisories': ['Token renewal instructions',
                         'Support channels for affected organizations'],
 'data_breach': {'data_exfiltration': True,
                 'number_of_records_exposed': 'Unknown (Hundreds of '
                                              'organizations affected)',
                 'personally_identifiable_information': ['Limited (Primarily '
                                                         'Corporate PII)'],
                 'sensitivity_of_data': ['Moderate (Corporate IT and Customer '
                                         'Data)'],
                 'type_of_data_compromised': ['Customer Contact Details',
                                              'IT Support Information',
                                              'OAuth Tokens',
                                              'IT Configurations',
                                              'CRM Data',
                                              'Support Cases']},
 'description': 'Salesforce informed customers that it will not pay ransom to '
                'hackers (ShinyHunters) threatening to publish stolen customer '
                'data. The breach originated from a security incident at '
                'third-party provider SalesLoft, specifically its Drift app '
                '(integrated with Salesforce for automated customer '
                'communications). Attackers accessed SalesLoft’s GitHub '
                'account (March–June), stole OAuth tokens linking Drift to '
                'Salesforce environments, and penetrated Drift’s AWS '
                'environment to exfiltrate data from hundreds of '
                'organizations, including Cloudflare, Zscaler, and Palo Alto '
                'Networks. Stolen data included customer contact details, IT '
                'support info, access tokens, and IT configurations. '
                'Salesforce disabled the Drift app and is supporting affected '
                'customers without negotiating with attackers.',
 'impact': {'brand_reputation_impact': ['Public Refusal to Pay Ransom',
                                        'Third-Party Trust Erosion',
                                        'Media Coverage (Bloomberg, Google '
                                        'Threat Intelligence)'],
            'data_compromised': ['Customer Contact Details',
                                 'IT Support Information',
                                 'Access Tokens',
                                 'IT Configurations',
                                 'CRM Fields',
                                 'Support Cases',
                                 'Integration Data'],
            'identity_theft_risk': ['Low (Primarily Corporate Data)'],
            'operational_impact': ['Disabled Drift App Integration',
                                   'Token Renewal Required for Customers',
                                   'Ongoing Customer Support Efforts'],
            'systems_affected': ['SalesLoft Drift App',
                                 'Salesforce Integrations',
                                 'Drift’s AWS Environment',
                                 'GitHub Account (SalesLoft)']},
 'initial_access_broker': {'backdoors_established': ['Stolen OAuth Tokens '
                                                     '(Persistent Access)'],
                           'data_sold_on_dark_web': ['Threatened by '
                                                     'ShinyHunters (not yet '
                                                     'confirmed)'],
                           'entry_point': 'SalesLoft GitHub Account '
                                          '(Compromised March–June 2024)',
                           'high_value_targets': ['Salesforce Integrations',
                                                  'Drift App AWS Environment',
                                                  'Customer CRM Data'],
                           'reconnaissance_period': 'Likely conducted prior to '
                                                    'March 2024 (exact '
                                                    'duration unknown)'},
 'investigation_status': 'Ongoing (SalesLoft has not publicly responded; '
                         'Salesforce supporting customers)',
 'lessons_learned': ['Third-party app integrations introduce significant risk; '
                     'rigorous vetting and monitoring are critical.',
                     'OAuth token management requires stricter controls (e.g., '
                     'rotation, least-privilege access).',
                     'GitHub account security is a high-value target for '
                     'attackers; MFA and access logging are essential.',
                     'Public refusal to pay ransom can deter attackers but may '
                     'escalate data leak risks.'],
 'motivation': ['Financial Extortion', 'Data Theft for Dark Web Sale'],
 'post_incident_analysis': {'corrective_actions': ['Salesforce disabled Drift '
                                                   'app and mandated token '
                                                   'renewal.',
                                                   'SalesLoft likely reviewing '
                                                   'GitHub security and token '
                                                   'management (unconfirmed).',
                                                   'Affected customers advised '
                                                   'to rotate credentials and '
                                                   'audit integrations.'],
                            'root_causes': ['Inadequate security controls for '
                                            'SalesLoft’s GitHub account (e.g., '
                                            'lack of MFA, monitoring).',
                                            'Overprivileged OAuth tokens with '
                                            'prolonged validity.',
                                            'Lack of segmentation between '
                                            'Drift app and Salesforce customer '
                                            'environments.',
                                            'Delayed detection of GitHub '
                                            'account compromise (March–June '
                                            '2024).']},
 'ransomware': {'data_exfiltration': True, 'ransom_demanded': True},
 'recommendations': ['Conduct third-party security audits for all integrated '
                     'apps, especially those with OAuth access.',
                     'Implement automated token rotation and anomaly detection '
                     'for cloud environments.',
                     'Enhance GitHub security with mandatory MFA, IP '
                     'restrictions, and regular access reviews.',
                     'Develop a unified incident response plan for supply '
                     'chain attacks involving multiple vendors.',
                     'Proactively communicate with customers about breach '
                     'scope and mitigation steps to maintain trust.'],
 'references': [{'source': 'Bloomberg'},
                {'date_accessed': 'August 2024',
                 'source': 'Google Threat Intelligence Group'}],
 'response': {'communication_strategy': ['Internal Memo (Bloomberg-Leaked)',
                                         'Public Statement on Non-Payment of '
                                         'Ransom',
                                         'Customer Advisories'],
              'containment_measures': ['Disabled Drift App Integration',
                                       'Token Renewal Mandate for Customers'],
              'enhanced_monitoring': ['Likely (Implied by Google Threat '
                                      'Intelligence Collaboration)'],
              'incident_response_plan_activated': True,
              'recovery_measures': ['Reactivated SalesLoft Integrations '
                                    '(Except Drift)'],
              'remediation_measures': ['Customer Support Outreach',
                                       'OAuth Token Rotation'],
              'third_party_assistance': ['Google Threat Intelligence Group '
                                         '(Warnings)']},
 'stakeholder_advisories': ['Salesforce internal memo (leaked to Bloomberg)',
                            'Customer notifications for token renewal'],
 'threat_actor': 'ShinyHunters',
 'title': "Salesforce Data Breach via SalesLoft's Drift App by ShinyHunters",
 'type': ['Data Breach',
          'Third-Party Compromise',
          'Credential Theft',
          'OAuth Token Abuse'],
 'vulnerability_exploited': ['Improper Token Management',
                             'GitHub Account Security Weakness',
                             'Third-Party Integration Risks']}
Great! Next, complete checkout for full access to Rankiteo Blog.
Welcome back! You've successfully signed in.
You've successfully subscribed to Rankiteo Blog.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info has been updated.
Your billing was not updated.