Salesloft

Salesloft

The **Salesloft breach (August 8–18, 2025)** was a sophisticated **supply chain attack** targeting its **GitHub account and OAuth tokens** linked to the **Drift chatbot integration**. Exploiting these tokens, attackers bypassed multi-factor authentication (MFA) and gained unauthorized access to **over 700 organizations**, including major cybersecurity firms like **Cloudflare, Palo Alto Networks, and Google**. The breach involved **automated data exfiltration** using Python tools, deletion of query logs to evade detection, and compromise of **Salesforce instances**, exposing **customer relationship data, support case details, and sensitive credentials** (API keys, passwords). The incident triggered **class-action lawsuits**, regulatory scrutiny (GDPR/CCPA), and highlighted critical gaps in **third-party integration security, OAuth governance, and cross-platform data visibility**. The attack underscored risks in **SaaS ecosystems**, where interconnected platforms amplify exposure to **fourth/fifth-party vulnerabilities** and **zero-trust failures**.

Source: https://www.jdsupra.com/legalnews/inside-the-salesloft-drift-breach-5165814/

TPRM report: https://www.rankiteo.com/company/salesloft

"id": "sal4092740091625",
"linkid": "salesloft",
"type": "Breach",
"date": "8/2025",
"severity": "100",
"impact": "5",
"explanation": "Attack threatening the organization's existence"
{'affected_entities': [{'customers_affected': '700+ organizations',
                        'industry': 'Sales Engagement Platform',
                        'location': 'Atlanta, Georgia, USA',
                        'name': 'Salesloft',
                        'type': 'SaaS Provider'},
                       {'industry': 'Conversational Marketing/Chatbot',
                        'location': 'Boston, Massachusetts, USA',
                        'name': 'Drift',
                        'type': 'SaaS Provider'},
                       {'industry': 'Web Infrastructure Security',
                        'location': 'San Francisco, California, USA',
                        'name': 'Cloudflare',
                        'type': 'Cybersecurity Firm'},
                       {'industry': 'Network Security',
                        'location': 'Santa Clara, California, USA',
                        'name': 'Palo Alto Networks',
                        'type': 'Cybersecurity Firm'},
                       {'industry': 'Cloud Security',
                        'location': 'San Jose, California, USA',
                        'name': 'Zscaler',
                        'type': 'Cybersecurity Firm'},
                       {'industry': 'Search/Cloud Services',
                        'location': 'Mountain View, California, USA',
                        'name': 'Google',
                        'type': 'Tech Giant'},
                       {'industry': 'Email Security',
                        'location': 'Sunnyvale, California, USA',
                        'name': 'Proofpoint',
                        'type': 'Cybersecurity Firm'},
                       {'industry': 'Identity Protection',
                        'location': 'Austin, Texas, USA',
                        'name': 'SpyCloud',
                        'type': 'Cybersecurity Firm'},
                       {'industry': 'Endpoint Security',
                        'location': 'Emeryville, California, USA',
                        'name': 'Tanium',
                        'type': 'Cybersecurity Firm'},
                       {'industry': 'Vulnerability Management',
                        'location': 'Columbia, Maryland, USA',
                        'name': 'Tenable',
                        'type': 'Cybersecurity Firm'},
                       {'customers_affected': '700+ organizations (via '
                                              'integrated instances)',
                        'industry': 'Customer Relationship Management (CRM)',
                        'location': 'San Francisco, California, USA',
                        'name': 'Salesforce',
                        'type': 'SaaS Provider'}],
 'attack_vector': ['Compromised GitHub Account',
                   'OAuth Token Abuse',
                   'Third-Party Integration Exploitation',
                   'Automated Python Tools',
                   'Anti-Forensics Techniques (Log Deletion)'],
 'customer_advisories': ['Guidance on Password/Token Rotation',
                         'Recommendations for Monitoring Suspicious Activity',
                         'Support for Affected CRM Data'],
 'data_breach': {'data_exfiltration': True,
                 'personally_identifiable_information': True,
                 'sensitivity_of_data': ['High (includes PII, credentials, and '
                                         'proprietary business data)'],
                 'type_of_data_compromised': ['CRM Data',
                                              'Support Case Records',
                                              'Credentials (API keys, '
                                              'passwords)',
                                              'Business Communications']},
 'date_detected': '2025-08-18',
 'description': 'A sophisticated supply chain attack targeting Salesloft and '
                'Drift integrations, orchestrated by UNC6395 (GRUB1), '
                'compromised OAuth tokens to access hundreds of Salesforce '
                'instances. The breach exposed vulnerabilities in third-party '
                'integration security, affecting over 700 organizations, '
                'including major cybersecurity firms. Attackers used automated '
                'tools and anti-forensics techniques to extract data while '
                'evading detection for over two weeks (August 8–18, 2025). '
                'Initial access was gained via a compromised GitHub account '
                'between March and June 2025.',
 'impact': {'brand_reputation_impact': ['Significant Reputational Damage to '
                                        'Salesloft, Drift, and Affected Firms',
                                        'Erosion of Trust in SaaS Supply Chain '
                                        'Security'],
            'customer_complaints': ['Class-Action Lawsuits Filed (including '
                                    'against Salesforce)'],
            'data_compromised': ['Customer Relationship Management (CRM) Data',
                                 'Support Case Information',
                                 'Sensitive Credentials (API keys, passwords)',
                                 'Business Communications'],
            'identity_theft_risk': ['High (due to exposed credentials and PII '
                                    'in support cases)'],
            'legal_liabilities': ['Multiple Class-Action Lawsuits',
                                  'Potential Regulatory Fines (GDPR, CCPA, '
                                  'etc.)',
                                  'Contractual Liability Disputes'],
            'operational_impact': ['Disruption of CRM and Support Operations',
                                   'Incident Response Across Multiple Vendors',
                                   'Legal and Compliance Burden'],
            'systems_affected': ['Salesforce Instances (700+ organizations)',
                                 'Drift Chatbot Integration',
                                 'GitHub Account (initial compromise)']},
 'initial_access_broker': {'backdoors_established': ['Persistent OAuth Token '
                                                     'Access',
                                                     'Automated Data '
                                                     'Extraction Scripts'],
                           'data_sold_on_dark_web': ['Likely (given the '
                                                     'sensitivity of '
                                                     'exfiltrated '
                                                     'credentials)'],
                           'entry_point': 'Compromised Salesloft GitHub '
                                          'Account (March–June 2025)',
                           'high_value_targets': ['Salesforce Instances of '
                                                  'Cybersecurity Firms',
                                                  'CRM Data',
                                                  'Support Case Histories'],
                           'reconnaissance_period': 'March 2025 – August 2025 '
                                                    '(5+ months)'},
 'investigation_status': 'Ongoing (as of 2025)',
 'lessons_learned': ['OAuth tokens require the same security rigor as '
                     'passwords, including MFA and regular rotation.',
                     'Third-party integration security must be elevated to a '
                     'board-level priority with dedicated oversight.',
                     'Supply chain risks extend beyond direct vendors to '
                     'fourth/fifth-party SaaS ecosystems.',
                     'Anti-forensics techniques (e.g., log deletion) can delay '
                     'detection, necessitating enhanced monitoring.',
                     'Data shared via external platforms (e.g., chatbots) may '
                     'contain sensitive information requiring classification '
                     'and protection.',
                     'eDiscovery preparedness must account for multi-platform, '
                     'cross-jurisdictional breach responses.'],
 'motivation': ['Data Exfiltration',
                'Espionage',
                'Potential Financial Gain (via dark web data sales)'],
 'post_incident_analysis': {'corrective_actions': ['Mandate **MFA for all '
                                                   'OAuth token usage** and '
                                                   'treat tokens as high-value '
                                                   'credentials.',
                                                   'Implement **real-time '
                                                   'monitoring** for anomalous '
                                                   'OAuth/API activity with '
                                                   'automated alerts.',
                                                   'Enforce **least-privilege '
                                                   'access** for third-party '
                                                   'integrations, regularly '
                                                   'auditing permission '
                                                   'scopes.',
                                                   'Develop **dedicated supply '
                                                   'chain risk management '
                                                   'programs** for SaaS '
                                                   'ecosystems.',
                                                   'Enhance **log retention '
                                                   'and anti-tampering '
                                                   'controls** to prevent '
                                                   'evidence destruction.',
                                                   'Establish **cross-vendor '
                                                   'incident response '
                                                   'playbooks** for '
                                                   'coordinated breach '
                                                   'handling.',
                                                   'Integrate **information '
                                                   'governance** with '
                                                   'cybersecurity to classify '
                                                   'and protect data in shared '
                                                   'environments.',
                                                   'Conduct **regular red-team '
                                                   'exercises** targeting '
                                                   'third-party integration '
                                                   'attack surfaces.'],
                            'root_causes': ['Inadequate protection of GitHub '
                                            'credentials leading to initial '
                                            'compromise.',
                                            'Lack of MFA enforcement for OAuth '
                                            'tokens, allowing bypass of '
                                            'authentication controls.',
                                            'Insufficient monitoring of '
                                            'third-party integration activity '
                                            '(e.g., Drift-Salesforce OAuth '
                                            'flows).',
                                            'Over-permissioned OAuth tokens '
                                            'with excessive data access '
                                            'scopes.',
                                            'Delayed detection due to '
                                            'anti-forensics techniques (log '
                                            'deletion).',
                                            'Gaps in cross-platform visibility '
                                            'for data flows in SaaS '
                                            'ecosystems.']},
 'ransomware': {'data_exfiltration': True},
 'recommendations': ['Implement **strict OAuth token lifecycle management** '
                     '(rotation, scoped permissions, real-time monitoring).',
                     'Adopt **zero-trust access controls** for all third-party '
                     'integrations, treating them as untrusted by default.',
                     'Expand **third-party risk assessments** to include '
                     'fourth/fifth-party SaaS dependencies.',
                     'Develop **cross-platform visibility tools** to track '
                     'data flows across interconnected systems.',
                     'Establish **pre-negotiated breach response protocols** '
                     'with vendors, including liability frameworks.',
                     'Enhance **legal hold procedures** for multi-tenant cloud '
                     'environments to ensure evidence integrity.',
                     'Invest in **automated anomaly detection** for OAuth '
                     'token usage and API activity.',
                     'Conduct **regular audits** of third-party integrations '
                     'and their permission scopes.',
                     'Train employees on **secure data-sharing practices** via '
                     'external platforms (e.g., chatbots, support tools).',
                     'Integrate **information governance** with cybersecurity '
                     'to classify and protect data in SaaS environments.'],
 'references': [{'date_accessed': '2025',
                 'source': 'HaystackID/ComplexDiscovery OÜ'}],
 'regulatory_compliance': {'legal_actions': ['Class-Action Lawsuits (e.g., '
                                             'against Salesforce)',
                                             'Regulatory Investigations '
                                             '(Expected)'],
                           'regulations_violated': ['Potential GDPR (EU)',
                                                    'CCPA (California)',
                                                    'Industry-Specific Data '
                                                    'Protection Laws'],
                           'regulatory_notifications': ['Ongoing (GDPR, CCPA, '
                                                        'etc.)']},
 'response': {'communication_strategy': ['Public Disclosure (via '
                                         'HaystackID/ComplexDiscovery)',
                                         'Customer Advisories',
                                         'Regulatory Notifications'],
              'containment_measures': ['OAuth Token Revocation',
                                       'Disabling Compromised Integrations',
                                       'Isolating Affected Systems'],
              'enhanced_monitoring': ['Real-Time OAuth Token Activity '
                                      'Monitoring',
                                      'Anomalous API Call Detection'],
              'incident_response_plan_activated': True,
              'network_segmentation': ['Isolation of Compromised SaaS '
                                       'Integrations'],
              'recovery_measures': ['Restoration of Affected Salesforce '
                                    'Instances',
                                    'Customer Notification and Support',
                                    'Legal Hold Procedures for eDiscovery'],
              'remediation_measures': ['Token Lifecycle Management '
                                       'Enhancements',
                                       'Zero-Trust Access Controls for '
                                       'Third-Party Integrations',
                                       'Expanded Monitoring of OAuth Activity'],
              'third_party_assistance': ['Cybersecurity Firms (e.g., '
                                         'Cloudflare, Palo Alto Networks)',
                                         'Legal Counsel',
                                         'Forensic Investigators']},
 'stakeholder_advisories': ['Customer Notifications Issued',
                            'Regulatory Disclosures in Progress',
                            'Legal Counsel Engaged for Litigation '
                            'Preparedness'],
 'threat_actor': ['UNC6395', 'GRUB1 (Cloudflare designation)'],
 'title': 'Salesloft Drift Supply Chain Breach (2025)',
 'type': ['Supply Chain Attack',
          'Unauthorized Access',
          'Data Breach',
          'OAuth Token Exploitation'],
 'vulnerability_exploited': ['Weak OAuth Token Management',
                             'Lack of MFA for OAuth Tokens',
                             'Insufficient Third-Party Integration Monitoring',
                             'Inadequate Log Retention']}
Great! Next, complete checkout for full access to Rankiteo Blog.
Welcome back! You've successfully signed in.
You've successfully subscribed to Rankiteo Blog.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info has been updated.
Your billing was not updated.