Site icon Cybercory

Breaking News: Supply-Chain Breach Hits Palo Alto Networks and Zscaler via Salesloft’s Drift App

A widespread supply-chain cyberattack has unfolded, centering on OAuth tokens stolen from the Salesloft – Drift application – a third-party AI-powered sales tool that integrates deeply with platforms such as Salesforce, Slack, and Google Workspace. The campaign, attributed to the threat group UNC6395, ran from August 8 to August 18, 2025, and has impacted hundreds of organizations globally.

Security researchers from Google’s Threat Intelligence Group and Mandiant observed mass exfiltration of sensitive data from connected Salesforce instances, utilizing compromised tokens to query and extract information including AWS access keys, Snowflake credentials, internal support case details, business contact information, and more.

Recognizing the severity, Salesforce disabled all Salesloft integrations, and Salesloft revoked all Drift-related OAuth tokens and removed the app from AppExchange on August 20, 2025.

Impact on Zscaler

Zscaler confirmed its Salesforce instance was accessed due to stolen Drift credentials, though its internal systems, services, and infrastructure remained untouched.

Exposed Data Includes:

Zscaler has found no evidence of misuse so far. In response, the company has revoked Drift access, rotated API tokens, launched an in-depth investigation with Salesforce, enhanced its third-party risk management, and tightened customer authentication protocols to guard against phishing and social engineering attempts.

Impact on Palo Alto Networks

Palo Alto Networks also acknowledged being among the hundreds of affected organizations whose Salesforce CRM was compromised.

Exposed Data Includes:

Upon discovering the breach, the company severed the Drift integration and deployed their Unit 42 security team for a full investigation. They are reaching out to customers who may have had more sensitive data exposed.

Broader Context & Ongoing Threat Landscape

Recommended Actions for Organizations

  1. Rotate and Revoke All Drift Tokens
    Immediately revoke OAuth tokens associated with Drift integrations and rotate any related credentials across Salesforce, Google Workspace, AWS, Snowflake, and other interconnected systems.
  2. Audit Salesforce Objects
    Inspect Cases, Accounts, Users, Opportunities, and custom fields for exposed secrets or abnormal data patterns.
  3. Enforce Least-Privilege and Visibility for OAuth/Non-Human Identities
    Maintain strict data access scopes, continuous visibility into third-party app permissions, and enforce robust monitoring of behavior.
  4. Harden Third-Party Risk Management Practices
    Include contractual assurance, regular auditing, and rapid removal pathways for integrations.
  5. Educate Teams on Phishing Exposure
    Given contact data compromise, prepare for phishing or social engineering attempts and reinforce authentication vigilance.

Why This Matters To MEA Region Security Professionals

In Summary

Exit mobile version