#1 Middle East & Africa Trusted Cybersecurity News & Magazine |

35 C
Dubai
Thursday, September 11, 2025
HomeBreachedTenable and Qualys Disclose Impact from Salesloft Drift Supply-Chain Breach

Tenable and Qualys Disclose Impact from Salesloft Drift Supply-Chain Breach

Date:

Related stories

spot_imgspot_imgspot_imgspot_img

Two leading cybersecurity firms, Tenable and Qualys, have confirmed exposure from the ongoing Salesloft Drift supply-chain incident that has already impacted Palo Alto Networks, Zscaler, and hundreds of global organizations. The breach, which stems from OAuth token theft linked to the Drift marketing application integrated with Salesforce, highlights the systemic risks posed by third-party SaaS tools.

Both companies have emphasized that core platforms, products, and customer data remain unaffected. Still, the incident underscores the growing attack surface introduced by cloud-based integrations and the need for stronger third-party risk management.

Tenable’s Response

According to Tenable, the attackers gained unauthorized access to portions of its Salesforce data through compromised Drift credentials.

Information accessed included:

  • Customer support case subject lines and initial descriptions
  • Common business contact details (names, email addresses, phone numbers, locations)

The company stated there is no evidence of misuse of this information so far. Importantly, Tenable confirmed that its products and the Tenable product suite were not impacted.

To contain the threat, Tenable has:

  • Revoked and rotated all potentially compromised credentials
  • Hardened its Salesforce and connected environments
  • Disabled and removed the Drift app entirely
  • Applied known indicators of compromise (IoCs)
  • Strengthened continuous monitoring with SaaS Security Posture Management (SSPM)

Tenable reaffirmed its commitment to transparency and pledged ongoing updates as the investigation continues.

Qualys’ Response

Qualys also confirmed being impacted, but stressed that there was no effect on its production environments, codebase, or customer data hosted on the Qualys Cloud Platform, Agents, or Scanners.

The breach was confined to its Salesforce environment, with unauthorized actors obtaining limited access to Salesforce data via Drift tokens.

Actions taken by Qualys include:

  • Disabling all Drift integrations with Salesforce
  • Launching a detailed investigation in collaboration with Salesforce
  • Engaging Mandiant for third-party forensic support
  • Reinforcing controls to prevent recurrence

Qualys assured customers that its services remain fully operational and unaffected.

Broader Impact and Industry Concerns

This incident highlights the supply-chain risks of SaaS integrations, where attackers can bypass traditional security perimeters by targeting trusted third-party apps. As more organizations embed tools like Drift into CRM and sales workflows, the potential fallout from a single compromised vendor grows exponentially.

For enterprises across all regions – including the Middle East and Africa, where adoption of SaaS and Salesforce is accelerating – the attack is a reminder that supply-chain security is now a first-line business risk.

10 Recommended Actions for Security Teams

  1. Revoke and rotate all Drift-related OAuth tokens immediately.
  2. Audit Salesforce environments for unusual queries or exfiltration attempts.
  3. Disable unnecessary third-party integrations to minimize the attack surface.
  4. Apply least-privilege policies to all OAuth apps.
  5. Implement SaaS Security Posture Management (SSPM) for continuous monitoring.
  6. Use threat intelligence feeds to apply known IoCs.
  7. Enhance third-party risk assessments for SaaS vendors.
  8. Educate staff about phishing risks, especially after contact info exposure.
  9. Establish incident playbooks specific to SaaS and OAuth token compromises.
  10. Regularly review vendor contracts to ensure security obligations are enforceable.

Conclusion

While the Tenable and Qualys disclosures show that their products and core environments remain intact, the incident is a wake-up call for every enterprise relying on Salesforce and third-party integrations. As the scope of the Drift breach unfolds, security leaders must treat OAuth-based supply-chain compromises as a top priority for 2025 and beyond.

Ouaissou DEMBELE
Ouaissou DEMBELEhttp://cybercory.com
Ouaissou DEMBELE is a seasoned cybersecurity expert with over 12 years of experience, specializing in purple teaming, governance, risk management, and compliance (GRC). He currently serves as Co-founder & Group CEO of Sainttly Group, a UAE-based conglomerate comprising Saintynet Cybersecurity, Cybercory.com, and CISO Paradise. At Saintynet, where he also acts as General Manager, Ouaissou leads the company’s cybersecurity vision—developing long-term strategies, ensuring regulatory compliance, and guiding clients in identifying and mitigating evolving threats. As CEO, his mission is to empower organizations with resilient, future-ready cybersecurity frameworks while driving innovation, trust, and strategic value across Sainttly Group’s divisions. Before founding Saintynet, Ouaissou held various consulting roles across the MEA region, collaborating with global organizations on security architecture, operations, and compliance programs. He is also an experienced speaker and trainer, frequently sharing his insights at industry conferences and professional events. Ouaissou holds and teaches multiple certifications, including CCNP Security, CEH, CISSP, CISM, CCSP, Security+, ITILv4, PMP, and ISO 27001, in addition to a Master’s Diploma in Network Security (2013). Through his deep expertise and leadership, Ouaissou plays a pivotal role at Cybercory.com as Editor-in-Chief, and remains a trusted advisor to organizations seeking to elevate their cybersecurity posture and resilience in an increasingly complex threat landscape.

Subscribe

- Never miss a story with notifications

- Gain full access to our premium content

- Browse free from up to 5 devices at once

Latest stories

spot_imgspot_imgspot_imgspot_img

LEAVE A REPLY

Please enter your comment!
Please enter your name here