#1 Middle East & Africa Trusted Cybersecurity News & Magazine |

33 C
Dubai
Thursday, September 11, 2025
HomeTopics 1AI & CybersecurityBreaking News: Supply-Chain Breach Hits Palo Alto Networks and Zscaler via Salesloft’s...

Breaking News: Supply-Chain Breach Hits Palo Alto Networks and Zscaler via Salesloft’s Drift App

Date:

Related stories

spot_imgspot_imgspot_imgspot_img

A widespread supply-chain cyberattack has unfolded, centering on OAuth tokens stolen from the Salesloft – Drift application – a third-party AI-powered sales tool that integrates deeply with platforms such as Salesforce, Slack, and Google Workspace. The campaign, attributed to the threat group UNC6395, ran from August 8 to August 18, 2025, and has impacted hundreds of organizations globally.

Security researchers from Google’s Threat Intelligence Group and Mandiant observed mass exfiltration of sensitive data from connected Salesforce instances, utilizing compromised tokens to query and extract information including AWS access keys, Snowflake credentials, internal support case details, business contact information, and more.

Recognizing the severity, Salesforce disabled all Salesloft integrations, and Salesloft revoked all Drift-related OAuth tokens and removed the app from AppExchange on August 20, 2025.

Impact on Zscaler

Zscaler confirmed its Salesforce instance was accessed due to stolen Drift credentials, though its internal systems, services, and infrastructure remained untouched.

Exposed Data Includes:

  • Names, business email addresses, job titles, phone numbers, and regional details
  • Zscaler-specific commercial data (product licensing, etc.)
  • Plain text from support case communications, excluding attachments and files

Zscaler has found no evidence of misuse so far. In response, the company has revoked Drift access, rotated API tokens, launched an in-depth investigation with Salesforce, enhanced its third-party risk management, and tightened customer authentication protocols to guard against phishing and social engineering attempts.

Impact on Palo Alto Networks

Palo Alto Networks also acknowledged being among the hundreds of affected organizations whose Salesforce CRM was compromised.

Exposed Data Includes:

  • Business contact information, internal sales account records, and basic customer case data
  • No core systems, products, or services were compromised

Upon discovering the breach, the company severed the Drift integration and deployed their Unit 42 security team for a full investigation. They are reaching out to customers who may have had more sensitive data exposed.

Broader Context & Ongoing Threat Landscape

  • The threat actor UNC6395 executed highly targeted exfiltration using Drift OAuth tokens, emphasizing credential harvesting and covert data queries – such as SOQL queries – across vast Salesforce environments.
  • Exposed secrets include AWS keys, passwords, and Snowflake tokens.
  • Attackers deleted query jobs to obscure detection – employing advanced operational security.
  • Google warned that any Drift-related authentication tokens – even beyond Salesforce integrations – should be treated as compromised.

Recommended Actions for Organizations

  1. Rotate and Revoke All Drift Tokens
    Immediately revoke OAuth tokens associated with Drift integrations and rotate any related credentials across Salesforce, Google Workspace, AWS, Snowflake, and other interconnected systems.
  2. Audit Salesforce Objects
    Inspect Cases, Accounts, Users, Opportunities, and custom fields for exposed secrets or abnormal data patterns.
  3. Enforce Least-Privilege and Visibility for OAuth/Non-Human Identities
    Maintain strict data access scopes, continuous visibility into third-party app permissions, and enforce robust monitoring of behavior.
  4. Harden Third-Party Risk Management Practices
    Include contractual assurance, regular auditing, and rapid removal pathways for integrations.
  5. Educate Teams on Phishing Exposure
    Given contact data compromise, prepare for phishing or social engineering attempts and reinforce authentication vigilance.

Why This Matters To MEA Region Security Professionals

  • The MEA region increasingly relies on third-party SaaS tools in complex workflows. This incident underscores the systemic risk posed by deeply interconnected platforms.
  • The breach demonstrates how OAuth-based integrations – especially those using tokens without expiry – can become potent attack vectors.
  • MEA organizations must re-evaluate their SaaS posture, focusing on OAuth token lifecycle, real-time monitoring, and integration isolation.
  • This event serves as a critical reminder: supply-chain attacks via trusted services can bypass traditional perimeter defenses – making proactive third-party oversight essential.

In Summary

  • Victims: Salesloft Drift breach impacted organizations including Zscaler and Palo Alto Networks.
  • Attack Vector: Compromised OAuth tokens used to access Salesforce environments; data exfiltration of contact and case info, credentials, and more.
  • Response: Affected firms revoked access, rotated tokens, launched investigations, and beefed up third-party security practices.
  • Action Needed: Revoke tokens, audit data, apply least-privilege, monitor OAuth usage, and increase phishing awareness.
  • Strategic Insight for MEA: Reinforce OAuth governance and third-party integration monitoring to mitigate future SaaS supply-chain threats.
Ouaissou DEMBELE
Ouaissou DEMBELEhttp://cybercory.com
Ouaissou DEMBELE is a seasoned cybersecurity expert with over 12 years of experience, specializing in purple teaming, governance, risk management, and compliance (GRC). He currently serves as Co-founder & Group CEO of Sainttly Group, a UAE-based conglomerate comprising Saintynet Cybersecurity, Cybercory.com, and CISO Paradise. At Saintynet, where he also acts as General Manager, Ouaissou leads the company’s cybersecurity vision—developing long-term strategies, ensuring regulatory compliance, and guiding clients in identifying and mitigating evolving threats. As CEO, his mission is to empower organizations with resilient, future-ready cybersecurity frameworks while driving innovation, trust, and strategic value across Sainttly Group’s divisions. Before founding Saintynet, Ouaissou held various consulting roles across the MEA region, collaborating with global organizations on security architecture, operations, and compliance programs. He is also an experienced speaker and trainer, frequently sharing his insights at industry conferences and professional events. Ouaissou holds and teaches multiple certifications, including CCNP Security, CEH, CISSP, CISM, CCSP, Security+, ITILv4, PMP, and ISO 27001, in addition to a Master’s Diploma in Network Security (2013). Through his deep expertise and leadership, Ouaissou plays a pivotal role at Cybercory.com as Editor-in-Chief, and remains a trusted advisor to organizations seeking to elevate their cybersecurity posture and resilience in an increasingly complex threat landscape.

Subscribe

- Never miss a story with notifications

- Gain full access to our premium content

- Browse free from up to 5 devices at once

Latest stories

spot_imgspot_imgspot_imgspot_img

LEAVE A REPLY

Please enter your comment!
Please enter your name here