Salesloft says attackers first breached its GitHub account in March, resulting in the theft of Drift OAuth tokens later utilized in widespread Salesforce knowledge theft assaults in August.
Salesloft is a broadly used gross sales engagement platform that helps corporations handle outreach and buyer communications. Its Drift platform is a conversational advertising device that integrates chatbots and automation into gross sales pipelines, together with integrations with platforms like Salesforce.
The 2 have been on the heart of a significant supply-chain model breach first disclosed in late August, with Google’s Menace Intelligence Group attributing the assaults to UNC6395.
Nevertheless, BleepingComputer has realized that the ShinyHunters extortion gang and risk actors claiming to be Scattered Spider have been concerned within the Salesloft Drift assaults, along with the earlier Salesforce knowledge theft assaults.
Breach began with GitHub
Salesloft first disclosed a safety challenge within the Drift software on August 21 and revealed extra particulars about malicious exploitation of the OAuth tokens 5 days later.
This has led to widespread Salesforce knowledge theft assaults on Salesloft prospects, together with Google, Zscaler, Cloudflare, Workiva, Tenable, JFrog, Bugcrowd, Proofpoint, Palo Alto Networks, and the listing continues to be rising.
Within the Salesloft knowledge theft assaults, the risk actors primarily targeted on stealing help circumstances from Salesforce cases, which have been then used to reap credentials, authentication tokens, and different secrets and techniques shared within the help tickets.
“Preliminary findings have proven that the actor’s major goal was to steal credentials, particularly specializing in delicate data like AWS entry keys, passwords, and Snowflake-related entry tokens,” warned Salesloft in an August 26 replace.
In keeping with an investigation by Mandiant, which is aiding Salesloft in responding to its breach, the risk actors first gained entry to its GitHub setting between March and June 2025.
The hackers downloaded code from a number of GitHub repositories, added visitor consumer accounts, and created rogue workflows, setting the stage for the following assault.
Mandiant confirmed that the attackers carried out reconnaissance actions in Salesloft and Drift environments throughout the identical interval.
The exercise escalated after the risk actors breached Drift’s AWS setting, permitting them to steal the OAuth tokens used to entry buyer knowledge throughout know-how integrations, together with Salesforce and Google Workspace.
Salesloft states that it rotated credentials, hardened defenses, and verified segmentation from Drift, which had its infrastructure remoted and credentials additionally rotated.
With the assistance of Mandiant, the agency carried out risk looking and located no further indicators of compromise, that means that the risk actor doesn’t have a foothold on its setting anymore.
Mandiant has validated containment and segmentation, and engagement has now shifted to forensic high quality assurance assessment.
A subsequent replace revealed yesterday introduced the restoration of the Salesloft integration with Salesforce, following the precautionary suspension triggered by the Drift safety incident.
Salesforce customers can now once more entry the complete vary of Salesloft integrations, and the corporate offered step-by-step steerage for many who must carry out knowledge syncing.