Salesloft Breach via Drift: ShinyHunters Steal Data from 700+ Entities

Ever wondered how secure your favorite SaaS tools truly are? A recent breach at Salesloft, exploiting a third-party integration, saw hackers steal sensitive data from over 700 companies. This incident proves even trusted connections can be a weak link. Are your integrations truly secure?

Salesloft Breach via Drift: ShinyHunters Steal Data from 700+ Entities

A recent, sophisticated cyberattack has spotlighted the critical vulnerabilities within interconnected SaaS ecosystems, as hackers successfully infiltrated the sales automation platform Salesloft. This incident led to the pilfering of OAuth and refresh tokens, enabling adversaries to subsequently pivot into customer Salesforce environments and siphon off highly sensitive data. The breach, attributed to the notorious ShinyHunters group, unfolded over approximately ten days in August 2025, highlighting an urgent need for enhanced enterprise data protection.

The attackers exploited Salesloft’s integration with Drift, a conversational marketing tool designed to sync chat interactions with Salesforce CRM systems. This third-party linkage proved to be the weak point, allowing the intruders to steal tokens that granted them unauthorized access. Crucially, this access bypassed traditional multi-factor authentication alerts, demonstrating a shrewd understanding of SaaS supply chain vulnerabilities and how to exploit trusted connections for illicit gains.

Salesloft Breach via Drift: ShinyHunters Steal Data from 700+ Entities

Reports indicate that the ShinyHunters extortion group has claimed responsibility for this widespread campaign. By leveraging the compromised tokens, they launched follow-on attacks against numerous Salesforce customers. The persistence of these stolen tokens, even after initial sessions conclude via refresh mechanisms, allowed the attackers to masquerade as legitimate applications, thereby evading many standard security controls and escalating the severity of the data breach.

The repercussions of this cyberattack are extensive, with potential exposure of critical assets across affected organizations. AWS keys, passwords, and Snowflake credentials were among the types of sensitive information at risk. Google’s threat intelligence arm has linked this incident to a broader pattern of Salesforce-targeted thefts, warning that upwards of 700 entities may have been impacted. Salesloft, upon discovery, promptly revoked the compromised tokens, but not before a substantial volume of data had been exfiltrated.

salesloft-breach-via-drift-shinyhunters-steal-data-from-700-entities-images-1

Industry experts are now rigorously scrutinizing the inherent risks associated with OAuth-based integrations. While ubiquitous in cloud services for their operational ease, these integrations often lack the granular oversight necessary to prevent such sophisticated attacks. The Salesloft cyberattack echoes previous incidents involving groups like Scattered Spider, where trusted app permissions, rather than phishing or malware, are leveraged to harvest secrets from Salesforce databases, underscoring a systemic challenge in cloud security update protocols.

For enterprises heavily reliant on Salesforce and similar cloud platforms, this event serves as a stark reminder to meticulously audit all third-party applications. Mandiant, Google’s cybersecurity subsidiary, has identified the perpetrators as UNC6395, detailing a “widespread campaign” that exploits these tokens to raid corporate instances. Companies are strongly advised to implement robust zero-trust models, regularly rotate authentication tokens, and diligently monitor for any anomalous API calls to mitigate future supply chain attack risks.

salesloft-breach-via-drift-shinyhunters-steal-data-from-700-entities-images-2

This breach aligns with a growing trend of cybercriminals targeting high-value data repositories such as CRM platforms. Salesforce, as a cornerstone for sales and customer management, remains a prime target for various threat actors. Salesloft has urged its customers to review their integrations and enhance monitoring capabilities, emphasizing that its primary systems were not directly compromised. Ultimately, this incident may accelerate the adoption of advanced security protocols like token binding and short-lived credentials, fundamentally reshaping how SaaS providers secure their interconnected services and ensuring better enterprise data protection.

Related Posts

FYEnergy Launches Green Crypto Rewards Program Amidst Market Boom

FYEnergy Launches Green Crypto Rewards Program Amidst Market Boom

Ever dreamt of boosting your crypto income while doing good for the planet? FYEnergy is making it a reality! Their new Rewards Program offers incredible bonuses for…

UK Gaming Industry at Risk: Reckless Tax Policies Threaten £6 Billion Sector

UK Gaming Industry at Risk: Reckless Tax Policies Threaten £6 Billion Sector

Did you know the UK’s video game industry is a silent giant, contributing billions to our economy? But it’s facing a new challenge from proposed tax policies…

Honor Pad 10 Tablet Review: Affordable Entertainment and Productivity Powerhouse

Honor Pad 10 Tablet Review: Affordable Entertainment and Productivity Powerhouse

Is it possible to get a premium tablet experience without the premium price tag? Our latest review dives deep into the Honor Pad 10, a device promising…

Solaverse: Decoding the Year’s Most Promising Early Crypto Launch Potential

Solaverse: Decoding the Year’s Most Promising Early Crypto Launch Potential

Ever wonder what makes an early crypto launch truly stand out? Forget fleeting hype; it’s all about foundation! We dive deep into Solaverse, a project showcasing incredible…

AI Stethoscope Revolutionizes Heart Health: Detecting Conditions Rapidly

AI Stethoscope Revolutionizes Heart Health: Detecting Conditions Rapidly

Imagine a stethoscope that can hear what human ears can’t – and then some! Researchers in London have developed an AI-powered device capable of detecting three major…

Leave a Reply