Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Zscaler Confirms Data Breach – Hackers Compromised Salesforce Instance and Stole Customer Data

Posted on September 2, 2025September 2, 2025 By CWS

Cybersecurity firm Zscaler has confirmed it fell sufferer to a widespread supply-chain assault that uncovered buyer contact info via compromised Salesforce credentials linked to advertising platform Salesloft Drift.

The breach, disclosed on August 31, 2025, stems from a bigger marketing campaign focusing on Salesloft Drift’s OAuth tokens that has impacted over 700 organizations worldwide.

Zscaler emphasised that the incident was confined to its Salesforce surroundings and didn’t have an effect on any of its core safety merchandise, providers, or underlying infrastructure.

The safety incident originated from a complicated supply-chain assault orchestrated by menace actor UNC6395, which Google Risk Intelligence Group and Mandiant researchers have been monitoring since early August 2025.

Between August 8-18, 2025, attackers systematically compromised OAuth tokens related to Salesloft Drift, an AI-powered chat agent built-in with Salesforce databases for gross sales workflow automation.

UNC6395 demonstrated superior operational capabilities through the use of these stolen tokens to authenticate immediately into Salesforce buyer cases, bypassing multi-factor authentication completely. The menace actors employed Python instruments to automate the information theft course of throughout a whole lot of focused organizations.

Data Compromised at Zscaler

Based on Zscaler’s official assertion, the compromised knowledge was restricted to generally out there enterprise contact particulars and Salesforce-specific content material, together with:

Names and enterprise electronic mail addresses

Job titles and telephone numbers

Regional and site particulars

Zscaler product licensing and business info

Plain textual content content material from sure assist circumstances (excluding attachments, information, and pictures)

“After intensive investigation, Zscaler has at present discovered no proof to recommend misuse of this info,” the corporate said. Nonetheless, the breach highlights the vulnerability of third-party integrations in trendy SaaS environments.

The Zscaler incident represents only one piece of what safety researchers are calling the most important SaaS breach marketing campaign of 2025. Google’s Risk Intelligence Group estimates that over 700 organizations have been impacted by this supply-chain assault.

Initially believed to focus on solely Salesforce integrations, the marketing campaign’s scope expanded considerably when Google confirmed on August 28 that OAuth tokens for Drift E-mail had been additionally compromised, offering attackers with restricted entry to Google Workspace accounts. Most victims are know-how and software program firms, creating potential cascading supply-chain dangers.

Zscaler acted swiftly to comprise the incident by revoking Salesloft Drift’s entry to its Salesforce knowledge and rotating API entry tokens as a precautionary measure. The corporate launched a complete investigation in collaboration with Salesforce and applied further safeguards to forestall related incidents.

On August 20, 2025, Salesloft and Salesforce collaborated to revoke all lively entry and refresh tokens related to the Drift utility. Salesforce additionally eliminated the Drift utility from its AppExchange market pending additional investigation.

This incident underscores essential vulnerabilities in SaaS-to-SaaS integrations that usually bypass conventional safety controls. OAuth tokens, as soon as compromised, present persistent entry with out triggering authentication alerts or requiring passwords.

Whereas no proof of knowledge misuse has been discovered, Zscaler urges prospects to take care of heightened vigilance towards potential phishing assaults or social engineering makes an attempt that might leverage the uncovered contact particulars. The corporate emphasizes that official Zscaler assist won’t ever request authentication particulars via unsolicited communications.

Organizations utilizing third-party SaaS integrations are suggested to overview all linked functions, revoke overly broad permissions, and implement steady monitoring for uncommon question exercise or large-scale knowledge exports.

Discover this Story Fascinating! Comply with us on Google Information, LinkedIn, and X to Get Extra On the spot Updates.

Cyber Security News Tags:Breach, Compromised, Confirms, Customer, Data, Hackers, Instance, Salesforce, Stole, Zscaler

Post navigation

Previous Post: How to Understand the OWASP Top 10
Next Post: Malicious npm Package nodejs-smtp Mimics Nodemailer, Targets Atomic and Exodus Wallets

Related Posts

Global Jewellery Brand Pandora Suffers Hacked Cyber Security News
PoC Exploit Tool Released for FortiWeb WAF Vulnerability Exploited in the Wild Cyber Security News
ArmouryLoader Bypassing System Security Protections and Inject Malicious Codes Cyber Security News
Hundreds of WordPress Websites Hacked By VexTrio Viper Group to Run Massive TDS Services Cyber Security News
System Admins Beware! Weaponized Putty Ads in Bing Installs Remote Access Tools Cyber Security News
Lazarus Hackers Trick Users Into Believing Their Camera or Microphone is Blocked to Deliver PyLangGhost RAT Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Marquis Data Breach Impacts Over 780,000 People
  • Hackers Using Evilginx to Steal Session Cookies and Bypass Multi-Factor Authentication Tokens
  • React2Shell: In-the-Wild Exploitation Expected for Critical React Vulnerability
  • GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections
  • Hackers Leverage Velociraptor DFIR Tool for Stealthy C2 & Ransomware Delivery

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Marquis Data Breach Impacts Over 780,000 People
  • Hackers Using Evilginx to Steal Session Cookies and Bypass Multi-Factor Authentication Tokens
  • React2Shell: In-the-Wild Exploitation Expected for Critical React Vulnerability
  • GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections
  • Hackers Leverage Velociraptor DFIR Tool for Stealthy C2 & Ransomware Delivery

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark