A classy supply-chain assault that impacted over 700 organizations, together with main cybersecurity companies, has been traced again to a compromise of Salesloft’s GitHub account that started as early as March 2025.
In an replace on September 6, 2025, Salesloft confirmed that an investigation by cybersecurity agency Mandiant discovered that risk actors leveraged this preliminary entry to finally steal OAuth authentication tokens from its Drift chat platform, resulting in widespread knowledge theft from buyer methods.
The investigation, which started on August 28, revealed that risk actors had entry to Salesloft’s GitHub account from March via June 2025.
Throughout this era, the attackers downloaded content material from personal repositories, added a visitor person, and established workflows whereas conducting reconnaissance on each the Salesloft and Drift utility environments.
Whereas the Salesloft platform itself was not breached, the attackers pivoted to Drift’s AWS atmosphere, the place they efficiently obtained OAuth tokens for buyer expertise integrations.
Salesloft Drift Cyberattack
The risk actor, recognized by Google’s Risk Intelligence Group as UNC6395, used these stolen tokens between August 8 and August 18 to entry and exfiltrate knowledge from clients’ built-in functions, most notably Salesforce cases.
The stolen knowledge primarily included enterprise contact info, comparable to names, electronic mail addresses, and job titles, in addition to content material from assist instances.
The breach affected a big selection of high-profile corporations, together with Cloudflare, Zscaler, Palo Alto Networks, PagerDuty, and SpyCloud.
The incident is taken into account one of many largest latest SaaS supply-chain assaults, highlighting the dangers related to third-party utility integrations.
In response to the assault, Salesloft engaged Mandiant and took decisive motion to include the risk. The corporate took the Drift platform fully offline, remoted its infrastructure, and rotated all impacted credentials.
Mandiant has since verified that the incident is contained and that the technical segmentation between the Salesloft and Drift environments prevented the attackers from shifting laterally.
The main target of the investigation has now shifted to a forensic high quality assurance evaluation. Salesloft has issued steering to its companions, recommending that every one third-party functions built-in with Drift by way of API key proactively revoke the present key.
The corporate additionally revealed a listing of Indicators of Compromise (IOCs), together with malicious IP addresses and user-agent strings, to assist clients search their very own logs for suspicious exercise.
Indicator TypeValue/DescriptionMalicious IP AddressesAny efficiently authenticated Drift connections from IPs not on Drift’s official whitelist must be thought of suspicious. The next IPs are confirmed as malicious [user-provided text]:– 154.41.95.2– 176.65.149.100– 179.43.159.198– 185.130.47.58– 185.207.107.130– 185.220.101.133– 185.220.101.143– 185.220.101.164– 185.220.101.167– 185.220.101.169– 185.220.101.180– 185.220.101.185– 185.220.101.33– 192.42.116.179– 192.42.116.20– 194.15.36.117– 195.47.238.178– 195.47.238.83– 208.68.36.90– 44.215.108.109Malicious Consumer-Agent StringsThe following user-agent strings have been related to the risk actor’s exercise [user-provided text]:– python-requests/2.32.4– Salesforce-Multi-Org-Fetcher/1.0– Python/3.11 aiohttp/3.12.15
Whereas a gaggle referred to as “Scattered LAPSUS$ Hunters 4.0” claimed duty, investigators haven’t discovered credible proof to assist this declare.
Discover this Story Attention-grabbing! Observe us on Google Information, LinkedIn, and X to Get Extra Prompt Updates.