Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Salesloft Drift Cyberattack Linked to GitHub Compromise and OAuth Token Theft

Posted on September 8, 2025September 8, 2025 By CWS

A classy supply-chain assault that impacted over 700 organizations, together with main cybersecurity companies, has been traced again to a compromise of Salesloft’s GitHub account that started as early as March 2025.

In an replace on September 6, 2025, Salesloft confirmed that an investigation by cybersecurity agency Mandiant discovered that risk actors leveraged this preliminary entry to finally steal OAuth authentication tokens from its Drift chat platform, resulting in widespread knowledge theft from buyer methods.

The investigation, which started on August 28, revealed that risk actors had entry to Salesloft’s GitHub account from March via June 2025.

Throughout this era, the attackers downloaded content material from personal repositories, added a visitor person, and established workflows whereas conducting reconnaissance on each the Salesloft and Drift utility environments.

Whereas the Salesloft platform itself was not breached, the attackers pivoted to Drift’s AWS atmosphere, the place they efficiently obtained OAuth tokens for buyer expertise integrations.

Salesloft Drift Cyberattack

The risk actor, recognized by Google’s Risk Intelligence Group as UNC6395, used these stolen tokens between August 8 and August 18 to entry and exfiltrate knowledge from clients’ built-in functions, most notably Salesforce cases.

The stolen knowledge primarily included enterprise contact info, comparable to names, electronic mail addresses, and job titles, in addition to content material from assist instances.

The breach affected a big selection of high-profile corporations, together with Cloudflare, Zscaler, Palo Alto Networks, PagerDuty, and SpyCloud.

The incident is taken into account one of many largest latest SaaS supply-chain assaults, highlighting the dangers related to third-party utility integrations.

In response to the assault, Salesloft engaged Mandiant and took decisive motion to include the risk. The corporate took the Drift platform fully offline, remoted its infrastructure, and rotated all impacted credentials.

Mandiant has since verified that the incident is contained and that the technical segmentation between the Salesloft and Drift environments prevented the attackers from shifting laterally.

The main target of the investigation has now shifted to a forensic high quality assurance evaluation. Salesloft has issued steering to its companions, recommending that every one third-party functions built-in with Drift by way of API key proactively revoke the present key.

The corporate additionally revealed a listing of Indicators of Compromise (IOCs), together with malicious IP addresses and user-agent strings, to assist clients search their very own logs for suspicious exercise.

Indicator TypeValue/DescriptionMalicious IP AddressesAny efficiently authenticated Drift connections from IPs not on Drift’s official whitelist must be thought of suspicious. The next IPs are confirmed as malicious [user-provided text]:– 154.41.95.2– 176.65.149.100– 179.43.159.198– 185.130.47.58– 185.207.107.130– 185.220.101.133– 185.220.101.143– 185.220.101.164– 185.220.101.167– 185.220.101.169– 185.220.101.180– 185.220.101.185– 185.220.101.33– 192.42.116.179– 192.42.116.20– 194.15.36.117– 195.47.238.178– 195.47.238.83– 208.68.36.90– 44.215.108.109Malicious Consumer-Agent StringsThe following user-agent strings have been related to the risk actor’s exercise [user-provided text]:– python-requests/2.32.4– Salesforce-Multi-Org-Fetcher/1.0– Python/3.11 aiohttp/3.12.15

Whereas a gaggle referred to as “Scattered LAPSUS$ Hunters 4.0” claimed duty, investigators haven’t discovered credible proof to assist this declare.

Discover this Story Attention-grabbing! Observe us on Google Information, LinkedIn, and X to Get Extra Prompt Updates.

Cyber Security News Tags:Compromise, Cyberattack, Drift, GitHub, Linked, OAuth, Salesloft, Theft, Token

Post navigation

Previous Post: You Didn’t Get Phished — You Onboarded the Attacker
Next Post: Drift Breach Chaos, Zero-Days Active, Patch Warnings, Smarter Threats & More

Related Posts

Leveraging dMSAs for Credential Acquisition and Lateral Movement in Active Directory Cyber Security News
NoisyBear Weaponizing ZIP Files to PowerShell Loaders and Exfiltrate Sensitive Data Cyber Security News
Microsoft Releases Emergency Fix for BitLocker Recovery Issue Cyber Security News
PoC Released for Linux Privilege Escalation Vulnerability via udisksd and libblockdev Cyber Security News
CISA Warns of Citrix RCE and Privilege Escalation Vulnerabilities Exploited in Attacks Cyber Security News
0-Click ChatGPT Agent Vulnerability Allows Sensitive Data Exfiltration from Gmail Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • AI Sidebar Spoofing Attack: SquareX Uncovers Malicious Extensions that Impersonate AI Browser Sidebars
  • Vidar Stealer Bypassing Browser Security Via Direct Memory Injection to Steal Login Credentials
  • Threat Actors With Stealer Malwares Processing Millions of Credentials a Day
  • New Rust-Based ChaosBot Malware Leverages Discord for Stealthy Command and Control
  • Salt Typhoon Using Zero-Day Exploits and DLL Sideloading Techniques to Attack Organizations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • AI Sidebar Spoofing Attack: SquareX Uncovers Malicious Extensions that Impersonate AI Browser Sidebars
  • Vidar Stealer Bypassing Browser Security Via Direct Memory Injection to Steal Login Credentials
  • Threat Actors With Stealer Malwares Processing Millions of Credentials a Day
  • New Rust-Based ChaosBot Malware Leverages Discord for Stealthy Command and Control
  • Salt Typhoon Using Zero-Day Exploits and DLL Sideloading Techniques to Attack Organizations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News