Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Salesloft Drift Cyberattack Linked to GitHub Compromise and OAuth Token Theft

Posted on September 8, 2025September 8, 2025 By CWS

A classy supply-chain assault that impacted over 700 organizations, together with main cybersecurity companies, has been traced again to a compromise of Salesloft’s GitHub account that started as early as March 2025.

In an replace on September 6, 2025, Salesloft confirmed that an investigation by cybersecurity agency Mandiant discovered that risk actors leveraged this preliminary entry to finally steal OAuth authentication tokens from its Drift chat platform, resulting in widespread knowledge theft from buyer methods.

The investigation, which started on August 28, revealed that risk actors had entry to Salesloft’s GitHub account from March via June 2025.

Throughout this era, the attackers downloaded content material from personal repositories, added a visitor person, and established workflows whereas conducting reconnaissance on each the Salesloft and Drift utility environments.

Whereas the Salesloft platform itself was not breached, the attackers pivoted to Drift’s AWS atmosphere, the place they efficiently obtained OAuth tokens for buyer expertise integrations.

Salesloft Drift Cyberattack

The risk actor, recognized by Google’s Risk Intelligence Group as UNC6395, used these stolen tokens between August 8 and August 18 to entry and exfiltrate knowledge from clients’ built-in functions, most notably Salesforce cases.

The stolen knowledge primarily included enterprise contact info, comparable to names, electronic mail addresses, and job titles, in addition to content material from assist instances.

The breach affected a big selection of high-profile corporations, together with Cloudflare, Zscaler, Palo Alto Networks, PagerDuty, and SpyCloud.

The incident is taken into account one of many largest latest SaaS supply-chain assaults, highlighting the dangers related to third-party utility integrations.

In response to the assault, Salesloft engaged Mandiant and took decisive motion to include the risk. The corporate took the Drift platform fully offline, remoted its infrastructure, and rotated all impacted credentials.

Mandiant has since verified that the incident is contained and that the technical segmentation between the Salesloft and Drift environments prevented the attackers from shifting laterally.

The main target of the investigation has now shifted to a forensic high quality assurance evaluation. Salesloft has issued steering to its companions, recommending that every one third-party functions built-in with Drift by way of API key proactively revoke the present key.

The corporate additionally revealed a listing of Indicators of Compromise (IOCs), together with malicious IP addresses and user-agent strings, to assist clients search their very own logs for suspicious exercise.

Indicator TypeValue/DescriptionMalicious IP AddressesAny efficiently authenticated Drift connections from IPs not on Drift’s official whitelist must be thought of suspicious. The next IPs are confirmed as malicious [user-provided text]:– 154.41.95.2– 176.65.149.100– 179.43.159.198– 185.130.47.58– 185.207.107.130– 185.220.101.133– 185.220.101.143– 185.220.101.164– 185.220.101.167– 185.220.101.169– 185.220.101.180– 185.220.101.185– 185.220.101.33– 192.42.116.179– 192.42.116.20– 194.15.36.117– 195.47.238.178– 195.47.238.83– 208.68.36.90– 44.215.108.109Malicious Consumer-Agent StringsThe following user-agent strings have been related to the risk actor’s exercise [user-provided text]:– python-requests/2.32.4– Salesforce-Multi-Org-Fetcher/1.0– Python/3.11 aiohttp/3.12.15

Whereas a gaggle referred to as “Scattered LAPSUS$ Hunters 4.0” claimed duty, investigators haven’t discovered credible proof to assist this declare.

Discover this Story Attention-grabbing! Observe us on Google Information, LinkedIn, and X to Get Extra Prompt Updates.

Cyber Security News Tags:Compromise, Cyberattack, Drift, GitHub, Linked, OAuth, Salesloft, Theft, Token

Post navigation

Previous Post: You Didn’t Get Phished — You Onboarded the Attacker
Next Post: Drift Breach Chaos, Zero-Days Active, Patch Warnings, Smarter Threats & More

Related Posts

HPE Insight Remote Support Vulnerability Let Attackers Execute Remote Code Cyber Security News
CISA Added WinRaR Zero-Day (CVE-2025-8088) Vulnerability That is Actively Exploited In the Wild Cyber Security News
3 SOC Metrics Improved With Sandbox Analysis  Cyber Security News
DPRK IT Workers Using Code-Sharing Platforms to Secure New Remote Jobs Cyber Security News
Storm-2603 Using Custom Malware That Leverages BYOVD to Tamper with Endpoint Protections Cyber Security News
Microsoft Defender for Office 365 to Block Email Bombing Attacks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • GitHub Workflows Attack Affects Hundreds of Repos, Thousands of Secrets
  • Researchers Bypassed Web Application Firewall With JS Injection with Parameter Pollution
  • PgAdmin Vulnerability Lets Attackers Gain Unauthorised Account Access
  • Over 6,700 Private Repositories Made Public in Nx Supply Chain Attack
  • Drift Breach Chaos, Zero-Days Active, Patch Warnings, Smarter Threats & More

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • GitHub Workflows Attack Affects Hundreds of Repos, Thousands of Secrets
  • Researchers Bypassed Web Application Firewall With JS Injection with Parameter Pollution
  • PgAdmin Vulnerability Lets Attackers Gain Unauthorised Account Access
  • Over 6,700 Private Repositories Made Public in Nx Supply Chain Attack
  • Drift Breach Chaos, Zero-Days Active, Patch Warnings, Smarter Threats & More

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News