Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Salesloft Drift Hacked to Steal OAuth Tokens and Exfiltrate from Salesforce Corporate Instances

Posted on August 27, 2025August 27, 2025 By CWS

A complicated information exfiltration marketing campaign focusing on company Salesforce situations has uncovered delicate data from a number of organizations by compromised OAuth tokens related to the Salesloft Drift third-party software. 

The risk actor, designated as UNC6395, systematically harvested credentials and delicate information between August 8-18, 2025, demonstrating superior operational safety consciousness whereas executing SOQL queries throughout quite a few Salesforce objects.

Key Takeaways1. UNC6395 used compromised Salesloft Drift OAuth tokens to entry Salesforce situations .2. Harvested AWS keys, Snowflake tokens, and passwords from Salesforce information.3. All Drift tokens revoked; organizations should rotate credentials.

The marketing campaign represents a major provide chain assault vector, exploiting the belief relationship between Salesforce situations and built-in third-party purposes. 

UNC6395 leveraged authentic OAuth authentication mechanisms to achieve unauthorized entry, bypassing conventional safety controls and making detection notably difficult for affected organizations.

OAuth Token Exploitation 

Google Menace Intelligence Group reported that the risk actor utilized compromised OAuth entry tokens and refresh tokens from the Salesloft Drift software to authenticate towards goal Salesforce situations. 

This assault vector exploited the OAuth 2.0 authorization framework, which permits third-party purposes to entry Salesforce information with out exposing consumer credentials straight.

UNC6395 executed systematic SOQL (Salesforce Object Question Language) queries to enumerate and extract information from essential Salesforce objects together with Circumstances, Accounts, Customers, and Alternatives. 

The actor demonstrated technical sophistication by operating COUNT queries to evaluate information volumes earlier than exfiltration:

Salesloft acknowledged that the attacker particularly focused AWS entry keys (AKIA identifiers), passwords, Snowflake credentials, and different delicate authentication supplies saved inside Salesforce customized fields and commonplace objects. 

Publish-exfiltration evaluation revealed the actor searched extracted information for patterns matching credential codecs, indicating a main goal of credential harvesting slightly than conventional information theft.

Mitigatons

Salesforce and Salesloft responded by revoking all lively OAuth tokens related to the Drift software on August 20, 2025, successfully terminating the assault vector. 

The Drift software was subsequently faraway from the Salesforce AppExchange pending a complete safety overview.

Organizations utilizing the Salesloft Drift integration ought to instantly implement a number of remediation measures. 

Occasion Monitoring logs must be reviewed for suspicious UniqueQuery occasions and authentication anomalies related to the Drift related app. 

Safety groups should scan Salesforce objects for uncovered secrets and techniques utilizing instruments like TruffleHog and seek for patterns together with “AKIA”, “snowflakecomputing[.]com”, and generic credential references.

Linked app permissions require rapid hardening by scope restriction, IP tackle restrictions, and implementation of the precept of least privilege. 

The “API Enabled” permission must be faraway from consumer profiles and granted selectively by Permission Units to licensed personnel solely. 

Session timeout configurations in Session Settings must be optimized to restrict publicity home windows for compromised credentials.

This incident highlights the essential significance of securing third-party integration and the need for steady monitoring of OAuth-enabled purposes with entry to delicate company information repositories.

Discover this Story Fascinating! Observe us on LinkedIn and X to Get Extra Prompt Updates.

Cyber Security News Tags:Corporate, Drift, Exfiltrate, Hacked, Instances, OAuth, Salesforce, Salesloft, Steal, Tokens

Post navigation

Previous Post: China-based Threat Actor Mustang Panda’s Tactics, Techniques, and Procedures Unveiled
Next Post: Critical Chrome Use After Free Vulnerability Let Attackers Execute Arbitrary Code

Related Posts

Microsoft Office Vulnerabilities Let Attackers Execute Remote Code Cyber Security News
Lucid PhaaS With 17,500 Phishing Domains Mimics 316 Brands From 74 Countries Cyber Security News
LLM-Based LAMEHUG Malware Dynamically Generate Commands for Reconnaissance and Data Theft Cyber Security News
CISA Warns of Fortinet FortiOS Hard-Coded Credentials Vulnerability Exploited in Attacks Cyber Security News
Microsoft Patch Tuesday July 2025: 130 Vulnerabilities Fixed Including 41 RCE Cyber Security News
Threat Actors Attacking Fans and Teams of Belgian Grand Prix With Phishing Campaigns Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Can Inject Malicious Code into Antivirus Processes to Create a Backdoor
  • Microsoft Defender Vulnerabilities Allow Attackers to Bypass Authentication and Upload Malicious Files
  • Experts Warn of Widespread SonicWall VPN Compromise Impacting Over 100 Accounts
  • Hackers Turn Velociraptor DFIR Tool Into Weapon in LockBit Ransomware Attacks
  • Microsoft Fixes Long-standing Windows 11 ‘Update and Shut down’ Bug

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Can Inject Malicious Code into Antivirus Processes to Create a Backdoor
  • Microsoft Defender Vulnerabilities Allow Attackers to Bypass Authentication and Upload Malicious Files
  • Experts Warn of Widespread SonicWall VPN Compromise Impacting Over 100 Accounts
  • Hackers Turn Velociraptor DFIR Tool Into Weapon in LockBit Ransomware Attacks
  • Microsoft Fixes Long-standing Windows 11 ‘Update and Shut down’ Bug

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News