Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Zscaler Confirms Data Breach – Hackers Compromised Salesforce Instance and Stole Customer Data

Posted on September 2, 2025September 2, 2025 By CWS

Cybersecurity firm Zscaler has confirmed it fell sufferer to a widespread supply-chain assault that uncovered buyer contact info via compromised Salesforce credentials linked to advertising platform Salesloft Drift.

The breach, disclosed on August 31, 2025, stems from a bigger marketing campaign focusing on Salesloft Drift’s OAuth tokens that has impacted over 700 organizations worldwide.

Zscaler emphasised that the incident was confined to its Salesforce surroundings and didn’t have an effect on any of its core safety merchandise, providers, or underlying infrastructure.

The safety incident originated from a complicated supply-chain assault orchestrated by menace actor UNC6395, which Google Risk Intelligence Group and Mandiant researchers have been monitoring since early August 2025.

Between August 8-18, 2025, attackers systematically compromised OAuth tokens related to Salesloft Drift, an AI-powered chat agent built-in with Salesforce databases for gross sales workflow automation.

UNC6395 demonstrated superior operational capabilities through the use of these stolen tokens to authenticate immediately into Salesforce buyer cases, bypassing multi-factor authentication completely. The menace actors employed Python instruments to automate the information theft course of throughout a whole lot of focused organizations.

Data Compromised at Zscaler

Based on Zscaler’s official assertion, the compromised knowledge was restricted to generally out there enterprise contact particulars and Salesforce-specific content material, together with:

Names and enterprise electronic mail addresses

Job titles and telephone numbers

Regional and site particulars

Zscaler product licensing and business info

Plain textual content content material from sure assist circumstances (excluding attachments, information, and pictures)

“After intensive investigation, Zscaler has at present discovered no proof to recommend misuse of this info,” the corporate said. Nonetheless, the breach highlights the vulnerability of third-party integrations in trendy SaaS environments.

The Zscaler incident represents only one piece of what safety researchers are calling the most important SaaS breach marketing campaign of 2025. Google’s Risk Intelligence Group estimates that over 700 organizations have been impacted by this supply-chain assault.

Initially believed to focus on solely Salesforce integrations, the marketing campaign’s scope expanded considerably when Google confirmed on August 28 that OAuth tokens for Drift E-mail had been additionally compromised, offering attackers with restricted entry to Google Workspace accounts. Most victims are know-how and software program firms, creating potential cascading supply-chain dangers.

Zscaler acted swiftly to comprise the incident by revoking Salesloft Drift’s entry to its Salesforce knowledge and rotating API entry tokens as a precautionary measure. The corporate launched a complete investigation in collaboration with Salesforce and applied further safeguards to forestall related incidents.

On August 20, 2025, Salesloft and Salesforce collaborated to revoke all lively entry and refresh tokens related to the Drift utility. Salesforce additionally eliminated the Drift utility from its AppExchange market pending additional investigation.

This incident underscores essential vulnerabilities in SaaS-to-SaaS integrations that usually bypass conventional safety controls. OAuth tokens, as soon as compromised, present persistent entry with out triggering authentication alerts or requiring passwords.

Whereas no proof of knowledge misuse has been discovered, Zscaler urges prospects to take care of heightened vigilance towards potential phishing assaults or social engineering makes an attempt that might leverage the uncovered contact particulars. The corporate emphasizes that official Zscaler assist won’t ever request authentication particulars via unsolicited communications.

Organizations utilizing third-party SaaS integrations are suggested to overview all linked functions, revoke overly broad permissions, and implement steady monitoring for uncommon question exercise or large-scale knowledge exports.

Discover this Story Fascinating! Comply with us on Google Information, LinkedIn, and X to Get Extra On the spot Updates.

Cyber Security News Tags:Breach, Compromised, Confirms, Customer, Data, Hackers, Instance, Salesforce, Stole, Zscaler

Post navigation

Previous Post: How to Understand the OWASP Top 10
Next Post: Malicious npm Package nodejs-smtp Mimics Nodemailer, Targets Atomic and Exodus Wallets

Related Posts

Microsoft and CrowdStrike Teaming Up to Bring Clarity To Threat Actor Mapping Cyber Security News
Farmers Insurance Cyber Attack – 1.1 Million Customers Data Exposed in Salesforce Attack Cyber Security News
How Businesses Stop Complex Social Engineering Attacks Early Cyber Security News
Pure Crypter Employs Multiple Evasion Techniques To Bypass Windows 11 24H2 Security Features Cyber Security News
Threat Actors Attacking Job Seekers With Three New Unique Adversaries Cyber Security News
CastleBot Malware-as-a-Service Deploys Range of Payloads Linked to Ransomware Attacks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical Qualcomm Vulnerabilities Allow Attackers to Execute Arbitrary Code Remotely
  • Malicious npm Package nodejs-smtp Mimics Nodemailer, Targets Atomic and Exodus Wallets
  • Zscaler Confirms Data Breach – Hackers Compromised Salesforce Instance and Stole Customer Data
  • How to Understand the OWASP Top 10
  • Android Droppers Now Deliver SMS Stealers and Spyware, Not Just Banking Trojans

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical Qualcomm Vulnerabilities Allow Attackers to Execute Arbitrary Code Remotely
  • Malicious npm Package nodejs-smtp Mimics Nodemailer, Targets Atomic and Exodus Wallets
  • Zscaler Confirms Data Breach – Hackers Compromised Salesforce Instance and Stole Customer Data
  • How to Understand the OWASP Top 10
  • Android Droppers Now Deliver SMS Stealers and Spyware, Not Just Banking Trojans

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News