Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hundreds of Salesforce Customers Hit by Widespread Data Theft Campaign

Posted on August 27, 2025August 27, 2025 By CWS

Hackers stole information from a whole bunch of Salesforce buyer situations in a widespread marketing campaign earlier this month, Google Risk Intelligence Group (GTIG) warns.

The assaults didn’t exploit a vulnerability inside the core Salesforce platform, however relied on compromised OAuth tokens for Salesloft Drift, a third-party AI chat bot.

The marketing campaign, GTIG says, was carried out by a risk actor tracked as UNC6395 between August 8 and August 18, 2025.

“The actor systematically exported massive volumes of knowledge from quite a few company Salesforce situations. GTIG assesses the first intent of the risk actor is to reap credentials,” Google’s risk intelligence unit says.

UNC6395 was seen looking the stolen data for secrets and techniques and delicate data, together with AWS entry keys, passwords, and Snowflake-related entry tokens.

Salesloft, which shared indicators of compromise (IOCs) to assist prospects establish potential compromises, has identified that solely organizations integrating Drift with Salesforce have been affected by the incident.

Working with Salesforce, Salesloft revoked the tokens for Drift on August 20. Thus, all Drift-Salesforce connections should be re-authenticated to re-enable the combination.

“We’ve got decided that this incident didn’t influence prospects who don’t use our Drift-Salesforce integration. Based mostly on our ongoing investigation, we don’t see proof of ongoing malicious exercise associated to this incident,” Salesloft mentioned on Tuesday.Commercial. Scroll to proceed studying.

Based on GTIG, roughly 700 Salesforce prospects have been compromised in these assaults, however Salesforce, which has eliminated Drift from AppExchange, says the hackers solely accessed a small variety of buyer situations by way of the Drift connection to the platform and that every one the affected prospects have been notified.

Organizations integrating Drift with Salesforce ought to think about their Salesforce information compromised, GTIG says, advising them to hunt for indicators of compromise and rotate all credentials and secrets and techniques contained inside Salesforce objects.

“UNC6395 demonstrated operational safety consciousness by deleting question jobs, nonetheless logs weren’t impacted and organizations ought to nonetheless evaluation related logs for proof of knowledge publicity,” GTIG notes.

Associated: Docker Desktop Vulnerability Results in Host Compromise

Associated: Chinese language Silk Hurricane Hackers Focusing on A number of Industries in North America

Associated: AWS Trusted Advisor Tricked Into Displaying Unprotected S3 Buckets as Safe

Associated:Australia’s TPG Telecom Investigating iiNet Hack

Security Week News Tags:Campaign, Customers, Data, Hit, Hundreds, Salesforce, Theft, Widespread

Post navigation

Previous Post: China-Linked Hackers Hijack Web Traffic to Deliver Backdoor
Next Post: New ShadowCaptcha Attack Exploiting Hundreds of WordPress Sites to Tricks Victims into Executing Malicious Commands

Related Posts

Microsoft 365 Direct Send Abused for Phishing Security Week News
Coupang to Issue $1.17 Billion in Vouchers Over Data Breach Security Week News
Armenian Man Extradited to US Over Ryuk Ransomware Attacks Security Week News
US Sanctions Russian National, Chinese Firm Aiding North Korean IT Workers Security Week News
TrustCloud Raises $15 Million for Security Assurance Platform Security Week News
Chinese Silk Typhoon Hackers Exploited Commvault Zero-Day Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Instagram Confirms no System Breach and Fixed External Party Password Reset Issue
  • Network Security Checklist – 2026
  • Leveraging OSINT Tools for Enhanced Cybersecurity Threat Intelligence
  • Data Breach at Texas Gas Station Operator Exposes Info of 377,000+ Customers
  • MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Instagram Confirms no System Breach and Fixed External Party Password Reset Issue
  • Network Security Checklist – 2026
  • Leveraging OSINT Tools for Enhanced Cybersecurity Threat Intelligence
  • Data Breach at Texas Gas Station Operator Exposes Info of 377,000+ Customers
  • MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark