Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hundreds of Salesforce Customers Hit by Widespread Data Theft Campaign

Posted on August 27, 2025August 27, 2025 By CWS

Hackers stole information from a whole bunch of Salesforce buyer situations in a widespread marketing campaign earlier this month, Google Risk Intelligence Group (GTIG) warns.

The assaults didn’t exploit a vulnerability inside the core Salesforce platform, however relied on compromised OAuth tokens for Salesloft Drift, a third-party AI chat bot.

The marketing campaign, GTIG says, was carried out by a risk actor tracked as UNC6395 between August 8 and August 18, 2025.

“The actor systematically exported massive volumes of knowledge from quite a few company Salesforce situations. GTIG assesses the first intent of the risk actor is to reap credentials,” Google’s risk intelligence unit says.

UNC6395 was seen looking the stolen data for secrets and techniques and delicate data, together with AWS entry keys, passwords, and Snowflake-related entry tokens.

Salesloft, which shared indicators of compromise (IOCs) to assist prospects establish potential compromises, has identified that solely organizations integrating Drift with Salesforce have been affected by the incident.

Working with Salesforce, Salesloft revoked the tokens for Drift on August 20. Thus, all Drift-Salesforce connections should be re-authenticated to re-enable the combination.

“We’ve got decided that this incident didn’t influence prospects who don’t use our Drift-Salesforce integration. Based mostly on our ongoing investigation, we don’t see proof of ongoing malicious exercise associated to this incident,” Salesloft mentioned on Tuesday.Commercial. Scroll to proceed studying.

Based on GTIG, roughly 700 Salesforce prospects have been compromised in these assaults, however Salesforce, which has eliminated Drift from AppExchange, says the hackers solely accessed a small variety of buyer situations by way of the Drift connection to the platform and that every one the affected prospects have been notified.

Organizations integrating Drift with Salesforce ought to think about their Salesforce information compromised, GTIG says, advising them to hunt for indicators of compromise and rotate all credentials and secrets and techniques contained inside Salesforce objects.

“UNC6395 demonstrated operational safety consciousness by deleting question jobs, nonetheless logs weren’t impacted and organizations ought to nonetheless evaluation related logs for proof of knowledge publicity,” GTIG notes.

Associated: Docker Desktop Vulnerability Results in Host Compromise

Associated: Chinese language Silk Hurricane Hackers Focusing on A number of Industries in North America

Associated: AWS Trusted Advisor Tricked Into Displaying Unprotected S3 Buckets as Safe

Associated:Australia’s TPG Telecom Investigating iiNet Hack

Security Week News Tags:Campaign, Customers, Data, Hit, Hundreds, Salesforce, Theft, Widespread

Post navigation

Previous Post: China-Linked Hackers Hijack Web Traffic to Deliver Backdoor
Next Post: Attacker Context and Historical iOS Zero-Click Similarities

Related Posts

SAP Patches Critical Flaws That Could Allow Remote Code Execution, Full System Takeover Security Week News
US Student to Plead Guilty Over PowerSchool Hack Security Week News
Cybersecurity M&A Roundup: 44 Deals Announced in July 2025 Security Week News
Apple Patches Safari Vulnerability Flagged as Exploited Against Chrome Security Week News
Possible Zero-Day Patched in SonicWall SMA Appliances Security Week News
OT Networks Targeted in Widespread Exploitation of Erlang/OTP Vulnerability Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Storm-0501 Exploits Entra ID to Exfiltrate and Delete Azure Data in Hybrid Cloud Attacks
  • 28,000+ Citrix Servers Exposed to Active 0-Day RCE Vulnerability Exploited in the Wild
  • PoC Exploit Released for CrushFTP 0-day Vulnerability (CVE-2025-54309)
  • How ClickFix and Multi-Stage Frameworks Are Breaking Enterprise Defenses
  • Someone Created First AI-Powered Ransomware Using OpenAI’s gpt-oss:20b Model

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Storm-0501 Exploits Entra ID to Exfiltrate and Delete Azure Data in Hybrid Cloud Attacks
  • 28,000+ Citrix Servers Exposed to Active 0-Day RCE Vulnerability Exploited in the Wild
  • PoC Exploit Released for CrushFTP 0-day Vulnerability (CVE-2025-54309)
  • How ClickFix and Multi-Stage Frameworks Are Breaking Enterprise Defenses
  • Someone Created First AI-Powered Ransomware Using OpenAI’s gpt-oss:20b Model

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News