Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Accessed Customer Data From Salesforce

Hackers Accessed Customer Data From Salesforce

Posted on September 9, 2025September 9, 2025 By CWS

Dynatrace has confirmed it was impacted by a third-party information breach originating from the Salesloft Drift software, leading to unauthorized entry to buyer enterprise contact data saved in its Salesforce CRM.

The corporate confirmed that the incident was restricted to its CRM platform and didn’t influence any core Dynatrace merchandise, providers, or delicate buyer environments.

The safety incident originated in August 2025, when menace actors compromised Salesloft’s Drift software, a preferred third-party instrument used for buyer engagement.

This compromise allowed the attackers to achieve unauthorized entry to the Salesforce environments of firms using the app.

In response to the assault, Salesloft and Salesforce moved to disable the compromised connections and commenced notifying affected shoppers, which included the observability big Dynatrace.

Dynatrace’s Response And Investigation

Upon receiving notification of the third-party breach, Dynatrace’s safety workforce took instant motion by disabling the Drift software inside its atmosphere to sever the connection and stop additional unauthorized entry.

The corporate launched a complete investigation, bringing in third-party cybersecurity specialists to find out the total scope of the incident.

The investigation confirmed that the malicious exercise was restricted completely to its Salesforce CRM occasion, which the corporate makes use of for managing buyer relationships and advertising and marketing actions.

Critically, Dynatrace clarified that none of its personal services or products have been compromised. This consists of any programs that home buyer information or providers that straight interface with buyer programs.

Moreover, the corporate reported that it doesn’t make the most of the “case perform” inside Salesforce, which means no buyer assist case data was accessible to the attackers.

Dynatrace assured stakeholders that the incident precipitated no disruption to its enterprise operations. The info uncovered within the breach is restricted to enterprise contact data. This consists of the primary and final names of buyer contacts and their related firm identifiers.

No delicate credentials, monetary particulars, or different confidential data have been accessed. After a interval of investigation and remediation, Salesloft notified Dynatrace on September seventh that the safe connections had been re-enabled.

In gentle of the publicity of enterprise contact data, Dynatrace has issued steering to its clients, urging them to train elevated warning towards potential social engineering and phishing campaigns.

The corporate emphasised that its workers won’t ever contact clients by way of cellphone or e mail to request passwords, multi-factor authentication (MFA) codes, or different delicate credentials.

Prospects are suggested to be vigilant and confirm that every one communications and hyperlinks originate from trusted Dynatrace domains.

Discover this Story Attention-grabbing! Comply with us on Google Information, LinkedIn, and X to Get Extra On the spot Updates.

Cyber Security News Tags:Accessed, Customer, Data, Hackers, Salesforce

Post navigation

Previous Post: 20 Popular npm Packages With 2 Billion Weekly Downloads Compromised in Supply Chain Attack
Next Post: SentinelOne to Acquire Observo AI in $225 Million Deal

Related Posts

0-Click ChatGPT Agent Vulnerability Allows Sensitive Data Exfiltration from Gmail 0-Click ChatGPT Agent Vulnerability Allows Sensitive Data Exfiltration from Gmail Cyber Security News
Patch for Code Execution Vulnerabilities in Endpoint Manager Patch for Code Execution Vulnerabilities in Endpoint Manager Cyber Security News
Threat Actors Weaponize LNK Files With New REMCOS Variant That Bypasses AV Engines Threat Actors Weaponize LNK Files With New REMCOS Variant That Bypasses AV Engines Cyber Security News
Accessible AI-Powered Cybersecurity Platform for SME Security Accessible AI-Powered Cybersecurity Platform for SME Security Cyber Security News
Hackers Attacking Palo Alto Networks’ GlobalProtect VPN Portals with 2.3 Million Attacks Hackers Attacking Palo Alto Networks’ GlobalProtect VPN Portals with 2.3 Million Attacks Cyber Security News
CISA Warns of OpenPLC ScadaBR cross-site scripting vulnerability Exploited in Attacks CISA Warns of OpenPLC ScadaBR cross-site scripting vulnerability Exploited in Attacks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News