Technology NewsTechnology NewsTechnology News
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Reading: Hackers Target Hundreds of Salesforce Customers Using Stolen OAuth Tokens
Share
Font ResizerAa
Technology NewsTechnology News
Font ResizerAa
Search
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Follow US
  • Cookie Policy (EU)
  • Contact
  • About
© 2025 NEWSLINKER - Powered by LK SOFTWARE
Cybersecurity

Hackers Target Hundreds of Salesforce Customers Using Stolen OAuth Tokens

Highlights

  • Attackers exploited OAuth tokens to steal data from over 700 Salesforce customers.

  • Salesloft and Salesforce revoked tokens and notified all affected users.

  • Experts recommend reviewing integrations and rotating credentials for better security.

Samantha Reed
Last updated: 26 August, 2025 - 11:49 pm 11:49 pm
Samantha Reed 2 days ago
Share
SHARE

Cloud security professionals have contended with escalating fears surrounding the safety of third-party software integrations as new cyber risks emerge. The latest incident, affecting hundreds of organizations, shows how attackers can bypass security by exploiting connections between widely used applications. Users of platforms like Salesforce and third-party tools such as Salesloft Drift may be rethinking their approach to access controls and token management in light of recent revelations. This event raises questions about how organizations handle digital trust between cloud applications and whether current best practices are sufficient amid the increasing popularity of AI-powered sales tools.

Contents
How Did Hackers Infiltrate Salesforce Accounts So Effectively?What Measures Did the Companies Take After Discovery?What Are the Implications for OAuth Token Security?

Earlier data breaches linked to OAuth token theft have involved fewer victims and slower detection times, often relying on individual organizations’ response capabilities rather than coordinated action between vendors. Unlike previous incidents that focused on piecemeal access, this campaign showed higher technical proficiency and automation, allowing threat actors to compromise hundreds of Salesforce customers rapidly through Salesloft Drift connections. This contrasts with other OAuth-related breaches, which have typically involved more contained exploitation.

How Did Hackers Infiltrate Salesforce Accounts So Effectively?

According to the Google Threat Intelligence Group (GTIG), the attack, which began on August 8 and lasted for 10 days, was orchestrated by a group identified as UNC6395. They used stolen OAuth tokens from Salesloft Drift, a chat agent integrated with Salesforce, to gather large volumes of customer data. Automation tools written in Python enabled them to target more than 700 organizations, processing data theft sequentially with minimal manual effort. The attackers’ main focus was harvesting high-value credentials, such as access keys for Amazon Web Services, Snowflake, and various VPNs.

What Measures Did the Companies Take After Discovery?

Once the breaches surfaced, Salesloft collaborated with Salesforce to quickly revoke all active and refresh tokens tied to the affected Salesloft Drift app. The company notified impacted users and isolated the integration responsible for the breach. Salesforce clarified that only customers using Salesloft Drift were affected, noting that its core platform was not compromised, but rather the app connection posed the risk. Google’s report states that the attack campaign ceased after access was cut on August 20.

What Are the Implications for OAuth Token Security?

This sequence of attacks underscores vulnerabilities in OAuth and third-party API integration across cloud environments. Google recommends that customers who used Salesloft Drift with Salesforce assume their data may have been accessed and take steps such as rotating credentials and investigating signs of data loss. Tyler McLellan, principal threat analyst at GTIG, stated,

“Using a single token stolen from Salesloft, the threat actor was able to access tokens for any Drift linked organization. The threat actor then used the Salesforce tokens to directly access that data and exfiltrate it to servers, where they looked for plaintext credentials including Amazon, Snowflake and other passwords,”

Salesloft confirmed collaboration with Salesforce in mitigating the situation and issued public statements encouraging vigilance and reviewing integrations. At present, Mandiant Consulting reports no signs that the attackers misused the stolen credentials beyond the immediate campaign. Austin Larsen, principal threat analyst at GTIG, commented,

“GTIG is aware of over 700 potentially impacted organizations. The threat actor used a Python tool to automate the data theft process for each organization that was targeted.”

Stringent management and periodic review of access rights can help organizations reduce exposure to similar attacks. It is essential to audit all third-party app connections and follow standardized processes for credential rotation when an incident occurs. Token-based authentication, while enhancing convenience, introduces risks if tokens are not viewed as sensitive assets requiring strong protection. Companies using cloud-to-cloud integrations should maintain an inventory of app authorizations and prepare quick-response remediation steps should unauthorized access be detected. This multi-organization breach highlights the necessity for shared vigilance in the SaaS ecosystem, demonstrating that supply chain and integration security can have broad effects beyond individual firms. Regular security assessments and updated protocols for third-party integrations are key to reducing risks posed by increasingly sophisticated attack campaigns.

You can follow us on Youtube, Telegram, Facebook, Linkedin, Twitter ( X ), Mastodon and Bluesky

You Might Also Like

Treasury Targets Facilitators in North Korea IT Worker Scheme

Storm-0501 Exploits Cloud Gaps to Target Hybrid Infrastructures

Citrix Faces New Urgent Security Threats Through NetScaler Vulnerabilities

Data I/O Faces Operational Disruptions After Ransomware Strikes

Interpol-Led Operation Targets Cybercrime Networks Across Africa

Share This Article
Facebook Twitter Copy Link Print
Samantha Reed
By Samantha Reed
Samantha Reed is a 40-year-old, New York-based technology and popular science editor with a degree in journalism. After beginning her career at various media outlets, her passion and area of expertise led her to a significant position at Newslinker. Specializing in tracking the latest developments in the world of technology and science, Samantha excels at presenting complex subjects in a clear and understandable manner to her readers. Through her work at Newslinker, she enlightens a knowledge-thirsty audience, highlighting the role of technology and science in our lives.
Previous Article Blue Water Autonomy Secures $50M to Deploy Unmanned Naval Ships
Next Article Citrix Faces New Urgent Security Threats Through NetScaler Vulnerabilities

Stay Connected

6.2kLike
8kFollow
2.3kSubscribe
1.7kFollow

Latest News

Tencent Hunyuan Video-Foley Delivers Synchronized Audio to AI Videos
AI
AI Agents Join Forces to Tackle Disinformation on Social Platforms
AI
Wordle Stays Consistent as Players Solve SPLIT on August 28
Gaming
Tesla Prepares to Launch Upgraded Model Y Performance in Europe
Electric Vehicle
AMD Readies Next-Gen Radeon Flagship for High-End GPU Market
Computing
NEWSLINKER – your premier source for the latest updates in ai, robotics, electric vehicle, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Join us on our journey of discovery and stay informed in this ever-evolving digital age.

ARTIFICAL INTELLIGENCE

  • Can Artificial Intelligence Achieve Consciousness?
  • What is Artificial Intelligence (AI)?
  • How does Artificial Intelligence Work?
  • Will AI Take Over the World?
  • What Is OpenAI?
  • What is Artifical General Intelligence?

ELECTRIC VEHICLE

  • What is Electric Vehicle in Simple Words?
  • How do Electric Cars Work?
  • What is the Advantage and Disadvantage of Electric Cars?
  • Is Electric Car the Future?

RESEARCH

  • Robotics Market Research & Report
  • Everything you need to know about IoT
  • What Is Wearable Technology?
  • What is FANUC Robotics?
  • What is Anthropic AI?
Technology NewsTechnology News
Follow US
About Us   -  Cookie Policy   -   Contact

© 2025 NEWSLINKER. Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Register Lost your password?