Technology NewsTechnology NewsTechnology News
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Reading: Salesloft Drift Attack Compromises Major Integrations Across Platforms
Share
Font ResizerAa
Technology NewsTechnology News
Font ResizerAa
Search
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Follow US
  • Cookie Policy (EU)
  • Contact
  • About
© 2025 NEWSLINKER - Powered by LK SOFTWARE
Cybersecurity

Salesloft Drift Attack Compromises Major Integrations Across Platforms

Highlights

  • Attackers exploited SaleLoft Drift integrations beyond initial victim estimates.

  • Security teams urge immediate review and rotation of all API keys.

  • Investigations are ongoing to reveal the full scope and initial access details.

Ethan Moreno
Last updated: 28 August, 2025 - 11:19 pm 11:19 pm
Ethan Moreno 12 hours ago
Share
SHARE

A large-scale cybersecurity incident has expanded the warning perimeter for organizations using Salesloft Drift, an AI-powered chat platform. Emerging evidence shows that the attack risks extend beyond initial forecasts, with broader implications for companies using integrations between Drift and other business systems. Security teams have begun advising all companies with Drift integrations to review and possibly suspend those connections, highlighting a more complex threat landscape than first understood. Although Drift’s integration capabilities provide valuable connectivity for customer engagement, that same functionality now represents a critical vulnerability shared by numerous high-profile platforms.

Contents
Scope of Compromise Reaches Beyond Salesforce?Response Actions and Security RecommendationsDetermining the Initial Entry Point Remains Ongoing?

When reports of this incident first surfaced, focus was on a narrower group of affected users, particularly those leveraging Salesforce in conjunction with Drift. However, subsequent analysis has revealed a more extensive impact, including organizations utilizing Google Workspace and other connected services. Early investigations tended to downplay the potential for downstream compromise, but new evidence has shifted attention to a much wider array of third-party integrations and possible victims. The continuing investigation is revealing layers of exposure that were not previously acknowledged in public updates.

Scope of Compromise Reaches Beyond Salesforce?

Investigators have discovered that the malicious activity traced to the UNC6395 threat group was not confined to Salesforce integrations. Customers connecting Drift to Google Workspace, among many others, have reportedly experienced breaches. According to Google’s Threat Intelligence Group, these attacks involve stolen OAuth tokens and a direct search for valuable credentials. One affected party has even been identified among former Drift customers, though verification is ongoing. Google continues to estimate that the number of potentially impacted organizations exceeds 700, with additional cases likely to surface.

Response Actions and Security Recommendations

Salesloft, now the parent company of Drift, detailed measures to mitigate risk for current users. The company’s updated protocols focus on revoking and rotating API keys used in all third-party integrations involving Drift. Partner service Salesforce responded by disabling the Drift connector in its ecosystem, effectively halting further exposure via that channel. However, Salesforce clarified that no underlying vulnerability has been found in its own platform, maintaining a separation between the Drift-related breach and its own security posture. Other technology partners and researchers continue to collaborate on containment and remediation efforts.

“We’re telling organizations to treat any Drift integration into any platform as potentially compromised, so that increases the scope of victims,”

Mandiant Consulting CTO Charles Carmakal stated.

Determining the Initial Entry Point Remains Ongoing?

The specific method by which UNC6395 gained its initial foothold in Drift’s infrastructure remains a subject of investigation. Security experts are tracing possible vectors, particularly since the group succeeded in harvesting credentials that grant access to AWS, VPN, and Snowflake accounts associated with affected organizations.

“We are working with Salesloft Drift to investigate the root cause of what occurred and then it’ll be up to them to publish that,”

Carmakal noted. The ongoing forensic probe aims to clarify the attackers’ tactics and prevent future exploitation, as remediation steps continue to evolve with each new finding.

Recent developments surrounding the Salesloft Drift breach indicate a wider network of potential targets than earlier breaches linked to credential harvesting via OAuth tokens. Unlike prior incidents that largely focused on individual CRM integrations or limited vendor ecosystems, the current exposure shows a risk extending through multiple high-value SaaS platforms. This expansion to Google Workspace and other third parties sets the current intrusion apart by its scope and versatility. Other reports tracked isolated attacker activities, but subsequent analysis now points to a coordinated plane targeting interconnected APIs, making containment and victim notification more complex. The industry response now involves heightened alertness around comprehensive third-party security reviews for all integrated platforms, which represents a significant escalation in standard post-breach procedures.

As the investigation proceeds, companies using Drift are reassessing their integration security and monitoring for unauthorized access across all connected platforms. With Drift’s integrations spanning over 50 external tools, any linked service could represent a potential pathway for credential theft or broader compromise. The incident also underscores the ripple effect that a breach in an integration platform can have across enterprise SaaS environments, prompting intensified scrutiny on partnership security and the management of authentication credentials. IT teams should consider reviewing all third-party connections for anomalous activity, adopting a more proactive approach to access management, and accelerating credential rotation policies. These steps can help reduce exposure to ongoing or future threats rooted in supplier ecosystems.

You can follow us on Youtube, Telegram, Facebook, Linkedin, Twitter ( X ), Mastodon and Bluesky

You Might Also Like

Treasury Targets Facilitators in North Korea IT Worker Scheme

Storm-0501 Exploits Cloud Gaps to Target Hybrid Infrastructures

Citrix Faces New Urgent Security Threats Through NetScaler Vulnerabilities

Hackers Target Hundreds of Salesforce Customers Using Stolen OAuth Tokens

Data I/O Faces Operational Disruptions After Ransomware Strikes

Share This Article
Facebook Twitter Copy Link Print
Ethan Moreno
By Ethan Moreno
Ethan Moreno, a 35-year-old California resident, is a media graduate. Recognized for his extensive media knowledge and sharp editing skills, Ethan is a passionate professional dedicated to improving the accuracy and quality of news. Specializing in digital media, Moreno keeps abreast of technology, science and new media trends to shape content strategies.
Previous Article CD Projekt Expands Teams on The Witcher 4 and Cyberpunk 2
Next Article Apple Launches Watch Series 11 and Expands Lineup with Two More Models

Stay Connected

6.2kLike
8kFollow
2.3kSubscribe
1.7kFollow

Latest News

Players Solve Wordle’s August 29 Puzzle with Strategic Thinking
Gaming
New York Times Puts The Mini Crossword Behind Paywall
Gaming
Apple Launches Watch Series 11 and Expands Lineup with Two More Models
Wearables
CD Projekt Expands Teams on The Witcher 4 and Cyberpunk 2
Gaming
Diablo Team Forms Union as More Blizzard Staff Organize
Gaming
NEWSLINKER – your premier source for the latest updates in ai, robotics, electric vehicle, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Join us on our journey of discovery and stay informed in this ever-evolving digital age.

ARTIFICAL INTELLIGENCE

  • Can Artificial Intelligence Achieve Consciousness?
  • What is Artificial Intelligence (AI)?
  • How does Artificial Intelligence Work?
  • Will AI Take Over the World?
  • What Is OpenAI?
  • What is Artifical General Intelligence?

ELECTRIC VEHICLE

  • What is Electric Vehicle in Simple Words?
  • How do Electric Cars Work?
  • What is the Advantage and Disadvantage of Electric Cars?
  • Is Electric Car the Future?

RESEARCH

  • Robotics Market Research & Report
  • Everything you need to know about IoT
  • What Is Wearable Technology?
  • What is FANUC Robotics?
  • What is Anthropic AI?
Technology NewsTechnology News
Follow US
About Us   -  Cookie Policy   -   Contact

© 2025 NEWSLINKER. Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Register Lost your password?