Technology NewsTechnology NewsTechnology News
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Reading: Salesloft Drift Supply Chain Attacks Impact Security Leaders
Share
Font ResizerAa
Technology NewsTechnology News
Font ResizerAa
Search
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Follow US
  • Cookie Policy (EU)
  • Contact
  • About
© 2025 NEWSLINKER - Powered by LK SOFTWARE
Cybersecurity

Salesloft Drift Supply Chain Attacks Impact Security Leaders

Highlights

  • Major security firms faced data exposure via Salesloft Drift integration compromise.

  • The incident highlighted ongoing risks in third-party SaaS tool integrations.

  • Salesloft plans a comprehensive security review before Drift returns.

Kaan Demirel
Last updated: 2 September, 2025 - 11:19 pm 11:19 pm
Kaan Demirel 5 hours ago
Share
SHARE

A recent widespread incident involving Salesloft Drift has drawn attention to vulnerabilities in third-party integrations relied upon by leading technology and security firms. Companies such as Cloudflare, Palo Alto Networks, PagerDuty, SpyCloud, and Zscaler have reported varying degrees of data exposure following unauthorized access attributed to the use of the Drift chatbot platform. The unfolding situation has made many organizations reassess their security postures, particularly as they investigate whether their systems or customer information were affected. Customer concerns continue to grow as notices and updates trickle in from the companies involved, emphasizing the broad-reaching implications of supply chain attacks. Industry observers are closely watching the response and mitigation efforts, as companies work to understand the scope and impact of the breaches.

Contents
How Did the Attackers Gain Initial Access?Which Companies Were Impacted and How?What Are Companies Doing in Response?

While previous compromises involving software supply chain attacks have received attention, the current Salesloft Drift incident illustrates the continuing challenges companies face in securing third-party integrations. Reports from earlier this year highlighted the risks of shared ecosystem tools, but this latest breach involved not just direct customers of Drift and Salesloft, but also their integrations with major platforms such as Salesforce. Unlike similar past events that were more contained, this attack appears to have impacted hundreds of organizations simultaneously, underscoring persistent vulnerabilities in multivendor environments. Companies that had previously conducted security assessments on their integrations are now re-evaluating these measures in light of the recent exposures.

How Did the Attackers Gain Initial Access?

The specific method used by the threat actor, tracked as UNC6395, to gain its initial foothold within Salesloft Drift remains under investigation. Salesloft has stated,

“There is no evidence of any unusual or malicious activity with the Salesloft platform.”

Despite early indications that only Salesforce-integrated customers were at risk, later assessments by Google Threat Intelligence Group and Mandiant broadened the pool of potentially affected organizations to any using Drift.

Which Companies Were Impacted and How?

A number of prominent organizations experienced confirmed exposures. Data compromised at Zscaler included customer names, business contact details, job information, and support-related content. Zscaler’s integration with Salesforce through Salesloft Drift was cited as the entry point for unauthorized access. Cloudflare and Palo Alto Networks each reported that customer data within their support environments were potentially accessed, though no core services or infrastructure were breached. Okta acknowledged attempted access using a compromised token, but the attack was blocked due to controls on IP origin.

What Are Companies Doing in Response?

In response to the incident, Salesloft announced plans to take the Drift platform offline, aiming to conduct a comprehensive review and implement additional security measures. The company explained,

“This will provide the fastest path forward to comprehensively review the application and build additional resiliency and security in the system to return the application to full functionality.”

Impacted organizations have revoked exposed tokens, notified affected customers, and begun reassessments of their third-party integrations. Some companies, like Zscaler, were already transitioning away from Drift for unrelated reasons.

Large-scale supply chain attacks such as this continue to demonstrate the complexities posed by interconnected cloud services and vendor ecosystems. Organizations can benefit from regularly auditing the permissions and data flows associated with integrated third-party tools, implementing network segmentation, and applying restrictions such as allowed IPs for administrative access. Experiences from this incident highlight the importance of rapid incident response and transparent customer communication during a compromise. Companies with detailed records and robust detection controls were able to contain exposures more effectively than those relying solely on vendor assurances. Understanding the attack paths and limiting sensitive data storage within support systems may reduce exposure in future attacks.

You can follow us on Youtube, Telegram, Facebook, Linkedin, Twitter ( X ), Mastodon and Bluesky

You Might Also Like

Russian Ransomware Suspect Remains on Bail in California

FBI Highlights Risks in China’s Dependence on Tech Firms for Hacking

Salesloft Drift Attack Compromises Major Integrations Across Platforms

Treasury Targets Facilitators in North Korea IT Worker Scheme

Storm-0501 Exploits Cloud Gaps to Target Hybrid Infrastructures

Share This Article
Facebook Twitter Copy Link Print
Kaan Demirel
By Kaan Demirel
Kaan Demirel is a 28-year-old gaming enthusiast residing in Ankara. After graduating from the Statistics department of METU, he completed his master's degree in computer science. Kaan has a particular interest in strategy and simulation games and spends his free time playing competitive games and continuously learning new things about technology and game development. He is also interested in electric vehicles and cyber security. He works as a content editor at NewsLinker, where he leverages his passion for technology and gaming.
Previous Article Tesla Relocates Robotaxi Safety Monitors as Austin Routes Grow
Next Article Apple Faces Tough Competition from Garmin in Endurance Watch Market

Stay Connected

6.2kLike
8kFollow
2.3kSubscribe
1.7kFollow

Latest News

Apple Faces Tough Competition from Garmin in Endurance Watch Market
Wearables
Tesla Relocates Robotaxi Safety Monitors as Austin Routes Grow
Electric Vehicle
Tesla Surges in Turkey as Model Y Sales Outpace Rivals
Electric Vehicle
Robotics Industry Records Surging Investments and Key Leadership Shifts
AI Robotics
Rising DDR4 RAM Prices Push Consumers to Rethink Upgrade Timelines
Computing
NEWSLINKER – your premier source for the latest updates in ai, robotics, electric vehicle, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Join us on our journey of discovery and stay informed in this ever-evolving digital age.

ARTIFICAL INTELLIGENCE

  • Can Artificial Intelligence Achieve Consciousness?
  • What is Artificial Intelligence (AI)?
  • How does Artificial Intelligence Work?
  • Will AI Take Over the World?
  • What Is OpenAI?
  • What is Artifical General Intelligence?

ELECTRIC VEHICLE

  • What is Electric Vehicle in Simple Words?
  • How do Electric Cars Work?
  • What is the Advantage and Disadvantage of Electric Cars?
  • Is Electric Car the Future?

RESEARCH

  • Robotics Market Research & Report
  • Everything you need to know about IoT
  • What Is Wearable Technology?
  • What is FANUC Robotics?
  • What is Anthropic AI?
Technology NewsTechnology News
Follow US
About Us   -  Cookie Policy   -   Contact

© 2025 NEWSLINKER. Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Register Lost your password?