Google Alerts: Salesloft Drift Breach Affects All Integrations Beyond Salesforce

Aug 29, 2025
Data Breach / Salesforce

Google has issued a warning regarding the recent surge of attacks on Salesforce instances via Salesloft Drift, revealing that the scope of the breach is wider than initially believed. The advisory advises all Salesloft Drift customers to consider any authentication tokens linked to the Drift platform as potentially compromised. According to the Google Threat Intelligence Group (GTIG) and Mandiant, the attackers utilized stolen OAuth tokens to access emails from a select few Google Workspace accounts on August 9, 2025, following the breach of the OAuth tokens for the “Drift Email” integration. Importantly, this incident does not represent a compromise of Google Workspace or Alphabet itself. Only accounts specifically set up to integrate with Salesloft were at risk; other accounts on a customer’s Workspace remained secure.

Google Issues Warning on Expanded Impact of Salesloft Drift Breach

August 29, 2025

In a significant cybersecurity alert, Google has disclosed that the recent attacks targeting Salesforce instances through Salesloft’s Drift platform are far-reaching, affecting all integrations beyond Salesforce. In an updated advisory, the Google Threat Intelligence Group (GTIG) alongside Mandiant urged all users of Salesloft’s Drift to consider any authentication tokens associated with the platform as potentially compromised.

The hackers exploited stolen OAuth tokens, which enabled them to gain access to email accounts tied to the “Drift Email” integration. This intrusion was particularly evident on August 9, 2025, when a limited number of Google Workspace email accounts were accessed. It is crucial to emphasize that the breach did not involve a compromise of Google Workspace itself, nor that of its parent company, Alphabet. The unauthorized access was confined to accounts specifically configured for integration with Salesloft, preventing the attackers from reaching any unrelated customer accounts on the platform.

As organizations depend increasingly on cloud integrations for business operations, this incident underscores the critical importance of safeguarding authentication credentials. The attackers’ tactics suggest they employed techniques outlined in the MITRE ATT&CK framework, specifically those related to initial access and persistence. By breaching the OAuth tokens, the adversaries were able to establish a foothold that facilitated subsequent access to sensitive data.

Business owners must recognize the ongoing threats posed by such vulnerabilities, particularly in the context of interconnected applications. With the risk of privilege escalation through compromised tokens, the incident serves as a stark reminder to reevaluate security protocols surrounding third-party integrations.

As part of a proactive defense strategy, organizations should implement robust monitoring of authentication practices, considering enhancements such as multifactor authentication and regular audits of access rights. Moreover, this breach highlights the necessity of maintaining an agile response plan to address potential incidents affecting integrated services.

In the evolving landscape of cybersecurity, awareness is paramount. This breach not only sheds light on a specific incident but also reinforces the broader narrative of persistent threats that businesses face today. As we advance, vigilance and preparedness will be key in safeguarding sensitive data against an environment constantly shaped by evolving adversary tactics.

Source link