Google Issues Warning on Expanded Impact of Salesloft Drift Breach
August 29, 2025
In a significant cybersecurity alert, Google has disclosed that the recent attacks targeting Salesforce instances through Salesloft’s Drift platform are far-reaching, affecting all integrations beyond Salesforce. In an updated advisory, the Google Threat Intelligence Group (GTIG) alongside Mandiant urged all users of Salesloft’s Drift to consider any authentication tokens associated with the platform as potentially compromised.
The hackers exploited stolen OAuth tokens, which enabled them to gain access to email accounts tied to the “Drift Email” integration. This intrusion was particularly evident on August 9, 2025, when a limited number of Google Workspace email accounts were accessed. It is crucial to emphasize that the breach did not involve a compromise of Google Workspace itself, nor that of its parent company, Alphabet. The unauthorized access was confined to accounts specifically configured for integration with Salesloft, preventing the attackers from reaching any unrelated customer accounts on the platform.
As organizations depend increasingly on cloud integrations for business operations, this incident underscores the critical importance of safeguarding authentication credentials. The attackers’ tactics suggest they employed techniques outlined in the MITRE ATT&CK framework, specifically those related to initial access and persistence. By breaching the OAuth tokens, the adversaries were able to establish a foothold that facilitated subsequent access to sensitive data.
Business owners must recognize the ongoing threats posed by such vulnerabilities, particularly in the context of interconnected applications. With the risk of privilege escalation through compromised tokens, the incident serves as a stark reminder to reevaluate security protocols surrounding third-party integrations.
As part of a proactive defense strategy, organizations should implement robust monitoring of authentication practices, considering enhancements such as multifactor authentication and regular audits of access rights. Moreover, this breach highlights the necessity of maintaining an agile response plan to address potential incidents affecting integrated services.
In the evolving landscape of cybersecurity, awareness is paramount. This breach not only sheds light on a specific incident but also reinforces the broader narrative of persistent threats that businesses face today. As we advance, vigilance and preparedness will be key in safeguarding sensitive data against an environment constantly shaped by evolving adversary tactics.