Salesloft OAuth Breach Through Drift AI Chat Agent Compromises Salesforce Customer Data

August 27, 2025
Cloud Security / Threat Intelligence

A significant data breach has targeted the sales automation platform Salesloft, allowing hackers to steal OAuth and refresh tokens linked to the Drift AI chat agent. This opportunistic attack has been connected to a threat group identified by Google Threat Intelligence Group (GTIG) and Mandiant, known as UNC6395. GTIG has reported over 700 potentially affected organizations. According to researchers Austin Larsen, Matt Lin, Tyler McLellan, and Omar ElAhdan, the attacks began as early as August 8, 2025, and continued until at least August 18, 2025, focusing on Salesforce customer accounts through the compromised Salesloft Drift application. The hackers have been seen exporting large volumes of data from various corporate Salesforce instances, likely in an effort to harvest credentials for further exploitation.

Salesloft OAuth Breach through Drift AI Chat Agent Affects Salesforce Customer Data

August 27, 2025

In a significant cybersecurity incident, a data breach involving the sales automation service Salesloft has led to the compromise of OAuth and refresh tokens linked to the Drift artificial intelligence chat agent. This incident appears to be part of a larger data theft campaign attributed to a threat actor designated as UNC6395 by both the Google Threat Intelligence Group (GTIG) and Mandiant. According to insights shared with The Hacker News, over 700 organizations may have been affected by this breach.

The attack is reported to have commenced around August 8, 2025, and persisted until at least August 18, 2025. During this period, the actor specifically focused on Salesforce customer instances through the exploitation of compromised OAuth tokens associated with the Salesloft Drift application.

As a result of these attacks, large volumes of sensitive data have been extracted from numerous corporate Salesforce accounts. The primary motivation behind these actions appears to be the harvesting of credentials, which could subsequently facilitate further breaches within the affected organizations.

The operational tactics employed in this breach align closely with several strategies outlined in the MITRE ATT&CK Framework. Initial access was likely obtained through the exploitation of OAuth tokens, illustrating a sophisticated approach to gaining entry into protected environments. Following the breach, the actor may have employed techniques related to data exfiltration, which underscore the importance of robust access controls and monitoring systems for organizations utilizing third-party applications.

This breach raises crucial questions for businesses, particularly those relying on interoperability between sales platforms and third-party AI solutions. The risks associated with such integrations cannot be overstated, and companies are urged to conduct thorough reviews of their security postures to mitigate potential vulnerabilities.

As this incident unfolds, the implications for affected organizations may be profound. Cybersecurity professionals are reminded of the importance of vigilance and proactive response strategies in safeguarding sensitive customer information against increasingly sophisticated cyber threats. Through understanding and addressing the tactics used by attackers, businesses can enhance their defenses and better protect their assets in a rapidly evolving threat landscape.

Source link