← All briefs
critical September 21, 2025

Widespread Data Theft Targets Salesforce Instances via Salesloft Drift

Source report →

From August 8 to August 18, 2025, the threat actor tracked as UNC6395 conducted a large-scale data theft campaign by compromising OAuth tokens issued to the Salesloft Drift application, used to integrate Drift’s AI-enabled chat with Salesforce, and weaponizing these tokens to infiltrate numerous Salesforce instances. The attacker systematically exfiltrated high-value data from Salesforce objects such as Cases, Accounts, Users, and Opportunities. Their primary objective appears to have been harvesting credentials including AWS access keys, passwords, and Snowflake access tokens. After accessing the data, UNC6395 demonstrated operational security awareness by deleting query jobs to cover their tracks, although logs remained intact for post-incident analysis.

Additional reports from vendors confirmed that the incident had the characteristics of a supply chain compromise stemming from the Salesloft Drift integration. More than twenty organizations, including Google Workspace, Cloudflare, CyberArk, and Palo Alto Networks acknowledged some level of impact.

IP ADDRESS 19
154.41.95.2
176.65.149.100
179.43.159.198
44.215.108.109
185.130.47.58
185.207.107.130
185.220.101.133
185.220.101.143
185.220.101.164
185.220.101.167
185.220.101.169
185.220.101.180
185.220.101.185
185.220.101.33
192.42.116.179
192.42.116.20
195.47.238.178
195.47.238.83
194.15.36.117

Detections

Additional detection ideas (3)
  • Monitor software supply chain for unauthorized modifications to build pipelines or package registries
  • Detect broad file system enumeration or searching across SharePoint, code repos, and internal wikis
  • Monitor public-facing services for exploitation patterns — unusual POST bodies, deserialization payloads