Hackers Hijack Salesloft: OAuth Token Heist Unleashes Chaos on Salesforce Data

Hackers targeted Salesloft to swipe OAuth tokens for the Drift AI chat, with UNC6395 making off like digital bandits. Google and Mandiant suggest Salesforce users check their data’s pulse, as AWS keys and Snowflake tokens may have joined the heist. Remember, in the world of data theft, it’s always better to be safe than 503’d.

Pro Dashboard

Hot Take:

Data theft has taken a new twist, with UNC6395 pulling off the digital equivalent of a high-wire act. One minute they’re stealing OAuth tokens, and the next they’re walking the tightrope of Salesforce data exfiltration. Meanwhile, Salesloft and Salesforce are left scrambling like a pair of circus clowns trying to put out a fire with a bucket full of confetti. It’s a real three-ring circus of cybersecurity chaos!

Key Points:

  • UNC6395 hacked Salesloft to steal OAuth tokens related to Drift AI chat.
  • The campaign targeted Salesforce, exfiltrating data and credentials.
  • Google and Mandiant are on the case, urging immediate credential rotation.
  • Salesloft revoked Drift-Salesforce connections and alerted affected users.
  • Salesloft and Salesforce are demanding admins re-authenticate integrations.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?