Salesforce Data Breach Shenanigans: The Drift Attack Comedy of Errors Unfolds!

Salesloft Drift app users beware! A sneaky supply chain attack has breached Salesforce data, targeting OAuth tokens and Google Workspace accounts. Hundreds are affected, with no vulnerabilities found in Salesforce or Google. Companies should review all third-party integrations, revoke credentials, and check for unauthorized access. Time to lock those digital doors!

Pro Dashboard

Hot Take:

Looks like Salesforce customers got a not-so-friendly Drift into chaos! This supply chain attack is like that surprise party you never wanted – full of unexpected guests poking around in places they shouldn’t be. Pro tip: Always keep your tokens in check, or they might just drift away into the wrong hands!

Key Points:

  • Supply chain attack targets Salesforce data via Salesloft Drift app.
  • Google Workspace accounts also impacted, though in a limited scope.
  • Organizations advised to treat all Drift authentication tokens as compromised.
  • 183 new IP-based indicators of compromise (IoCs) discovered, linked to Tor exit nodes.
  • The attack focused on exfiltrating credentials, affecting hundreds of organizations.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?