Salesforce Smackdown: How a Sneaky Threat Actor Took Salesloft for a Spin
Watch out! A threat actor is using the Salesloft Drift integration to sneak into customer Salesforce instances. From August 8-18, 2025, they exfiltrated data with compromised OAuth credentials. Be vigilant, rotate credentials, and review logs to avoid becoming their next target. Stay skeptical, verify requests, and embrace Zero Trust principles!

Hot Take:
Who knew that integrations could be such gaping holes of vulnerability? It’s like discovering your favorite chocolate chip cookie recipe is actually a Trojan horse for calorie theft. While Salesforce was busy selling dreams, a threat actor was out here taking names and data! And just like that, the Salesloft Drift integration went from being a handy tool to a hacker’s Pandora’s box. Lesson learned: always read the fine print, especially when it’s written in code.
Key Points:
- A threat actor used compromised OAuth credentials to pilfer data from Salesforce via the Salesloft Drift integration.
- Salesforce objects like Account, Contact, Case, and Opportunity were exfiltrated.
- Salesloft acted promptly by notifying affected customers and revoking Drift application tokens.
- Organizations are advised to review logs, rotate credentials, and initiate threat hunting activities.
- Zero Trust principles and skepticism towards unsolicited communications can help mitigate risks.