Salesforce’s Invisible Thieves: How OAuth Tokens Became the New Banditry in Cybersecurity!
Salesforce data breach alert! UNC6395 cleverly sidestepped MFA by filching OAuth tokens, granting them access without a password. Organizations, it’s time to tighten the reins on non-human identities before hackers make off with your secrets in style!

Hot Take:
In the latest episode of “The Cyber Heist Chronicles,” our villain UNC6395 pulls off an Ocean’s Eleven-style caper, bypassing security with the ease of a cat burglar who found a backdoor key under the welcome mat. Salesforce never saw it coming, and now everyone is scrambling to lock the barn doors after the horse has bolted. Moral of the story: Don’t underestimate the power of invisible keys and the sneaky non-humans who wield them.
Key Points:
– UNC6395 bypassed Salesforce security using stolen OAuth tokens, sidestepping MFA.
– Attackers targeted high-value data such as AWS access keys and Snowflake tokens.
– The breach involved exploiting non-human identities (NHIs), a growing trend in cyberattacks.
– Salesloft, Salesforce, and Google responded by revoking tokens and notifying affected parties.
– Organizations are urged to strengthen security controls, focusing on NHIs and access restrictions.