Salesloft Drift Breach: When OAuth Tokens Go Rogue and Integrations Go Haywire!

Google warns that the Salesloft Drift OAuth breach affects all integrations, not just Salesforce. All tokens should be treated as compromised. Attackers accessed a few Google Workspace emails via Drift, but only for accounts specifically integrated with Salesloft. Experts advise reviewing integrations and rotating credentials to manage the broader impact.

Pro Dashboard

Hot Take:

Looks like Salesloft Drift has got some serious explaining to do as their OAuth breach is spreading like wildfire! It’s not just Salesforce feeling the heat, but now every integration is in the hot seat. Google’s giving everyone the side-eye, suggesting we treat those tokens like last week’s leftovers—definitely compromised. Let’s hope Salesloft has a drift correction plan that doesn’t involve a compass and a map!

Key Points:

  • Salesloft Drift OAuth breach affects all integrations, not just Salesforce.
  • Google advises treating all connected tokens as compromised.
  • Attackers used stolen OAuth tokens to access some Google Workspace emails.
  • Salesloft and Salesforce are working to revoke tokens and re-authenticate integrations.
  • UNC6395 is the threat actor behind the attack, targeting Salesforce through compromised OAuth tokens.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?