Salesloft Drift Drama: How a GitHub Oopsie Led to Salesforce Data Dilemma!

Salesloft recently confirmed that the breach involving its Drift application has been contained, with customer protections in place. Attackers accessed a GitHub account, but the core Salesloft environment remained secure. The breach was part of a larger campaign targeting Salesforce integrations. Mandiant continues to ensure the integrity of all environments.

Pro Dashboard

Hot Take:

Who knew that the humble Drift application could cause such a ruckus in the vast Salesforce universe? It’s like finding out your quiet neighbor has been hosting underground raves. But fear not, the bouncers (aka Mandiant) have kicked out the troublemakers and beefed up security, ensuring the neighborhood is safe once again.

Key Points:

  • Salesloft’s GitHub account was compromised, leading to a breach via the Drift application.
  • Mandiant was called in to investigate the breach and the situation is now under control.
  • Attackers used compromised OAuth tokens to access Salesforce customer data.
  • The incident affected multiple companies, implicating a coordinated Salesforce integration attack.
  • Suspected threat actors UNC6395 and Scattered Lapsus$ Hunters are linked to the breach.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?