Salesloft’s GitHub Oopsie: When Tokens Drifted and Data Went on Vacation!

Salesloft’s GitHub breach in March led to a dramatic summer sequel: Drift OAuth tokens were compromised, resulting in Salesforce data theft. Hackers, including ShinyHunters and Scattered Spider, made off with credentials like AWS keys and passwords. Salesloft has since taken action, restoring Salesforce integrations and reassuring customers of their fortified defenses.

Pro Dashboard

Hot Take:

Salesloft’s recent drama is like a soap opera of cyber misadventures, featuring a plot twist that started with a GitHub breach and led to a Salesforce data heist. If there were an Oscar for ‘Best Cybersecurity Breach,’ they might just take the trophy home!

Key Points:

  • Salesloft’s GitHub account was first breached in March, leading to a domino effect of data thefts.
  • OAuth tokens were stolen and used in a widespread Salesforce data breach in August.
  • Threat actors, including ShinyHunters and Scattered Spider, were involved.
  • Salesloft partnered with Mandiant to address and contain the breach.
  • Salesloft and Salesforce integration is now restored, with enhanced security measures.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?