- In August 2025, a sophisticated cyberattack targeted Salesforce customers by compromising the Salesloft Drift application, a popular third-party integration.
- Attackers exploited OAuth tokens to bypass MFA and gain unauthorized access, exfiltrating large volumes of sensitive data from hundreds of organizations, including major tech and cybersecurity firms.
- The incident was not a breach of Salesforce’s core platform but a supply-chain attack that highlighted the systemic risks of interconnected SaaS ecosystems.
- The fallout has led to a widespread re-evaluation of third-party app security, with a renewed focus on OAuth governance, least-privilege access, and continuous monitoring.
The 2025 Salesloft Drift Hack Was a Wake-Up Call Exposing the Dark Side of Salesforce SaaS Integrations
How a Trusted Tool Became a Gateway for Attackers
For years, the Software-as-a-Service (SaaS) model has been sold on a simple promise: seamless efficiency. In the sprawling ecosystem of Salesforce, this promise is delivered through thousands of third-party apps on its AppExchange, each designed to plug in and enhance productivity. Tools like Salesloft and its AI-powered Drift chatbot were prime examples—trusted integrations used by hundreds of companies to streamline sales and customer engagement. But in August 2025, that trust was shattered, turning a tool of efficiency into a Trojan horse.
A coordinated attack, attributed by Google’s Threat Intelligence Group to a threat actor dubbed UNC6395, weaponized the very thing that made these integrations so powerful: their deep, pre-authorized access to core business systems. This wasn’t a frontal assault on Salesforce’s fortified walls. Instead, it was a devastating supply-chain attack that exploited the weakest link in the digital chain, proving that in today’s interconnected world, your security is only as strong as the security of the apps you connect.
The Immediate Fallout
The moment the breach was disclosed on August 26, a wave of shock rippled through the tech industry. The attackers had exfiltrated large volumes of data from corporate Salesforce instances between August 8 and August 18. The list of impacted organizations grew daily, unsettlingly including the very cybersecurity firms tasked with protecting enterprise data, such as Cloudflare, Palo Alto Networks, Zscaler, and Tanium. It was a stark reminder that any company, regardless of its security posture, was vulnerable.
The stolen data was a treasure trove of sensitive information: customer contact details, support case histories, account information, and internal sales notes. Worse, the attackers were hunting for credentials, specifically targeting valuable secrets like AWS access keys and Snowflake tokens that might be buried within support logs or case descriptions. For countless individuals whose data resided in those CRM systems, the breach opened the door to potential identity theft and targeted phishing attacks. The scale of the exposure meant that companies had to act fast, notifying customers and bracing for both reputational and financial damage.
Protecting personal data has become more critical than ever. Services like Aura Identity Theft Protection can monitor your information and alert you to suspicious activity, offering a crucial safety net in the wake of large-scale breaches like this one.

The 2025 hack revealed that even trusted app connections can become the weakest link, compromising the entire Salesforce ecosystem.
The Anatomy of the Breach
So how did it happen? The genius of the attack was in its simplicity and stealth. The threat actors didn’t need to crack passwords or find a zero-day vulnerability in Salesforce’s code. Instead, they targeted something far more commonplace: OAuth 2.0 tokens.
OAuth is the standard that allows applications to “talk” to each other on your behalf without you having to share your password. When a user connects Drift to Salesforce, they grant it a token—a digital key—that authorizes it to access and modify data. The attackers managed to compromise these tokens from Salesloft’s systems, effectively acquiring a set of master keys to the Salesforce instances of hundreds of its customers.
Once they had these tokens, they could waltz right in through the API front door. This method bypasses traditional security measures like multi-factor authentication (MFA) and login alerts, making the intrusion incredibly difficult to detect. The attackers then ran queries to systematically pull data, targeting objects like “Accounts,” “Cases,” and “Users” before attempting to cover their tracks by deleting the query jobs. It was a stark lesson in how modern, token-based authentication can become a single point of catastrophic failure if not properly managed and monitored. Understanding how data flows between apps using tools like Databox is essential for mapping out potential vulnerabilities before they are exploited.
A Systemic Flaw
While Salesloft and Drift were the entry points, the incident has cast a harsh spotlight on the entire SaaS integration model, particularly Salesforce’s AppExchange. With over 7,000 apps, the marketplace is a core part of Salesforce’s value proposition, offering unparalleled customization. However, it also represents a massive, distributed attack surface.
Salesforce maintains that its core platform was not compromised. In an August notice, the company clarified the issue was not “due to any known vulnerability in our technology.” Yet, this distinction offers little comfort to the hundreds of companies now dealing with the fallout. The breach has raised uncomfortable questions about the shared responsibility model. While Salesforce vets apps before listing them, ongoing security and the lifecycle of permissions often fall into a dangerous gray area. As one analyst put it, the breach demonstrates a “systemic SaaS security failure,” where the security perimeter has effectively shifted from a single company to the entire ecosystem of its integrations. This has led to class-action lawsuits arguing that Salesforce should have implemented stronger safeguards to protect its customers from the inherent risks of its app-dependent ecosystem.
The Question of Responsibility
When a breach like this occurs, the blame game is inevitable. Is Salesloft at fault for its systems being compromised? Does Salesforce bear responsibility for the security of the apps it promotes on its marketplace? Or does the ultimate liability lie with the customer for authorizing the integration in the first place? The truth is, it’s a messy combination of all three.
Salesforce acted swiftly, first removing the Drift app from the AppExchange and then, on August 29, disabling all integrations with Salesloft technologies to contain the threat. Salesloft, for its part, has been collaborating with Salesforce and has hired a third-party forensics firm to investigate. However, the incident highlights a critical governance gap in the SaaS industry. Companies are often quick to adopt tools that boost productivity, but they may lack the resources or expertise to continuously vet the security of every third-party connection. This challenge is compounded by the fact that many security decisions require a holistic approach, covering everything from digital assets to physical ones, like securing office locations with tools such as the Google Nest Cam, to prevent all forms of unauthorized access.

Companies must now adopt a “zero-trust” approach, implementing new security protocols to shield their core systems from integrated app vulnerabilities.
A New Security Playbook
The Salesloft Drift hack must serve as a catalyst for change. The age of “set it and forget it” integrations is over. Businesses that rely on Salesforce and other extensible SaaS platforms need a new security playbook grounded in a zero-trust mindset. This means treating every connection, no matter how trusted the vendor, as a potential threat. Here are actionable steps companies should take now:
- Audit All Connected Apps and OAuth Tokens: The first step is to gain visibility. Conduct a thorough audit of every third-party application connected to your Salesforce instance. Revoke permissions for any unused or unrecognized apps and scrutinize the scopes granted to the rest. For complex audits, consider bringing in an expert; you can find specialized cybersecurity consultants on Fiverr to help identify and mitigate risks.
- Enforce the Principle of Least Privilege: Many apps request broad permissions by default. Ensure that each integration has only the absolute minimum level of access required to perform its function. If a marketing app doesn’t need to see support cases, it shouldn’t have permission to.
- Implement Continuous Monitoring: Don’t wait for a breach notification. Implement tools and processes to continuously monitor API traffic and user activity for anomalies. A sudden spike in data exports from a single integration should trigger an immediate alert.
- Strengthen Your Network Security: A comprehensive security strategy extends to the network level. Upgrading to a modern mesh Wi-Fi system like the Google Nest WiFi Pro can help segment traffic and secure the connections that your teams rely on to access these cloud platforms.
- Build Securely with Controlled Integrations: Instead of relying solely on off-the-shelf apps, consider using platforms like Make.com to build custom, more controlled integrations. This allows you to define the exact data flows and permissions, reducing the risk of over-privileged access.
Get the latest tech updates and insights directly in your inbox.
Recommended Tech
For development teams looking to reduce reliance on third-party SaaS tools, The TechBull recommends exploring platforms like Lovable.dev. It enables you to build bespoke internal applications with greater control over security and data handling, directly addressing the supply-chain risks highlighted by the Salesloft breach.
The Age of Blind Trust in SaaS Integrations Is Over
The 2025 Salesloft Drift hack was more than just another data breach; it was a paradigm shift for the SaaS industry. It exposed the fragile trust upon which the modern, interconnected enterprise is built and served as a painful lesson that convenience and risk often go hand-in-hand. For years, the focus has been on what SaaS integrations allow us to do, but now, the conversation must shift to what they could allow an attacker to do.
Moving forward, businesses can no longer afford to be passive consumers of technology. They must become active defenders of their digital supply chains. This requires a cultural shift towards security awareness, a technical commitment to proactive monitoring, and a strategic investment in the right tools and talent. The future of enterprise technology, from the software we use to the secure hardware we run it on, like the new AI-powered Lenovo IdeaPad Slim 3X Laptop, will be defined by this new reality. The era of blind trust is over. The era of vigilant, verified, and continuously monitored integration has begun.
This incident is also a reminder of the evolving nature of cyber threats, where hackers are increasingly leveraging AI to outsmart traditional security measures, making robust defense strategies more important than ever.
Thabo Mensah


1 comment
[…] call about the vulnerabilities inherent in interconnected software, a theme previously seen in the 2025 Salesloft-Drift hack which also exposed risks in Salesforce […]