ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

Salesloft powers durable revenue growth for the world’s most demanding companies. Salesloft’s industry-leading Revenue Orchestration Platform uses purpose-built AI to help market-facing teams prioritize and take action on what matters most, from first touch to upsell and renewal. More than 5,000 customers including Google, 3M, IBM, Shopify, Square, and Cisco gain a performance force multiplier with Salesloft by shifting to a durable revenue engagement model, helping them solve the complexities of modern B2B sales and unlock revenue efficiency.

Salesloft A.I CyberSecurity Scoring

Salesloft

Company Details

Linkedin ID:

salesloft

Employees number:

1,182

Number of followers:

118,230

NAICS:

5112

Industry Type:

Software Development

Homepage:

salesloft.com

IP Addresses:

0

Company ID:

SAL_7799328

Scan Status:

In-progress

AI scoreSalesloft Risk Score (AI oriented)

Between 0 and 549

https://images.rankiteo.com/companyimages/salesloft.jpeg
Salesloft Software Development
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreSalesloft Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/salesloft.jpeg
Salesloft Software Development
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

Salesloft Company CyberSecurity News & History

Past Incidents
8
Attack Types
2
EntityTypeSeverityImpactSeenBlog DetailsIncident DetailsView
Salesloft/SalesforceBreach85410/2025
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: The cybercriminal group **Scattered Lapsus$ Hunters** breached **Salesloft/Salesforce** and exfiltrated sensitive corporate data, which they threatened to leak publicly. Despite law enforcement (FBI and French authorities) seizing the domains (*breachforums.hn* and its Tor counterpart) used by the group to host the stolen files, the attackers swiftly restored access via alternative channels. The leaked data included proprietary and potentially confidential information from **Salesloft/Salesforce**, alongside files from over **40 other major companies** (e.g., Qantas, Gap, Toyota, Disney). The breach underscores the group’s persistence in extortion and data exposure, even after infrastructure disruptions. While no arrests were made, the incident highlights the escalating risks of **third-party vendor breaches** and the challenges in mitigating **large-scale data leaks** once threat actors gain initial access. The group’s shift from traditional forums to **Telegram** for operations further complicates tracking and enforcement efforts.

Salesloft (Drift)Breach8548/2025
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: Attackers exploited stolen OAuth tokens from the **Salesloft Drift** app—a third-party sales automation tool integrated with **Salesforce**—to gain unauthorized access to Salesforce databases between **August 8 and 18**. The threat actors (tracked as **UNC6395**) executed queries targeting sensitive Salesforce objects, including **cases, accounts, users, and opportunities**, with a primary focus on stealing credentials such as **AWS access keys, passwords, and Snowflake-related tokens**. The breach forced Salesloft and Salesforce to **revoke all active access and refresh tokens**, disrupting integrations and requiring IT admins to re-authenticate connections. Salesforce temporarily **removed Drift from its AppExchange** pending security validation. While the attack did not directly compromise **Google Cloud Platform (GCP)**, affected organizations were urged to **audit Salesforce objects for exposed secrets**, rotate credentials, and revoke compromised API keys. **Google Threat Intelligence Group (GTIG)** confirmed **data exfiltration**, warning that **Salesforce data should be considered compromised**. The incident highlights risks in third-party OAuth integrations, where stolen tokens enable lateral movement into core enterprise systems like Salesforce, exposing **customer leads, contact details, and authentication secrets** to malicious actors.

SalesloftBreach8548/2025
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: In August 2025, hackers breached **Salesloft’s SaaS platform** by stealing **OAuth access tokens** linked to its **Drift chatbot integration with Salesforce**. The attackers exploited these tokens—functioning as trusted non-human identities—to impersonate the integration and gain unauthorized access to **Salesforce CRM data across hundreds of organizations**. Over a **10-day campaign**, they exfiltrated sensitive records, including **stored credentials like AWS keys and Snowflake tokens** from support case attachments. The breach highlighted the risks of **unmonitored machine identities** with excessive privileges, enabling large-scale data theft without traditional human account compromises.

SalesloftBreach10059/2025
Rankiteo Explanation :
Attack threatening the organization's existence

Description: The attack on **Salesloft** began with the compromise of an internal **GitHub repository**, where attackers stole a high-privilege **OAuth token** granting access to its **Drift cloud application**. Exploiting Drift’s trusted integrations, the attackers pivoted to **Salesforce instances** of multiple high-profile customers—including **Palo Alto Networks, Cloudflare, Zscaler, and Tenable**—exfiltrating **customer conversation data, contact details, and sensitive business information**. The breach exposed a **supply-chain vulnerability**, where a single compromised AI-powered integration (Drift’s chatbot) enabled mass data theft across **700+ organizations**, including cybersecurity leaders. The attackers also harvested **OpenAI API credentials**, demonstrating the cascading risks of interconnected AI ecosystems. While companies like **Okta** mitigated damage via **IP allow-listing**, others faced **reputational harm, forensic costs, and erosion of customer trust**. The incident highlighted critical gaps in **third-party risk management, token security, and AI integration monitoring**, with long-term implications for enterprise security postures.

SalesloftBreach100511/2025
Rankiteo Explanation :
Attack threatening the organization's existence

Description: The **Salesloft breach** originated from a compromise where threat actors stole **Salesforce Drift tokens**, enabling unauthorized access to Salesforce and Cloudflare systems, along with other connected enterprises. This **supply chain attack** cascaded across multiple organizations, exposing sensitive data and raising concerns about third-party risk management. The breach exploited vendor vulnerabilities, highlighting gaps in **MSSP threat preparedness** and **external threat visibility**. While the exact data compromised was not detailed, the incident involved **large-scale credential theft** and **unauthorized system access**, potentially affecting customer and operational data across dependent enterprises. The attack underscored the risks of **shadow integrations** and **unpatched third-party exposures**, emphasizing the need for real-time monitoring and autonomous risk assessment in supply chains.

SalesloftBreach10058/2025
Rankiteo Explanation :
Attack threatening the organization's existence

Description: The **Salesloft breach (August 8–18, 2025)** was a sophisticated **supply chain attack** targeting its **GitHub account and OAuth tokens** linked to the **Drift chatbot integration**. Exploiting these tokens, attackers bypassed multi-factor authentication (MFA) and gained unauthorized access to **over 700 organizations**, including major cybersecurity firms like **Cloudflare, Palo Alto Networks, and Google**. The breach involved **automated data exfiltration** using Python tools, deletion of query logs to evade detection, and compromise of **Salesforce instances**, exposing **customer relationship data, support case details, and sensitive credentials** (API keys, passwords). The incident triggered **class-action lawsuits**, regulatory scrutiny (GDPR/CCPA), and highlighted critical gaps in **third-party integration security, OAuth governance, and cross-platform data visibility**. The attack underscored risks in **SaaS ecosystems**, where interconnected platforms amplify exposure to **fourth/fifth-party vulnerabilities** and **zero-trust failures**.

SalesloftBreach10053/2024
Rankiteo Explanation :
Attack threatening the organization’s existence

Description: Salesloft suffered a breach in March 2024 when hackers (linked to **UNC6395/ShinyHunters**) compromised its **GitHub account**, conducting reconnaissance for three months before stealing **authentication tokens** (including OAuth tokens for **Drift’s AI/chatbot platform**). These tokens were then used in a **supply-chain attack**, granting access to **Salesloft’s AWS environment** and **customer systems** (e.g., **Bugcrowd, Cloudflare, Google, Palo Alto Networks, Proofpoint, Tenable**). The attackers targeted **Salesforce instances**, exfiltrating sensitive data from **support tickets**, including **AWS access keys, passwords, and Snowflake-related tokens**. The breach enabled credential theft for extortion, with victims contacted privately. Salesloft took **six months to detect** the intrusion, raising concerns about its security posture. While the incident is now contained, the attack exposed **customer integration ecosystems**, risking downstream breaches across high-profile tech firms. The hackers’ focus on **credential harvesting** suggests potential for further exploitation of compromised systems.

SalesloftRansomware10056/2024
Rankiteo Explanation :
Attack threatening the organization’s existence

Description: Salesloft, a sales engagement platform leveraging AI chatbots (Drift) and deep Salesforce integrations, suffered a large-scale breach orchestrated by the **Scattered Lapsus$ Hunters** group. The attack began in late 2024 via **voice phishing (vishing)**, tricking employees into installing malicious Salesforce integrations, granting API-level access to corporate data. By mid-2025, attackers compromised Salesloft’s **GitHub repository**, extracting credentials and AWS OAuth tokens used by clients for third-party integrations. These tokens enabled **lateral movement** across systems, culminating in mass data exfiltration from Salesloft Drift customers by August 2025. On **October 3, 2025**, the group launched a **Tor-based extortion portal**, publicly listing victims and stolen data volumes, demanding ransom payments by **October 10** to prevent leaks. The breach exposed **sensitive CRM data**—customer leads, deal details, and operational intelligence—via abused integrations and token theft. While Salesforce’s core platform remained unbreached, the attack exploited **integration vulnerabilities** and poor credential hygiene, highlighting risks in SaaS ecosystems. The incident underscores the shift toward **ransomware-as-a-service (RaaS)**, with the group monetizing stolen data through extortion rather than encryption.

Salesloft/Salesforce
Breach
Severity: 85
Impact: 4
Seen: 10/2025
Blog:
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: The cybercriminal group **Scattered Lapsus$ Hunters** breached **Salesloft/Salesforce** and exfiltrated sensitive corporate data, which they threatened to leak publicly. Despite law enforcement (FBI and French authorities) seizing the domains (*breachforums.hn* and its Tor counterpart) used by the group to host the stolen files, the attackers swiftly restored access via alternative channels. The leaked data included proprietary and potentially confidential information from **Salesloft/Salesforce**, alongside files from over **40 other major companies** (e.g., Qantas, Gap, Toyota, Disney). The breach underscores the group’s persistence in extortion and data exposure, even after infrastructure disruptions. While no arrests were made, the incident highlights the escalating risks of **third-party vendor breaches** and the challenges in mitigating **large-scale data leaks** once threat actors gain initial access. The group’s shift from traditional forums to **Telegram** for operations further complicates tracking and enforcement efforts.

Salesloft (Drift)
Breach
Severity: 85
Impact: 4
Seen: 8/2025
Blog:
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: Attackers exploited stolen OAuth tokens from the **Salesloft Drift** app—a third-party sales automation tool integrated with **Salesforce**—to gain unauthorized access to Salesforce databases between **August 8 and 18**. The threat actors (tracked as **UNC6395**) executed queries targeting sensitive Salesforce objects, including **cases, accounts, users, and opportunities**, with a primary focus on stealing credentials such as **AWS access keys, passwords, and Snowflake-related tokens**. The breach forced Salesloft and Salesforce to **revoke all active access and refresh tokens**, disrupting integrations and requiring IT admins to re-authenticate connections. Salesforce temporarily **removed Drift from its AppExchange** pending security validation. While the attack did not directly compromise **Google Cloud Platform (GCP)**, affected organizations were urged to **audit Salesforce objects for exposed secrets**, rotate credentials, and revoke compromised API keys. **Google Threat Intelligence Group (GTIG)** confirmed **data exfiltration**, warning that **Salesforce data should be considered compromised**. The incident highlights risks in third-party OAuth integrations, where stolen tokens enable lateral movement into core enterprise systems like Salesforce, exposing **customer leads, contact details, and authentication secrets** to malicious actors.

Salesloft
Breach
Severity: 85
Impact: 4
Seen: 8/2025
Blog:
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: In August 2025, hackers breached **Salesloft’s SaaS platform** by stealing **OAuth access tokens** linked to its **Drift chatbot integration with Salesforce**. The attackers exploited these tokens—functioning as trusted non-human identities—to impersonate the integration and gain unauthorized access to **Salesforce CRM data across hundreds of organizations**. Over a **10-day campaign**, they exfiltrated sensitive records, including **stored credentials like AWS keys and Snowflake tokens** from support case attachments. The breach highlighted the risks of **unmonitored machine identities** with excessive privileges, enabling large-scale data theft without traditional human account compromises.

Salesloft
Breach
Severity: 100
Impact: 5
Seen: 9/2025
Blog:
Rankiteo Explanation
Attack threatening the organization's existence

Description: The attack on **Salesloft** began with the compromise of an internal **GitHub repository**, where attackers stole a high-privilege **OAuth token** granting access to its **Drift cloud application**. Exploiting Drift’s trusted integrations, the attackers pivoted to **Salesforce instances** of multiple high-profile customers—including **Palo Alto Networks, Cloudflare, Zscaler, and Tenable**—exfiltrating **customer conversation data, contact details, and sensitive business information**. The breach exposed a **supply-chain vulnerability**, where a single compromised AI-powered integration (Drift’s chatbot) enabled mass data theft across **700+ organizations**, including cybersecurity leaders. The attackers also harvested **OpenAI API credentials**, demonstrating the cascading risks of interconnected AI ecosystems. While companies like **Okta** mitigated damage via **IP allow-listing**, others faced **reputational harm, forensic costs, and erosion of customer trust**. The incident highlighted critical gaps in **third-party risk management, token security, and AI integration monitoring**, with long-term implications for enterprise security postures.

Salesloft
Breach
Severity: 100
Impact: 5
Seen: 11/2025
Blog:
Rankiteo Explanation
Attack threatening the organization's existence

Description: The **Salesloft breach** originated from a compromise where threat actors stole **Salesforce Drift tokens**, enabling unauthorized access to Salesforce and Cloudflare systems, along with other connected enterprises. This **supply chain attack** cascaded across multiple organizations, exposing sensitive data and raising concerns about third-party risk management. The breach exploited vendor vulnerabilities, highlighting gaps in **MSSP threat preparedness** and **external threat visibility**. While the exact data compromised was not detailed, the incident involved **large-scale credential theft** and **unauthorized system access**, potentially affecting customer and operational data across dependent enterprises. The attack underscored the risks of **shadow integrations** and **unpatched third-party exposures**, emphasizing the need for real-time monitoring and autonomous risk assessment in supply chains.

Salesloft
Breach
Severity: 100
Impact: 5
Seen: 8/2025
Blog:
Rankiteo Explanation
Attack threatening the organization's existence

Description: The **Salesloft breach (August 8–18, 2025)** was a sophisticated **supply chain attack** targeting its **GitHub account and OAuth tokens** linked to the **Drift chatbot integration**. Exploiting these tokens, attackers bypassed multi-factor authentication (MFA) and gained unauthorized access to **over 700 organizations**, including major cybersecurity firms like **Cloudflare, Palo Alto Networks, and Google**. The breach involved **automated data exfiltration** using Python tools, deletion of query logs to evade detection, and compromise of **Salesforce instances**, exposing **customer relationship data, support case details, and sensitive credentials** (API keys, passwords). The incident triggered **class-action lawsuits**, regulatory scrutiny (GDPR/CCPA), and highlighted critical gaps in **third-party integration security, OAuth governance, and cross-platform data visibility**. The attack underscored risks in **SaaS ecosystems**, where interconnected platforms amplify exposure to **fourth/fifth-party vulnerabilities** and **zero-trust failures**.

Salesloft
Breach
Severity: 100
Impact: 5
Seen: 3/2024
Blog:
Rankiteo Explanation
Attack threatening the organization’s existence

Description: Salesloft suffered a breach in March 2024 when hackers (linked to **UNC6395/ShinyHunters**) compromised its **GitHub account**, conducting reconnaissance for three months before stealing **authentication tokens** (including OAuth tokens for **Drift’s AI/chatbot platform**). These tokens were then used in a **supply-chain attack**, granting access to **Salesloft’s AWS environment** and **customer systems** (e.g., **Bugcrowd, Cloudflare, Google, Palo Alto Networks, Proofpoint, Tenable**). The attackers targeted **Salesforce instances**, exfiltrating sensitive data from **support tickets**, including **AWS access keys, passwords, and Snowflake-related tokens**. The breach enabled credential theft for extortion, with victims contacted privately. Salesloft took **six months to detect** the intrusion, raising concerns about its security posture. While the incident is now contained, the attack exposed **customer integration ecosystems**, risking downstream breaches across high-profile tech firms. The hackers’ focus on **credential harvesting** suggests potential for further exploitation of compromised systems.

Salesloft
Ransomware
Severity: 100
Impact: 5
Seen: 6/2024
Blog:
Rankiteo Explanation
Attack threatening the organization’s existence

Description: Salesloft, a sales engagement platform leveraging AI chatbots (Drift) and deep Salesforce integrations, suffered a large-scale breach orchestrated by the **Scattered Lapsus$ Hunters** group. The attack began in late 2024 via **voice phishing (vishing)**, tricking employees into installing malicious Salesforce integrations, granting API-level access to corporate data. By mid-2025, attackers compromised Salesloft’s **GitHub repository**, extracting credentials and AWS OAuth tokens used by clients for third-party integrations. These tokens enabled **lateral movement** across systems, culminating in mass data exfiltration from Salesloft Drift customers by August 2025. On **October 3, 2025**, the group launched a **Tor-based extortion portal**, publicly listing victims and stolen data volumes, demanding ransom payments by **October 10** to prevent leaks. The breach exposed **sensitive CRM data**—customer leads, deal details, and operational intelligence—via abused integrations and token theft. While Salesforce’s core platform remained unbreached, the attack exploited **integration vulnerabilities** and poor credential hygiene, highlighting risks in SaaS ecosystems. The incident underscores the shift toward **ransomware-as-a-service (RaaS)**, with the group monetizing stolen data through extortion rather than encryption.

Ailogo

Salesloft Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for Salesloft

Incidents vs Software Development Industry Average (This Year)

Salesloft has 1263.64% more incidents than the average of same-industry companies with at least one recorded incident.

Incidents vs All-Companies Average (This Year)

Salesloft has 837.5% more incidents than the average of all companies with at least one recorded incident.

Incident Types Salesloft vs Software Development Industry Avg (This Year)

Salesloft reported 6 incidents this year: 0 cyber attacks, 0 ransomware, 0 vulnerabilities, 6 data breaches, compared to industry peers with at least 1 incident.

Incident History — Salesloft (X = Date, Y = Severity)

Salesloft cyber incidents detection timeline including parent company and subsidiaries

Salesloft Company Subsidiaries

SubsidiaryImage

Salesloft powers durable revenue growth for the world’s most demanding companies. Salesloft’s industry-leading Revenue Orchestration Platform uses purpose-built AI to help market-facing teams prioritize and take action on what matters most, from first touch to upsell and renewal. More than 5,000 customers including Google, 3M, IBM, Shopify, Square, and Cisco gain a performance force multiplier with Salesloft by shifting to a durable revenue engagement model, helping them solve the complexities of modern B2B sales and unlock revenue efficiency.

Loading...
similarCompanies

Salesloft Similar Companies

Tencent

Tencent is a world-leading internet and technology company that develops innovative products and services to improve the quality of life of people around the world. Founded in 1998 with its headquarters in Shenzhen, China, Tencent's guiding principle is to use technology for good. Our communication

NiCE is transforming the world with AI that puts people first. Our purpose-built AI-powered platforms automate engagements into proactive, safe, intelligent actions, empowering individuals and organizations to innovate and act, from interaction to resolution. Trusted by organizations throughout 150

Rakuten

Rakuten Group, Inc. (TSE: 4755) is a global technology leader in services that empower individuals, communities, businesses and society. Founded in Tokyo in 1997 as an online marketplace, Rakuten has expanded to offer services in e-commerce, fintech, digital content and communications to 2 billion m

Wolt is a Helsinki-based technology company with a mission to bring joy, simplicity and earnings to the neighborhoods of the world. Wolt develops a local commerce platform that connects people looking to order food, groceries, and other goods with people interested in selling and delivering them. Wo

Google

A problem isn't truly solved until it's solved for all. Googlers build products that help create opportunities for everyone, whether down the street or across the globe. Bring your insight, imagination and a healthy disregard for the impossible. Bring everything that makes you unique. Together, we c

Lazada

About Lazada Group Founded in 2012, Lazada Group is the leading eCommerce platform in Southeast Asia. We are accelerating progress in Indonesia, Malaysia, the Philippines, Singapore, Thailand and Vietnam through commerce and technology. With the largest logistics and payments networks in the regio

JD.COM

JD.com, also known as JINGDONG, is a leading e-commerce company transferring to be a technology and service enterprise with supply chain at its core. JD.com’s business has expanded across retail, technology, logistics, health, property development, industrials, and international business. Ranking 44

Nielsen

Nielsen shapes the world’s media and content as a global leader in audience insights, data and analytics. Through our understanding of people and their behaviors across all channels and platforms, we empower our clients with independent and actionable intelligence so they can connect and engage with

GlobalLogic

GlobalLogic, a Hitachi Group company, is a trusted partner in design, data, and digital engineering for the world’s largest and most innovative companies. Since our inception in 2000, we have been at the forefront of the digital revolution, helping to create some of the most widely used digital prod

newsone

Salesloft CyberSecurity News

October 22, 2025 07:00 AM
Salesforce’s glaring Dreamforce omission: Vital security lessons from Salesloft Drift

Salesforce failed to address the massive wave of OAuth breaches at its Dreamforce conference, but securing third-party authentication is...

October 13, 2025 07:00 AM
The Master Key Problem: Inside the Salesloft Breach and Ongoing Threat

Discover what the Salesloft breach reveals about OAuth token abuse, hidden trust risks, and how to contain threats before they spread.

October 06, 2025 07:00 AM
Security leaders at Okta and Zscaler share lessons from Salesloft Drift attacks

Okta thwarted the supply-chain attack with security controls it had in place. Zscaler did not. Their experiences provide insights into the...

October 06, 2025 07:00 AM
Salesloft hackers outsourcing ransom negotiations for $10

Scattered Lapsus$ Hunters has launched an unusual crowdsourced extortion scheme, offering $10 in Bitcoin to anyone willing to help pressure...

September 29, 2025 07:00 AM
The Salesloft Breach Fallout and Supply Chain Threat

In August 2025, sales automation platform Salesloft issued an alert that it had detected a “security issue” in Drift – the AI chatbot used...

September 24, 2025 07:00 AM
Domino Effect: How One Vendor's AI App Breach Toppled Giants

The Salesloft-Drift breach wasn't just another data breach - it revealed how interconnected AI tools create cascading vulnerabilities across...

September 20, 2025 07:00 AM
ShinyHunters Claims 1.5B Record Theft in Salesloft GitHub Attack

In the shadowy world of cybercrime, a group known as ShinyHunters has thrust Salesforce into the spotlight with audacious claims of...

September 19, 2025 07:00 AM
The Salesloft hackers claim they have 1.5 billion compromised Salesforce records

Threat actors behind a spate of attacks on Salesloft Drift claim to have stolen over 1.5 billion records, according to reports.

September 19, 2025 07:00 AM
SolarWinds Issues Advisory Following Salesloft Drift Security Breach

SolarWinds Corporation has released an official security advisory in response to a significant data breach involving Salesforce systems.

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

Salesloft CyberSecurity History Information

Official Website of Salesloft

The official website of Salesloft is https://salesloft.com.

Salesloft’s AI-Generated Cybersecurity Score

According to Rankiteo, Salesloft’s AI-generated cybersecurity score is 284, reflecting their Critical security posture.

How many security badges does Salesloft’ have ?

According to Rankiteo, Salesloft currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does Salesloft have SOC 2 Type 1 certification ?

According to Rankiteo, Salesloft is not certified under SOC 2 Type 1.

Does Salesloft have SOC 2 Type 2 certification ?

According to Rankiteo, Salesloft does not hold a SOC 2 Type 2 certification.

Does Salesloft comply with GDPR ?

According to Rankiteo, Salesloft is not listed as GDPR compliant.

Does Salesloft have PCI DSS certification ?

According to Rankiteo, Salesloft does not currently maintain PCI DSS compliance.

Does Salesloft comply with HIPAA ?

According to Rankiteo, Salesloft is not compliant with HIPAA regulations.

Does Salesloft have ISO 27001 certification ?

According to Rankiteo,Salesloft is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Salesloft

Salesloft operates primarily in the Software Development industry.

Number of Employees at Salesloft

Salesloft employs approximately 1,182 people worldwide.

Subsidiaries Owned by Salesloft

Salesloft presently has no subsidiaries across any sectors.

Salesloft’s LinkedIn Followers

Salesloft’s official LinkedIn profile has approximately 118,230 followers.

NAICS Classification of Salesloft

Salesloft is classified under the NAICS code 5112, which corresponds to Software Publishers.

Salesloft’s Presence on Crunchbase

No, Salesloft does not have a profile on Crunchbase.

Salesloft’s Presence on LinkedIn

Yes, Salesloft maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/salesloft.

Cybersecurity Incidents Involving Salesloft

As of November 27, 2025, Rankiteo reports that Salesloft has experienced 8 cybersecurity incidents.

Number of Peer and Competitor Companies

Salesloft has an estimated 26,565 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at Salesloft ?

Incident Types: The types of cybersecurity incidents that have occurred include Breach and Ransomware.

What was the total financial impact of these incidents on Salesloft ?

Total Financial Loss: The total financial loss from these incidents is estimated to be $0.

How does Salesloft detect and respond to cybersecurity incidents ?

Detection and Response: The company detects and responds to cybersecurity incidents through an third party assistance with google threat intelligence group (gtig), and containment measures with revoked all active oauth access and refresh tokens, containment measures with removed drift app from salesforce appexchange, and remediation measures with re-authentication of drift-salesforce connections, remediation measures with review of salesforce objects for sensitive data, remediation measures with revocation of api keys, remediation measures with credential rotation, and communication strategy with direct notifications to affected customers, communication strategy with public advisories from salesloft and gtig, communication strategy with indicators of compromise (iocs) shared with admins, and enhanced monitoring with advisory to monitor salesforce objects for malicious activity, and incident response plan activated with yes (with assistance from google’s mandiant), and third party assistance with google’s mandiant (incident response unit), and containment measures with isolation of compromised github account, containment measures with revocation of stolen tokens, containment measures with restoration of salesforce integration, and recovery measures with salesforce integration restored (as of august 2024), and communication strategy with public disclosure via data breach page, communication strategy with media statements, and and third party assistance with cybersecurity firms (e.g., cloudflare, palo alto networks), third party assistance with legal counsel, third party assistance with forensic investigators, and containment measures with oauth token revocation, containment measures with disabling compromised integrations, containment measures with isolating affected systems, and remediation measures with token lifecycle management enhancements, remediation measures with zero-trust access controls for third-party integrations, remediation measures with expanded monitoring of oauth activity, and recovery measures with restoration of affected salesforce instances, recovery measures with customer notification and support, recovery measures with legal hold procedures for ediscovery, and communication strategy with public disclosure (via haystackid/complexdiscovery), communication strategy with customer advisories, communication strategy with regulatory notifications, and network segmentation with isolation of compromised saas integrations, and enhanced monitoring with real-time oauth token activity monitoring, enhanced monitoring with anomalous api call detection, and incident response plan activated with forensic investigations, incident response plan activated with customer notifications, incident response plan activated with integration audits, and third party assistance with likely (not specified), and containment measures with token revocation, containment measures with access restrictions, containment measures with ip allow-listing (okta), and remediation measures with credential rotation, remediation measures with integration lifecycle reviews, remediation measures with security control enhancements, and recovery measures with system restorations, recovery measures with customer trust rebuilding, and communication strategy with public disclosures, communication strategy with customer advisories, communication strategy with transparency reports, and network segmentation with recommended for ai applications, and enhanced monitoring with ai behavior baselining, enhanced monitoring with anomaly detection for data access patterns, and remediation measures with enforcing api permission controls, remediation measures with auditing third-party integrations, remediation measures with multi-factor authentication (mfa) enforcement, remediation measures with sanitizing development repositories, and and containment measures with domain seizure (breachforums.hn, tor site), containment measures with fbi/french authorities intervention, and incident response plan activated with partial (5,000 user credentials rotated, but nhi token overlooked), and and and containment measures with token revocation (post-incident), containment measures with token revocation (post-discovery of compromise), and and and and and and and and third party assistance with riskprofiler (ai-powered tprm solutions), and remediation measures with ai-powered third-party risk monitoring, remediation measures with autonomous attack path mapping, remediation measures with streamlined third-party risk questionnaires, remediation measures with real-time vendor portfolio breach detection, remediation measures with prioritized threat alerts for fast response, and communication strategy with advisories on proactive third-party risk management, communication strategy with mssp-focused mitigation guidance, and enhanced monitoring with continuous vendor security posture monitoring, enhanced monitoring with ai-driven anomaly detection..

Incident Details

Can you provide details on each incident ?

Incident : data breach

Title: Salesforce-related breaches via stolen OAuth tokens from Salesloft Drift app

Description: Attackers stole OAuth tokens from the third-party Salesloft Drift app, which integrates with Salesforce databases, to access sensitive Salesforce data. The campaign is separate from other high-profile Salesforce breaches attributed to ShinyHunters (UNC6240). The attackers (UNC6395) focused on stealing credentials, including AWS access keys, passwords, and Snowflake-related tokens. Salesloft and Google Threat Intelligence Group (GTIG) revoked all active tokens and removed Drift from Salesforce AppExchange pending investigation. Affected organizations were advised to review Salesforce objects for compromised data, revoke API keys, and rotate credentials.

Type: data breach

Attack Vector: stolen OAuth tokenssocial engineering (in separate but related incidents)

Vulnerability Exploited: Weakness in OAuth token security (Drift app integration with Salesforce)

Threat Actor: UNC6395 (for Salesloft Drift incidents)ShinyHunters (UNC6240) (for separate Salesforce incidents)

Motivation: credential theftdata exfiltrationpotential financial gain

Incident : Supply Chain Attack

Title: Salesloft GitHub Account Breach Leading to Supply Chain Attack on Major Tech Customers

Description: Salesloft disclosed a breach of its GitHub account in March 2024, where hackers stole authentication tokens later used in a mass-hack targeting its big tech customers, including Bugcrowd, Cloudflare, Google, Proofpoint, Palo Alto Networks, and Tenable. The hackers, attributed to UNC6395 (potentially ShinyHunters), accessed Salesloft’s AWS cloud environment and Drift’s OAuth tokens, enabling unauthorized access to customer systems, including Salesforce instances. The primary objective was credential theft, focusing on AWS access keys, passwords, and Snowflake-related tokens. The intrusion went undetected for six months before containment in August 2024.

Date Detected: 2024-08-01T00:00:00Z

Date Publicly Disclosed: 2024-08-26T00:00:00Z

Date Resolved: 2024-08-26T00:00:00Z

Type: Supply Chain Attack

Attack Vector: Compromised GitHub AccountReconnaissance (March–June 2024)Stolen OAuth TokensAWS Cloud Environment Exploitation

Vulnerability Exploited: Improper GitHub Access ControlsLack of Timely Detection (6-month delay)OAuth Token Misuse

Threat Actor: UNC6395 (per Google Threat Intelligence Group)ShinyHunters (alleged)

Motivation: Credential TheftExtortionData Exfiltration

Incident : Supply Chain Attack

Title: Salesloft Drift Supply Chain Breach (2025)

Description: A sophisticated supply chain attack targeting Salesloft and Drift integrations, orchestrated by UNC6395 (GRUB1), compromised OAuth tokens to access hundreds of Salesforce instances. The breach exposed vulnerabilities in third-party integration security, affecting over 700 organizations, including major cybersecurity firms. Attackers used automated tools and anti-forensics techniques to extract data while evading detection for over two weeks (August 8–18, 2025). Initial access was gained via a compromised GitHub account between March and June 2025.

Date Detected: 2025-08-18

Type: Supply Chain Attack

Attack Vector: Compromised GitHub AccountOAuth Token AbuseThird-Party Integration ExploitationAutomated Python ToolsAnti-Forensics Techniques (Log Deletion)

Vulnerability Exploited: Weak OAuth Token ManagementLack of MFA for OAuth TokensInsufficient Third-Party Integration MonitoringInadequate Log Retention

Threat Actor: UNC6395GRUB1 (Cloudflare designation)

Motivation: Data ExfiltrationEspionagePotential Financial Gain (via dark web data sales)

Incident : Supply Chain Attack

Title: AI-Powered Supply Chain Attack via Compromised Salesloft-Drift Integration (2025)

Description: A sophisticated cyberattack began with the compromise of Salesloft's internal GitHub repository, where attackers stole an OAuth token granting privileged access to Salesloft's Drift account. This access was leveraged to exfiltrate data from connected Salesforce instances of over 700 organizations, including major cybersecurity firms like Cloudflare, Palo Alto Networks, and Zscaler. The breach exploited AI integrations' broad data access patterns and trust-based architectures, highlighting vulnerabilities in modern AI ecosystems. Okta was spared due to IP allow-listing controls.

Type: Supply Chain Attack

Attack Vector: Compromised GitHub RepositoryStolen OAuth TokenPrivilege Escalation via Drift IntegrationAI-Powered Data Exfiltration

Vulnerability Exploited: Improper Credential ManagementOver-Permissive API AccessLack of IP Restrictions on TokensInsufficient Integration Lifecycle Management

Motivation: Data TheftEspionageFinancial Gain (Potential)Supply Chain Disruption

Incident : Data Breach

Title: Scattered Lapsus$ Hunters Launches Extortionware Portal Targeting Salesforce Data via OAuth Token Theft

Description: The hacker collective Scattered Lapsus$ Hunters (a fusion of ShinyHunters, Scattered Spider, and Lapsus$) launched a dedicated leak website on the Tor network in October 2025, demanding ransom payments from victims to remove stolen Salesforce data. The attack originated in late 2024 via social engineering (vishing) to install malicious Salesforce integrations, followed by credential harvesting from Salesloft’s GitHub repository and OAuth token theft from its AWS environment. The group exfiltrated data from Salesforce and third-party integrations, leveraging lateral movement across systems. A ransom deadline of October 10, 2025, was set, marking an evolution into ransomware-as-a-service (RaaS) tactics.

Date Publicly Disclosed: 2025-10-03

Type: Data Breach

Attack Vector: Social Engineering (Vishing)Malicious Salesforce IntegrationsAPI ExploitationGitHub Credential HarvestingOAuth Token TheftLateral Movement via Cloud Environments (AWS)

Vulnerability Exploited: Poor Credential Hygiene (GitHub Repository)Over-Permissive API/OAuth Token AccessLack of Multi-Factor Authentication (MFA) EnforcementInsecure Third-Party Integration Controls

Threat Actor: Scattered Lapsus$ Hunters (fusion of ShinyHunters, Scattered Spider, and Lapsus$)

Motivation: Financial Gain (Extortion/Ransom)Data Theft for ResaleReputation DamageRaaS Monetization

Incident : data breach

Title: Law enforcement seizes domains used by Scattered Lapsus$ Hunters; Salesloft/Salesforce breach files leaked

Description: The domains used by Scattered Lapsus$ Hunters to host data leak websites were seized by law enforcement (FBI and French authorities) just as the group was preparing to leak files stolen in the Salesloft/Salesforce breach. Despite the takedown of clearnet domain (breachforums.hn) and Tor site, the latter was quickly restored, and files from over 40 companies—including Qantas, Gap, Vietnam Airlines, Toyota, Disney, McDonald’s, Ikea, and Adidas—were leaked. The group declared 'the era of forums is over' and announced a pivot to Telegram groups, citing FBI destruction of database backups (2023) and escrow databases as reasons for abandoning forums. No arrests were made.

Type: data breach

Attack Vector: data leak site hostingforum-based extortion

Threat Actor: Scattered Lapsus$ Hunters

Motivation: financial gainreputationdisruption

Incident : Data Breach (OAuth Token Compromise)

Title: ['Salesloft/Drift OAuth Token Breach (2025)', 'New York Times GitHub Token Leak (2024)', 'Cloudflare Atlassian Compromise (2023)']

Description: ["In August 2025, hackers breached Salesloft's SaaS platform and stole OAuth access tokens for its Drift chatbot integration with Salesforce. By hijacking these tokens (which function as a trusted non-human identity between Drift and Salesforce), the attackers were able to impersonate the integration and access Salesforce CRM data at hundreds of organizations. Over a ten-day campaign, they used this backdoor to query and exfiltrate sensitive records, even pulling stored credentials like AWS keys and Snowflake tokens from support case attachments.", "In January 2024, the New York Times suffered a breach not through a phished password or zero-day exploit, but via an exposed GitHub API token. Attackers discovered a token credential for the Times' cloud code repository, which had inadvertently been made public, and used it to access about 270 GB of internal source code and data. This token acted as a non-human identity with broad privileges, allowing direct repository access without any interactive login.", "The fallout from the 2023 Okta breach revealed the danger of orphaned and unrotated service credentials. Cloudflare, an Okta customer, had rotated some 5,000 user credentials after the incident. However, an overlooked non-human account (an API token tied to a service account) remained active. Attackers leveraged that one leftover token (with its associated service credentials) to gain access to Cloudflare's Atlassian suite (Jira, Confluence, Bitbucket), effectively bypassing the human password reset effort."]

Date Detected: 2025-082024-012023

Date Resolved: [None, None, None]

Type: Data Breach (OAuth Token Compromise)

Attack Vector: Compromised OAuth Tokens (Non-Human Identity)Exposed GitHub API Token (Non-Human Identity)Orphaned API Token (Non-Human Identity)

Vulnerability Exploited: Overprivileged OAuth TokensPublicly Exposed API TokenUnrotated Service Account Token

Motivation: Data ExfiltrationData TheftUnauthorized Access

Incident : third-party breach

Title: CloudFlare-Salesforce-Salesloft Third-Party Data Breach

Description: The breach originated from a Salesloft compromise where threat actors stole Salesforce Drift tokens, causing a large-scale compromise in Salesforce, Cloudflare, and several other organizations. This exploit later cascaded across major enterprises, resulting in third-party breaches. The incident highlights the risks of supply chain attacks and the importance of proactive third-party risk management for MSSPs (Managed Security Service Providers).

Type: third-party breach

Attack Vector: compromised vendor (Salesloft)stolen authentication tokens (Salesforce Drift)cascading supply chain exploitation

Vulnerability Exploited: weak token securitythird-party integration risksshadow IT (unapproved third-party tool integrations)

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Breach.

How does the company identify the attack vectors used in incidents ?

Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Stolen OAuth tokens (Drift app integration with Salesforce), Salesloft GitHub Account, Compromised Salesloft GitHub Account (March–June 2025), Salesloft Internal GitHub Repository, Social Engineering (Vishing) → Malicious Salesforce Integrations, Compromised OAuth tokens (Drift-Salesforce integration)Exposed GitHub API token (public repository)Orphaned API token (Okta service account) and Salesloft compromise (token theft).

Impact of the Incidents

What was the impact of each incident ?

Incident : data breach SAL725082725

Data Compromised: Salesforce objects (cases, accounts, users, opportunities), Aws access keys, Passwords, Snowflake-related access tokens, Potential google cloud platform service account keys

Systems Affected: Salesforce databases (via Drift integration)Drift app

Operational Impact: revocation of OAuth tokensre-authentication required for Drift-Salesforce integrationsDrift app removed from Salesforce AppExchange

Brand Reputation Impact: potential reputational damage to Salesloft, Drift, and affected organizations

Identity Theft Risk: ['high (due to stolen credentials)']

Incident : Supply Chain Attack SAL2792527090825

Data Compromised: Authentication tokens (oauth), Aws access keys, Passwords, Snowflake-related tokens, Support ticket data (via salesforce)

Systems Affected: Salesloft GitHub AccountSalesloft AWS Cloud EnvironmentDrift’s AI/Chatbot PlatformCustomer Salesforce Instances (e.g., Bugcrowd, Cloudflare, Google, Proofpoint, Palo Alto Networks, Tenable)

Operational Impact: Disruption of Salesloft-Salesforce Integration (temporarily)Customer System Compromises

Brand Reputation Impact: Potential Loss of Trust Among High-Profile CustomersNegative Media Coverage

Identity Theft Risk: ['High (due to stolen credentials)']

Incident : Supply Chain Attack SAL4092740091625

Data Compromised: Customer relationship management (crm) data, Support case information, Sensitive credentials (api keys, passwords), Business communications

Systems Affected: Salesforce Instances (700+ organizations)Drift Chatbot IntegrationGitHub Account (initial compromise)

Operational Impact: Disruption of CRM and Support OperationsIncident Response Across Multiple VendorsLegal and Compliance Burden

Customer Complaints: ['Class-Action Lawsuits Filed (including against Salesforce)']

Brand Reputation Impact: Significant Reputational Damage to Salesloft, Drift, and Affected FirmsErosion of Trust in SaaS Supply Chain Security

Legal Liabilities: Multiple Class-Action LawsuitsPotential Regulatory Fines (GDPR, CCPA, etc.)Contractual Liability Disputes

Identity Theft Risk: ['High (due to exposed credentials and PII in support cases)']

Incident : Supply Chain Attack SAL2862828092525

Data Compromised: Customer conversation data, Contact information, Authentication tokens (including openai api credentials), Salesforce instance data

Systems Affected: Salesloft GitHub RepositoriesDrift Cloud ApplicationConnected Salesforce InstancesOpenAI API Integrations

Operational Impact: Forensic InvestigationsCustomer Trust ErosionIntegration AuditsSecurity Control Overhauls

Customer Complaints: ['Expected (Not Quantified)']

Brand Reputation Impact: Severe (Especially for Cybersecurity Firms)Loss of Customer TrustIncreased Scrutiny of AI Security Practices

Legal Liabilities: Potential Regulatory FinesContractual Breach ClaimsLitigation Risk

Identity Theft Risk: ['High (Due to PII in Conversation Data)']

Payment Information Risk: ['Low (Not Explicitly Mentioned)']

Incident : Data Breach SAL5092150100725

Data Compromised: Customer leads, Deal details, Confidential operational information, Oauth tokens, Third-party integration data

Systems Affected: Salesforce EnvironmentsSalesloft (Sales Engagement Platform)Drift AI ChatbotGitHub RepositoriesAWS Cloud Environments

Operational Impact: Unauthorized Data ExfiltrationPotential Business DisruptionLoss of Customer TrustRegulatory Scrutiny

Brand Reputation Impact: High (Public Extortion Portal, High-Profile Victims)

Identity Theft Risk: Moderate (PII in CRM Data)

Incident : data breach SAL2593525101325

Brand Reputation Impact: high (for affected companies)moderate (for Scattered Lapsus$ Hunters due to forum shutdown)

Identity Theft Risk: potential (due to leaked corporate data)

Incident : Data Breach (OAuth Token Compromise) SAL0932309111025

Data Compromised: Salesforce crm data (including aws keys and snowflake tokens from support case attachments), 270 gb of internal source code and data, Access to cloudflare's atlassian suite (jira, confluence, bitbucket)

Systems Affected: Salesforce CRM (via Drift integration)GitHub (New York Times' cloud code repository)Atlassian Suite (Jira, Confluence, Bitbucket)

Downtime: [None, None, None]

Operational Impact: Unauthorized access to CRM data across hundreds of organizationsExposure of internal source code and proprietary dataBypass of human password reset efforts, enabling stealthy backdoor access

Conversion Rate Impact: [None, None, None]

Revenue Loss: [None, None, None]

Customer Complaints: [None, None, None]

Brand Reputation Impact: Potential reputational damage due to unauthorized CRM data accessReputational risk from exposure of internal source codeReputational impact from unauthorized access to Atlassian suite

Identity Theft Risk: ['High (AWS keys and Snowflake tokens exposed)', 'Moderate (internal credentials potentially exposed in source code)', 'Moderate (potential access to sensitive Atlassian data)']

Payment Information Risk: [None, None, None]

Incident : third-party breach SAL4794547112625

Data Compromised: Authentication tokens (salesforce drift), Potential customer data (via cascading breaches)

Systems Affected: SalesforceCloudflaremultiple unnamed enterprises

Operational Impact: disrupted trust in MSSP threat preparednesspotential operational disruptions for affected organizations

Brand Reputation Impact: eroded confidence in supply chain securityquestions about MSSP reliability

What is the average financial loss per incident ?

Average Financial Loss: The average financial loss per incident is $0.00.

What types of data are most commonly compromised in incidents ?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Credentials (Aws Access Keys, Passwords), Snowflake Access Tokens, Salesforce Object Data (Cases, Accounts, Users, Opportunities), Potential Gcp Service Account Keys, , Authentication Tokens (Oauth), Aws Access Keys, Passwords, Snowflake Access Tokens, Support Ticket Data, , Crm Data, Support Case Records, Credentials (Api Keys, Passwords), Business Communications, , Customer Conversation Logs, Contact Information, Api Credentials, Salesforce Data, , Crm Data (Customer Leads, Deal Details), Oauth Tokens, Credentials/Access Keys, Operational Confidential Information, , Corporate Files, Potentially Pii (Unspecified), , Crm Data (Salesforce), Aws Keys, Snowflake Tokens, Internal Source Code (270 Gb), Proprietary Data, Atlassian Suite Data (Jira, Confluence, Bitbucket), , Authentication Tokens (Salesforce Drift), Potential Cascading Data Exposure and .

Which entities were affected by each incident ?

Incident : data breach SAL725082725

Entity Name: Salesloft (Drift)

Entity Type: SaaS (Sales Engagement Platform)

Industry: Technology (Sales Automation)

Customers Affected: Organizations using Drift integrated with Salesforce

Incident : data breach SAL725082725

Entity Name: Salesforce

Entity Type: CRM Platform

Industry: Technology

Customers Affected: Customers using Drift-Salesforce integration

Incident : data breach SAL725082725

Entity Name: Google (via Google Cloud Platform)

Entity Type: Technology

Industry: Cloud Computing

Customers Affected: Potential exposure of GCP service account keys in Salesforce objects

Incident : data breach SAL725082725

Entity Name: Affected Salesforce-Drift customers (e.g., unnamed organizations)

Incident : Supply Chain Attack SAL2792527090825

Entity Name: Salesloft

Entity Type: SaaS Company

Industry: Sales Engagement Platform

Location: Atlanta, Georgia, USA

Customers Affected: Multiple (including Bugcrowd, Cloudflare, Google, Proofpoint, Palo Alto Networks, Tenable, and others)

Incident : Supply Chain Attack SAL2792527090825

Entity Name: Drift

Entity Type: Subsidiary/Platform

Industry: AI and Chatbot-Powered Marketing

Customers Affected: Indirectly via Salesloft Breach

Incident : Supply Chain Attack SAL2792527090825

Entity Name: Bugcrowd

Entity Type: Customer

Industry: Cybersecurity (Crowdsourced Security Testing)

Incident : Supply Chain Attack SAL2792527090825

Entity Name: Cloudflare

Entity Type: Customer

Industry: Web Infrastructure and Security

Incident : Supply Chain Attack SAL2792527090825

Entity Name: Google

Entity Type: Customer

Industry: Technology

Incident : Supply Chain Attack SAL2792527090825

Entity Name: Proofpoint

Entity Type: Customer

Industry: Cybersecurity (Email Security)

Incident : Supply Chain Attack SAL2792527090825

Entity Name: Palo Alto Networks

Entity Type: Customer

Industry: Cybersecurity

Incident : Supply Chain Attack SAL2792527090825

Entity Name: Tenable

Entity Type: Customer

Industry: Cybersecurity (Vulnerability Management)

Incident : Supply Chain Attack SAL4092740091625

Entity Name: Salesloft

Entity Type: SaaS Provider

Industry: Sales Engagement Platform

Location: Atlanta, Georgia, USA

Customers Affected: 700+ organizations

Incident : Supply Chain Attack SAL4092740091625

Entity Name: Drift

Entity Type: SaaS Provider

Industry: Conversational Marketing/Chatbot

Location: Boston, Massachusetts, USA

Incident : Supply Chain Attack SAL4092740091625

Entity Name: Cloudflare

Entity Type: Cybersecurity Firm

Industry: Web Infrastructure Security

Location: San Francisco, California, USA

Incident : Supply Chain Attack SAL4092740091625

Entity Name: Palo Alto Networks

Entity Type: Cybersecurity Firm

Industry: Network Security

Location: Santa Clara, California, USA

Incident : Supply Chain Attack SAL4092740091625

Entity Name: Zscaler

Entity Type: Cybersecurity Firm

Industry: Cloud Security

Location: San Jose, California, USA

Incident : Supply Chain Attack SAL4092740091625

Entity Name: Google

Entity Type: Tech Giant

Industry: Search/Cloud Services

Location: Mountain View, California, USA

Incident : Supply Chain Attack SAL4092740091625

Entity Name: Proofpoint

Entity Type: Cybersecurity Firm

Industry: Email Security

Location: Sunnyvale, California, USA

Incident : Supply Chain Attack SAL4092740091625

Entity Name: SpyCloud

Entity Type: Cybersecurity Firm

Industry: Identity Protection

Location: Austin, Texas, USA

Incident : Supply Chain Attack SAL4092740091625

Entity Name: Tanium

Entity Type: Cybersecurity Firm

Industry: Endpoint Security

Location: Emeryville, California, USA

Incident : Supply Chain Attack SAL4092740091625

Entity Name: Tenable

Entity Type: Cybersecurity Firm

Industry: Vulnerability Management

Location: Columbia, Maryland, USA

Incident : Supply Chain Attack SAL4092740091625

Entity Name: Salesforce

Entity Type: SaaS Provider

Industry: Customer Relationship Management (CRM)

Location: San Francisco, California, USA

Customers Affected: 700+ organizations (via integrated instances)

Incident : Supply Chain Attack SAL2862828092525

Entity Name: Salesloft

Entity Type: SaaS Provider

Industry: Sales Engagement Platform

Customers Affected: 700+ (Indirectly via Drift Integration)

Incident : Supply Chain Attack SAL2862828092525

Entity Name: Drift

Entity Type: SaaS Provider

Industry: Conversational Marketing/AI Chatbots

Customers Affected: 700+ (Directly via Salesforce Integrations)

Incident : Supply Chain Attack SAL2862828092525

Entity Name: Cloudflare

Entity Type: Public Company

Industry: Cybersecurity/Web Infrastructure

Incident : Supply Chain Attack SAL2862828092525

Entity Name: Palo Alto Networks

Entity Type: Public Company

Industry: Cybersecurity

Incident : Supply Chain Attack SAL2862828092525

Entity Name: Zscaler

Entity Type: Public Company

Industry: Cybersecurity/Cloud Security

Incident : Supply Chain Attack SAL2862828092525

Entity Name: Tenable

Entity Type: Public Company

Industry: Cybersecurity/Vulnerability Management

Incident : Supply Chain Attack SAL2862828092525

Entity Name: Proofpoint

Entity Type: Public Company

Industry: Cybersecurity/Email Security

Incident : Supply Chain Attack SAL2862828092525

Entity Name: SpyCloud

Entity Type: Private Company

Industry: Cybersecurity/Identity Protection

Incident : Supply Chain Attack SAL2862828092525

Entity Name: Okta

Entity Type: Public Company

Industry: Identity Management

Customers Affected: 0 (Attack Attempted but Blocked)

Incident : Data Breach SAL5092150100725

Entity Name: Salesloft

Entity Type: Private Company

Industry: Sales Engagement/CRM Software

Customers Affected: Multiple (via Salesforce Integrations)

Incident : Data Breach SAL5092150100725

Entity Name: Google

Entity Type: Public Company

Industry: Technology/Cloud Services

Location: Global

Size: Large

Incident : Data Breach SAL5092150100725

Entity Name: Cisco

Entity Type: Public Company

Industry: Networking/IT

Location: Global

Size: Large

Incident : Data Breach SAL5092150100725

Entity Name: Unnamed Salesforce Customers

Incident : data breach SAL2593525101325

Entity Name: Salesloft

Entity Type: company

Industry: sales engagement software

Incident : data breach SAL2593525101325

Entity Name: Salesforce

Entity Type: company

Industry: cloud-based CRM

Incident : data breach SAL2593525101325

Entity Name: Qantas

Entity Type: company

Industry: aviation

Location: Australia

Incident : data breach SAL2593525101325

Entity Name: Gap

Entity Type: company

Industry: retail (apparel)

Location: United States

Incident : data breach SAL2593525101325

Entity Name: Vietnam Airlines

Entity Type: company

Industry: aviation

Location: Vietnam

Incident : data breach SAL2593525101325

Entity Name: Toyota

Entity Type: company

Industry: automotive

Location: Japan

Incident : data breach SAL2593525101325

Entity Name: Disney

Entity Type: company

Industry: entertainment

Location: United States

Incident : data breach SAL2593525101325

Entity Name: McDonald’s

Entity Type: company

Industry: fast food

Location: United States

Incident : data breach SAL2593525101325

Entity Name: Ikea

Entity Type: company

Industry: retail (furniture)

Location: Sweden/Netherlands

Incident : data breach SAL2593525101325

Entity Name: Adidas

Entity Type: company

Industry: retail (sporting goods)

Location: Germany

Incident : data breach SAL2593525101325

Entity Name: BreachForums

Entity Type: cybercriminal forum

Incident : Data Breach (OAuth Token Compromise) SAL0932309111025

Entity Name: Salesloft

Entity Type: SaaS Platform

Industry: Sales Engagement/CRM

Customers Affected: Hundreds of organizations (via Salesforce CRM access)

Incident : Data Breach (OAuth Token Compromise) SAL0932309111025

Entity Name: Drift

Entity Type: Chatbot Integration

Industry: Conversational Marketing

Incident : Data Breach (OAuth Token Compromise) SAL0932309111025

Entity Name: Salesforce (via Drift integration)

Entity Type: CRM Platform

Industry: Customer Relationship Management

Customers Affected: Hundreds of organizations

Incident : Data Breach (OAuth Token Compromise) SAL0932309111025

Entity Name: The New York Times

Entity Type: Media Organization

Industry: News/Publishing

Location: New York, USA

Incident : Data Breach (OAuth Token Compromise) SAL0932309111025

Entity Name: GitHub (New York Times' repository)

Entity Type: Code Hosting Platform

Industry: Software Development

Incident : Data Breach (OAuth Token Compromise) SAL0932309111025

Entity Name: Cloudflare

Entity Type: Web Infrastructure/Security

Industry: Cybersecurity/CDN

Incident : Data Breach (OAuth Token Compromise) SAL0932309111025

Entity Name: Atlassian (Jira, Confluence, Bitbucket)

Entity Type: Collaboration/DevOps Tools

Industry: Software Development

Incident : third-party breach SAL4794547112625

Entity Name: Salesloft

Entity Type: vendor/third-party

Industry: sales engagement platform

Incident : third-party breach SAL4794547112625

Entity Name: Salesforce

Entity Type: CRM platform

Industry: cloud computing/enterprise software

Incident : third-party breach SAL4794547112625

Entity Name: Cloudflare

Entity Type: web infrastructure/security

Industry: cybersecurity/CDN

Incident : third-party breach SAL4794547112625

Entity Name: Multiple unnamed enterprises

Entity Type: various industries

Location: global

Response to the Incidents

What measures were taken in response to each incident ?

Incident : data breach SAL725082725

Incident Response Plan Activated: True

Third Party Assistance: Google Threat Intelligence Group (Gtig).

Containment Measures: revoked all active OAuth access and refresh tokensremoved Drift app from Salesforce AppExchange

Remediation Measures: re-authentication of Drift-Salesforce connectionsreview of Salesforce objects for sensitive datarevocation of API keyscredential rotation

Communication Strategy: direct notifications to affected customerspublic advisories from Salesloft and GTIGindicators of compromise (IOCs) shared with admins

Enhanced Monitoring: advisory to monitor Salesforce objects for malicious activity

Incident : Supply Chain Attack SAL2792527090825

Incident Response Plan Activated: Yes (with assistance from Google’s Mandiant)

Third Party Assistance: Google’S Mandiant (Incident Response Unit).

Containment Measures: Isolation of Compromised GitHub AccountRevocation of Stolen TokensRestoration of Salesforce Integration

Recovery Measures: Salesforce Integration Restored (as of August 2024)

Communication Strategy: Public Disclosure via Data Breach PageMedia Statements

Incident : Supply Chain Attack SAL4092740091625

Incident Response Plan Activated: True

Third Party Assistance: Cybersecurity Firms (E.G., Cloudflare, Palo Alto Networks), Legal Counsel, Forensic Investigators.

Containment Measures: OAuth Token RevocationDisabling Compromised IntegrationsIsolating Affected Systems

Remediation Measures: Token Lifecycle Management EnhancementsZero-Trust Access Controls for Third-Party IntegrationsExpanded Monitoring of OAuth Activity

Recovery Measures: Restoration of Affected Salesforce InstancesCustomer Notification and SupportLegal Hold Procedures for eDiscovery

Communication Strategy: Public Disclosure (via HaystackID/ComplexDiscovery)Customer AdvisoriesRegulatory Notifications

Network Segmentation: ['Isolation of Compromised SaaS Integrations']

Enhanced Monitoring: Real-Time OAuth Token Activity MonitoringAnomalous API Call Detection

Incident : Supply Chain Attack SAL2862828092525

Incident Response Plan Activated: ['Forensic Investigations', 'Customer Notifications', 'Integration Audits']

Third Party Assistance: Likely (Not Specified).

Containment Measures: Token RevocationAccess RestrictionsIP Allow-Listing (Okta)

Remediation Measures: Credential RotationIntegration Lifecycle ReviewsSecurity Control Enhancements

Recovery Measures: System RestorationsCustomer Trust Rebuilding

Communication Strategy: Public DisclosuresCustomer AdvisoriesTransparency Reports

Network Segmentation: ['Recommended for AI Applications']

Enhanced Monitoring: AI Behavior BaseliningAnomaly Detection for Data Access Patterns

Incident : Data Breach SAL5092150100725

Remediation Measures: Enforcing API Permission ControlsAuditing Third-Party IntegrationsMulti-Factor Authentication (MFA) EnforcementSanitizing Development Repositories

Incident : data breach SAL2593525101325

Containment Measures: domain seizure (breachforums.hn, Tor site)FBI/French authorities intervention

Incident : Data Breach (OAuth Token Compromise) SAL0932309111025

Incident Response Plan Activated: [None, None, 'Partial (5,000 user credentials rotated, but NHI token overlooked)']

Containment Measures: Token revocation (post-incident)Token revocation (post-discovery of compromise)

Adaptive Behavioral WAF: [None, None, None]

On-Demand Scrubbing Services: [None, None, None]

Network Segmentation: [None, None, None]

Incident : third-party breach SAL4794547112625

Third Party Assistance: Riskprofiler (Ai-Powered Tprm Solutions).

Remediation Measures: AI-powered third-party risk monitoringautonomous attack path mappingstreamlined third-party risk questionnairesreal-time vendor portfolio breach detectionprioritized threat alerts for fast response

Communication Strategy: advisories on proactive third-party risk managementMSSP-focused mitigation guidance

Enhanced Monitoring: continuous vendor security posture monitoringAI-driven anomaly detection

What is the company's incident response plan?

Incident Response Plan: The company's incident response plan is described as Yes (with assistance from Google’s Mandiant), , Forensic Investigations, Customer Notifications, Integration Audits, , Partial (5,000 user credentials rotated, but NHI token overlooked), .

How does the company involve third-party assistance in incident response ?

Third-Party Assistance: The company involves third-party assistance in incident response through Google Threat Intelligence Group (GTIG), , Google’s Mandiant (Incident Response Unit), , Cybersecurity Firms (e.g., Cloudflare, Palo Alto Networks), Legal Counsel, Forensic Investigators, , Likely (Not Specified), , , RiskProfiler (AI-powered TPRM solutions), .

Data Breach Information

What type of data was compromised in each breach ?

Incident : data breach SAL725082725

Type of Data Compromised: Credentials (aws access keys, passwords), Snowflake access tokens, Salesforce object data (cases, accounts, users, opportunities), Potential gcp service account keys

Sensitivity of Data: high (credentials, access tokens, business-critical Salesforce data)

Incident : Supply Chain Attack SAL2792527090825

Type of Data Compromised: Authentication tokens (oauth), Aws access keys, Passwords, Snowflake access tokens, Support ticket data

Sensitivity of Data: High (credentials, access tokens, potentially PII in support tickets)

Data Exfiltration: Yes

Personally Identifiable Information: Potentially (via support tickets)

Incident : Supply Chain Attack SAL4092740091625

Type of Data Compromised: Crm data, Support case records, Credentials (api keys, passwords), Business communications

Sensitivity of Data: High (includes PII, credentials, and proprietary business data)

Incident : Supply Chain Attack SAL2862828092525

Type of Data Compromised: Customer conversation logs, Contact information, Api credentials, Salesforce data

Sensitivity of Data: High (PII, Business Communications, Authentication Tokens)

Data Exfiltration: Confirmed (Systematic via Salesforce Integrations)

File Types Exposed: Conversation LogsContact DatabasesAPI TokensPotentially Calendar/Email Data

Personally Identifiable Information: NamesEmail AddressesPotentially Phone NumbersBusiness Roles

Incident : Data Breach SAL5092150100725

Type of Data Compromised: Crm data (customer leads, deal details), Oauth tokens, Credentials/access keys, Operational confidential information

Sensitivity of Data: High (Business-Critical CRM Data, Authentication Tokens)

Data Exfiltration: Yes (Mass Data Extraction via OAuth Tokens)

Personally Identifiable Information: Likely (Customer Data in CRM)

Incident : data breach SAL2593525101325

Type of Data Compromised: Corporate files, Potentially pii (unspecified)

Sensitivity of Data: high (corporate proprietary data)

Personally Identifiable Information: potential (not confirmed)

Incident : Data Breach (OAuth Token Compromise) SAL0932309111025

Type of Data Compromised: Crm data (salesforce), aws keys, snowflake tokens, Internal source code (270 gb), proprietary data, Atlassian suite data (jira, confluence, bitbucket)

Number of Records Exposed: None, None, None

Sensitivity of Data: High (credentials, CRM data)High (source code, internal data)High (Atlassian suite data)

Data Exfiltration: Yes (sensitive records, credentials)Yes (270 GB of data)Likely (unauthorized access to Atlassian data)

Data Encryption: [None, None, None]

File Types Exposed: CRM records, support case attachments (containing credentials)Source code files, internal documentationJira tickets, Confluence pages, Bitbucket repositories

Personally Identifiable Information: Possible (via CRM data)Possible (in source code/comments)Possible (in Atlassian data)

Incident : third-party breach SAL4794547112625

Type of Data Compromised: Authentication tokens (salesforce drift), Potential cascading data exposure

Sensitivity of Data: high (authentication credentials)

Data Exfiltration: tokens stolen; potential downstream data access

What measures does the company take to prevent data exfiltration ?

Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: re-authentication of Drift-Salesforce connections, review of Salesforce objects for sensitive data, revocation of API keys, credential rotation, , Token Lifecycle Management Enhancements, Zero-Trust Access Controls for Third-Party Integrations, Expanded Monitoring of OAuth Activity, , Credential Rotation, Integration Lifecycle Reviews, Security Control Enhancements, , Enforcing API Permission Controls, Auditing Third-Party Integrations, Multi-Factor Authentication (MFA) Enforcement, Sanitizing Development Repositories, , , AI-powered third-party risk monitoring, autonomous attack path mapping, streamlined third-party risk questionnaires, real-time vendor portfolio breach detection, prioritized threat alerts for fast response, .

How does the company handle incidents involving personally identifiable information (PII) ?

Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by revoked all active oauth access and refresh tokens, removed drift app from salesforce appexchange, , isolation of compromised github account, revocation of stolen tokens, restoration of salesforce integration, , oauth token revocation, disabling compromised integrations, isolating affected systems, , token revocation, access restrictions, ip allow-listing (okta), , domain seizure (breachforums.hn, tor site), fbi/french authorities intervention, , token revocation (post-incident), token revocation (post-discovery of compromise) and .

Ransomware Information

Was ransomware involved in any of the incidents ?

Incident : data breach SAL725082725

Data Exfiltration: True

Incident : Supply Chain Attack SAL2792527090825

Data Exfiltration: Yes (credential theft focus)

Incident : Supply Chain Attack SAL4092740091625

Data Exfiltration: True

Incident : Supply Chain Attack SAL2862828092525

Data Exfiltration: ['Confirmed (But Not Ransomware-Related)']

Incident : Data Breach SAL5092150100725

Ransom Demanded: Yes (Extortion via Tor Leak Site)

Data Encryption: No (Extortion-Based, Not Encryption)

Data Exfiltration: Yes

Incident : data breach SAL2593525101325

Data Exfiltration: True

Incident : Data Breach (OAuth Token Compromise) SAL0932309111025

Ransom Demanded: [None, None, None]

Data Encryption: [None, None, None]

Data Exfiltration: ['Yes', 'Yes', 'Likely']

How does the company recover data encrypted by ransomware ?

Data Recovery from Ransomware: The company recovers data encrypted by ransomware through Salesforce Integration Restored (as of August 2024), , Restoration of Affected Salesforce Instances, Customer Notification and Support, Legal Hold Procedures for eDiscovery, , System Restorations, Customer Trust Rebuilding, , .

Regulatory Compliance

Were there any regulatory violations and fines imposed for each incident ?

Incident : Supply Chain Attack SAL4092740091625

Regulations Violated: Potential GDPR (EU), CCPA (California), Industry-Specific Data Protection Laws,

Legal Actions: Class-Action Lawsuits (e.g., against Salesforce), Regulatory Investigations (Expected),

Regulatory Notifications: Ongoing (GDPR, CCPA, etc.)

Incident : Supply Chain Attack SAL2862828092525

Regulations Violated: Potential GDPR (for EU Customer Data), CCPA (for California Residents), Industry-Specific Compliance Standards,

Legal Actions: Expected (Not Yet Filed),

Regulatory Notifications: Likely Required (Not Confirmed)

Incident : data breach SAL2593525101325

Legal Actions: domain seizures by FBI/French authorities,

Incident : Data Breach (OAuth Token Compromise) SAL0932309111025

Fines Imposed: [None, None, None]

Legal Actions: None, None, None,

How does the company ensure compliance with regulatory requirements ?

Ensuring Regulatory Compliance: The company ensures compliance with regulatory requirements through Class-Action Lawsuits (e.g., against Salesforce), Regulatory Investigations (Expected), , Expected (Not Yet Filed), , domain seizures by FBI/French authorities, , None, None, None, .

Lessons Learned and Recommendations

What lessons were learned from each incident ?

Incident : Supply Chain Attack SAL2792527090825

Lessons Learned: Timely detection of reconnaissance activities is critical (6-month delay in this case)., OAuth token security and rotation policies require stricter controls., GitHub account security (e.g., MFA, access reviews) must be prioritized to prevent supply chain risks., Third-party integrations (e.g., Salesforce) can amplify breach impact; segmentation and monitoring are essential.

Incident : Supply Chain Attack SAL4092740091625

Lessons Learned: OAuth tokens require the same security rigor as passwords, including MFA and regular rotation., Third-party integration security must be elevated to a board-level priority with dedicated oversight., Supply chain risks extend beyond direct vendors to fourth/fifth-party SaaS ecosystems., Anti-forensics techniques (e.g., log deletion) can delay detection, necessitating enhanced monitoring., Data shared via external platforms (e.g., chatbots) may contain sensitive information requiring classification and protection., eDiscovery preparedness must account for multi-platform, cross-jurisdictional breach responses.

Incident : Supply Chain Attack SAL2862828092525

Lessons Learned: AI integrations expand attack surfaces beyond traditional perimeters, Trust-based architectures create detection blind spots for AI-powered exfiltration, Authentication tokens for AI systems must be treated as crown jewels, IP allow-listing and geographic restrictions are critical for high-privilege AI tokens, Integration lifecycle management is essential to prevent stale credential exposure, AI behavior baselining is necessary to detect anomalous data access patterns, Third-party AI vendors introduce supply chain risks that require defense-in-depth

Incident : Data Breach SAL5092150100725

Lessons Learned: Social engineering (vishing) remains a critical attack vector for initial access., Over-permissive API/OAuth tokens create extensive lateral movement risks., Third-party integrations (e.g., Salesloft, Drift) expand attack surfaces in SaaS ecosystems., Credential hygiene (e.g., GitHub repositories) is a persistent weak point., RaaS models enable scalable extortion campaigns with lower technical barriers.

Incident : data breach SAL2593525101325

Lessons Learned: Cybercriminal forums remain resilient despite law enforcement takedowns, adapting to alternative platforms (e.g., Telegram)., Destruction of database backups can disrupt cybercriminal operations but may not fully deter them., Collaboration between international law enforcement (FBI/French authorities) is critical for disrupting cybercriminal infrastructure., Companies must assume leaked data will be exploited even if initial leak attempts are thwarted.

Incident : Data Breach (OAuth Token Compromise) SAL0932309111025

Lessons Learned: Non-human identities (NHIs) such as OAuth tokens, API keys, and service accounts are high-value targets for attackers due to their broad privileges and lack of oversight. Organizations must extend identity security controls to include NHIs, not just human users., Publicly exposed API tokens can act as unguarded backdoors, granting attackers direct access to sensitive systems without needing to bypass interactive login protections. Token hygiene (e.g., avoiding public exposure, enforcing least privilege) is critical., Orphaned or unrotated service credentials can undermine incident response efforts. Even after rotating human credentials, overlooked NHIs can provide attackers with persistent access. Comprehensive credential rotation must include all identities—human and non-human., Dynamic SaaS Security Platforms are essential for discovering, monitoring, and securing NHIs. Traditional identity controls are insufficient for the scale and complexity of machine identities in modern SaaS environments.

Incident : third-party breach SAL4794547112625

Lessons Learned: Supply chain breaches can cascade rapidly across interconnected systems., Manual vendor risk assessments are insufficient for modern threat landscapes., AI-powered continuous monitoring is critical for detecting shadow IT and third-party exposures., MSSPs must prioritize extended vendor relationship oversight beyond immediate suppliers., Proactive threat visibility and autonomous remediation are key to mitigating third-party risks.

What recommendations were made to prevent future incidents ?

Incident : data breach SAL725082725

Recommendations: Review Salesforce objects for sensitive data and secrets, Revoke and rotate compromised API keys and credentials, Monitor for unauthorized access or abuse of stolen secrets, Enhance OAuth token security and third-party app integrations, Conduct thorough investigations for signs of lateral movement or further compromiseReview Salesforce objects for sensitive data and secrets, Revoke and rotate compromised API keys and credentials, Monitor for unauthorized access or abuse of stolen secrets, Enhance OAuth token security and third-party app integrations, Conduct thorough investigations for signs of lateral movement or further compromiseReview Salesforce objects for sensitive data and secrets, Revoke and rotate compromised API keys and credentials, Monitor for unauthorized access or abuse of stolen secrets, Enhance OAuth token security and third-party app integrations, Conduct thorough investigations for signs of lateral movement or further compromiseReview Salesforce objects for sensitive data and secrets, Revoke and rotate compromised API keys and credentials, Monitor for unauthorized access or abuse of stolen secrets, Enhance OAuth token security and third-party app integrations, Conduct thorough investigations for signs of lateral movement or further compromiseReview Salesforce objects for sensitive data and secrets, Revoke and rotate compromised API keys and credentials, Monitor for unauthorized access or abuse of stolen secrets, Enhance OAuth token security and third-party app integrations, Conduct thorough investigations for signs of lateral movement or further compromise

Incident : Supply Chain Attack SAL2792527090825

Recommendations: Implement continuous monitoring for GitHub and cloud environments to detect anomalous activities (e.g., guest user additions, workflow changes)., Enforce least-privilege access and regular token rotation for OAuth and API integrations., Conduct regular red-team exercises to test detection capabilities for reconnaissance and lateral movement., Enhance incident response coordination with customers in supply chain scenarios to mitigate downstream impacts., Adopt zero-trust principles for third-party integrations (e.g., Salesforce, AWS).Implement continuous monitoring for GitHub and cloud environments to detect anomalous activities (e.g., guest user additions, workflow changes)., Enforce least-privilege access and regular token rotation for OAuth and API integrations., Conduct regular red-team exercises to test detection capabilities for reconnaissance and lateral movement., Enhance incident response coordination with customers in supply chain scenarios to mitigate downstream impacts., Adopt zero-trust principles for third-party integrations (e.g., Salesforce, AWS).Implement continuous monitoring for GitHub and cloud environments to detect anomalous activities (e.g., guest user additions, workflow changes)., Enforce least-privilege access and regular token rotation for OAuth and API integrations., Conduct regular red-team exercises to test detection capabilities for reconnaissance and lateral movement., Enhance incident response coordination with customers in supply chain scenarios to mitigate downstream impacts., Adopt zero-trust principles for third-party integrations (e.g., Salesforce, AWS).Implement continuous monitoring for GitHub and cloud environments to detect anomalous activities (e.g., guest user additions, workflow changes)., Enforce least-privilege access and regular token rotation for OAuth and API integrations., Conduct regular red-team exercises to test detection capabilities for reconnaissance and lateral movement., Enhance incident response coordination with customers in supply chain scenarios to mitigate downstream impacts., Adopt zero-trust principles for third-party integrations (e.g., Salesforce, AWS).Implement continuous monitoring for GitHub and cloud environments to detect anomalous activities (e.g., guest user additions, workflow changes)., Enforce least-privilege access and regular token rotation for OAuth and API integrations., Conduct regular red-team exercises to test detection capabilities for reconnaissance and lateral movement., Enhance incident response coordination with customers in supply chain scenarios to mitigate downstream impacts., Adopt zero-trust principles for third-party integrations (e.g., Salesforce, AWS).

Incident : Supply Chain Attack SAL4092740091625

Recommendations: Implement **strict OAuth token lifecycle management** (rotation, scoped permissions, real-time monitoring)., Adopt **zero-trust access controls** for all third-party integrations, treating them as untrusted by default., Expand **third-party risk assessments** to include fourth/fifth-party SaaS dependencies., Develop **cross-platform visibility tools** to track data flows across interconnected systems., Establish **pre-negotiated breach response protocols** with vendors, including liability frameworks., Enhance **legal hold procedures** for multi-tenant cloud environments to ensure evidence integrity., Invest in **automated anomaly detection** for OAuth token usage and API activity., Conduct **regular audits** of third-party integrations and their permission scopes., Train employees on **secure data-sharing practices** via external platforms (e.g., chatbots, support tools)., Integrate **information governance** with cybersecurity to classify and protect data in SaaS environments.Implement **strict OAuth token lifecycle management** (rotation, scoped permissions, real-time monitoring)., Adopt **zero-trust access controls** for all third-party integrations, treating them as untrusted by default., Expand **third-party risk assessments** to include fourth/fifth-party SaaS dependencies., Develop **cross-platform visibility tools** to track data flows across interconnected systems., Establish **pre-negotiated breach response protocols** with vendors, including liability frameworks., Enhance **legal hold procedures** for multi-tenant cloud environments to ensure evidence integrity., Invest in **automated anomaly detection** for OAuth token usage and API activity., Conduct **regular audits** of third-party integrations and their permission scopes., Train employees on **secure data-sharing practices** via external platforms (e.g., chatbots, support tools)., Integrate **information governance** with cybersecurity to classify and protect data in SaaS environments.Implement **strict OAuth token lifecycle management** (rotation, scoped permissions, real-time monitoring)., Adopt **zero-trust access controls** for all third-party integrations, treating them as untrusted by default., Expand **third-party risk assessments** to include fourth/fifth-party SaaS dependencies., Develop **cross-platform visibility tools** to track data flows across interconnected systems., Establish **pre-negotiated breach response protocols** with vendors, including liability frameworks., Enhance **legal hold procedures** for multi-tenant cloud environments to ensure evidence integrity., Invest in **automated anomaly detection** for OAuth token usage and API activity., Conduct **regular audits** of third-party integrations and their permission scopes., Train employees on **secure data-sharing practices** via external platforms (e.g., chatbots, support tools)., Integrate **information governance** with cybersecurity to classify and protect data in SaaS environments.Implement **strict OAuth token lifecycle management** (rotation, scoped permissions, real-time monitoring)., Adopt **zero-trust access controls** for all third-party integrations, treating them as untrusted by default., Expand **third-party risk assessments** to include fourth/fifth-party SaaS dependencies., Develop **cross-platform visibility tools** to track data flows across interconnected systems., Establish **pre-negotiated breach response protocols** with vendors, including liability frameworks., Enhance **legal hold procedures** for multi-tenant cloud environments to ensure evidence integrity., Invest in **automated anomaly detection** for OAuth token usage and API activity., Conduct **regular audits** of third-party integrations and their permission scopes., Train employees on **secure data-sharing practices** via external platforms (e.g., chatbots, support tools)., Integrate **information governance** with cybersecurity to classify and protect data in SaaS environments.Implement **strict OAuth token lifecycle management** (rotation, scoped permissions, real-time monitoring)., Adopt **zero-trust access controls** for all third-party integrations, treating them as untrusted by default., Expand **third-party risk assessments** to include fourth/fifth-party SaaS dependencies., Develop **cross-platform visibility tools** to track data flows across interconnected systems., Establish **pre-negotiated breach response protocols** with vendors, including liability frameworks., Enhance **legal hold procedures** for multi-tenant cloud environments to ensure evidence integrity., Invest in **automated anomaly detection** for OAuth token usage and API activity., Conduct **regular audits** of third-party integrations and their permission scopes., Train employees on **secure data-sharing practices** via external platforms (e.g., chatbots, support tools)., Integrate **information governance** with cybersecurity to classify and protect data in SaaS environments.Implement **strict OAuth token lifecycle management** (rotation, scoped permissions, real-time monitoring)., Adopt **zero-trust access controls** for all third-party integrations, treating them as untrusted by default., Expand **third-party risk assessments** to include fourth/fifth-party SaaS dependencies., Develop **cross-platform visibility tools** to track data flows across interconnected systems., Establish **pre-negotiated breach response protocols** with vendors, including liability frameworks., Enhance **legal hold procedures** for multi-tenant cloud environments to ensure evidence integrity., Invest in **automated anomaly detection** for OAuth token usage and API activity., Conduct **regular audits** of third-party integrations and their permission scopes., Train employees on **secure data-sharing practices** via external platforms (e.g., chatbots, support tools)., Integrate **information governance** with cybersecurity to classify and protect data in SaaS environments.Implement **strict OAuth token lifecycle management** (rotation, scoped permissions, real-time monitoring)., Adopt **zero-trust access controls** for all third-party integrations, treating them as untrusted by default., Expand **third-party risk assessments** to include fourth/fifth-party SaaS dependencies., Develop **cross-platform visibility tools** to track data flows across interconnected systems., Establish **pre-negotiated breach response protocols** with vendors, including liability frameworks., Enhance **legal hold procedures** for multi-tenant cloud environments to ensure evidence integrity., Invest in **automated anomaly detection** for OAuth token usage and API activity., Conduct **regular audits** of third-party integrations and their permission scopes., Train employees on **secure data-sharing practices** via external platforms (e.g., chatbots, support tools)., Integrate **information governance** with cybersecurity to classify and protect data in SaaS environments.Implement **strict OAuth token lifecycle management** (rotation, scoped permissions, real-time monitoring)., Adopt **zero-trust access controls** for all third-party integrations, treating them as untrusted by default., Expand **third-party risk assessments** to include fourth/fifth-party SaaS dependencies., Develop **cross-platform visibility tools** to track data flows across interconnected systems., Establish **pre-negotiated breach response protocols** with vendors, including liability frameworks., Enhance **legal hold procedures** for multi-tenant cloud environments to ensure evidence integrity., Invest in **automated anomaly detection** for OAuth token usage and API activity., Conduct **regular audits** of third-party integrations and their permission scopes., Train employees on **secure data-sharing practices** via external platforms (e.g., chatbots, support tools)., Integrate **information governance** with cybersecurity to classify and protect data in SaaS environments.Implement **strict OAuth token lifecycle management** (rotation, scoped permissions, real-time monitoring)., Adopt **zero-trust access controls** for all third-party integrations, treating them as untrusted by default., Expand **third-party risk assessments** to include fourth/fifth-party SaaS dependencies., Develop **cross-platform visibility tools** to track data flows across interconnected systems., Establish **pre-negotiated breach response protocols** with vendors, including liability frameworks., Enhance **legal hold procedures** for multi-tenant cloud environments to ensure evidence integrity., Invest in **automated anomaly detection** for OAuth token usage and API activity., Conduct **regular audits** of third-party integrations and their permission scopes., Train employees on **secure data-sharing practices** via external platforms (e.g., chatbots, support tools)., Integrate **information governance** with cybersecurity to classify and protect data in SaaS environments.Implement **strict OAuth token lifecycle management** (rotation, scoped permissions, real-time monitoring)., Adopt **zero-trust access controls** for all third-party integrations, treating them as untrusted by default., Expand **third-party risk assessments** to include fourth/fifth-party SaaS dependencies., Develop **cross-platform visibility tools** to track data flows across interconnected systems., Establish **pre-negotiated breach response protocols** with vendors, including liability frameworks., Enhance **legal hold procedures** for multi-tenant cloud environments to ensure evidence integrity., Invest in **automated anomaly detection** for OAuth token usage and API activity., Conduct **regular audits** of third-party integrations and their permission scopes., Train employees on **secure data-sharing practices** via external platforms (e.g., chatbots, support tools)., Integrate **information governance** with cybersecurity to classify and protect data in SaaS environments.

Incident : Supply Chain Attack SAL2862828092525

Recommendations: Implement IP allow-listing for all AI integration tokens, Enforce geographic restrictions on API access, Use time-based access windows for sensitive integrations, Segment networks processing sensitive data via AI applications, Rotate OAuth tokens and API keys automatically with short lifespans, Store high-privilege credentials in encrypted vaults or HSMs, Monitor for unusual AI data consumption patterns (spikes, off-hours, unusual sources), Audit integration lifecycles to deactivate unused or former vendor connections, Treat AI vendors as part of your critical supply chain with corresponding security reviews, Adopt zero-trust principles for AI system authentications, Conduct red-team exercises specifically targeting AI integration pathwaysImplement IP allow-listing for all AI integration tokens, Enforce geographic restrictions on API access, Use time-based access windows for sensitive integrations, Segment networks processing sensitive data via AI applications, Rotate OAuth tokens and API keys automatically with short lifespans, Store high-privilege credentials in encrypted vaults or HSMs, Monitor for unusual AI data consumption patterns (spikes, off-hours, unusual sources), Audit integration lifecycles to deactivate unused or former vendor connections, Treat AI vendors as part of your critical supply chain with corresponding security reviews, Adopt zero-trust principles for AI system authentications, Conduct red-team exercises specifically targeting AI integration pathwaysImplement IP allow-listing for all AI integration tokens, Enforce geographic restrictions on API access, Use time-based access windows for sensitive integrations, Segment networks processing sensitive data via AI applications, Rotate OAuth tokens and API keys automatically with short lifespans, Store high-privilege credentials in encrypted vaults or HSMs, Monitor for unusual AI data consumption patterns (spikes, off-hours, unusual sources), Audit integration lifecycles to deactivate unused or former vendor connections, Treat AI vendors as part of your critical supply chain with corresponding security reviews, Adopt zero-trust principles for AI system authentications, Conduct red-team exercises specifically targeting AI integration pathwaysImplement IP allow-listing for all AI integration tokens, Enforce geographic restrictions on API access, Use time-based access windows for sensitive integrations, Segment networks processing sensitive data via AI applications, Rotate OAuth tokens and API keys automatically with short lifespans, Store high-privilege credentials in encrypted vaults or HSMs, Monitor for unusual AI data consumption patterns (spikes, off-hours, unusual sources), Audit integration lifecycles to deactivate unused or former vendor connections, Treat AI vendors as part of your critical supply chain with corresponding security reviews, Adopt zero-trust principles for AI system authentications, Conduct red-team exercises specifically targeting AI integration pathwaysImplement IP allow-listing for all AI integration tokens, Enforce geographic restrictions on API access, Use time-based access windows for sensitive integrations, Segment networks processing sensitive data via AI applications, Rotate OAuth tokens and API keys automatically with short lifespans, Store high-privilege credentials in encrypted vaults or HSMs, Monitor for unusual AI data consumption patterns (spikes, off-hours, unusual sources), Audit integration lifecycles to deactivate unused or former vendor connections, Treat AI vendors as part of your critical supply chain with corresponding security reviews, Adopt zero-trust principles for AI system authentications, Conduct red-team exercises specifically targeting AI integration pathwaysImplement IP allow-listing for all AI integration tokens, Enforce geographic restrictions on API access, Use time-based access windows for sensitive integrations, Segment networks processing sensitive data via AI applications, Rotate OAuth tokens and API keys automatically with short lifespans, Store high-privilege credentials in encrypted vaults or HSMs, Monitor for unusual AI data consumption patterns (spikes, off-hours, unusual sources), Audit integration lifecycles to deactivate unused or former vendor connections, Treat AI vendors as part of your critical supply chain with corresponding security reviews, Adopt zero-trust principles for AI system authentications, Conduct red-team exercises specifically targeting AI integration pathwaysImplement IP allow-listing for all AI integration tokens, Enforce geographic restrictions on API access, Use time-based access windows for sensitive integrations, Segment networks processing sensitive data via AI applications, Rotate OAuth tokens and API keys automatically with short lifespans, Store high-privilege credentials in encrypted vaults or HSMs, Monitor for unusual AI data consumption patterns (spikes, off-hours, unusual sources), Audit integration lifecycles to deactivate unused or former vendor connections, Treat AI vendors as part of your critical supply chain with corresponding security reviews, Adopt zero-trust principles for AI system authentications, Conduct red-team exercises specifically targeting AI integration pathwaysImplement IP allow-listing for all AI integration tokens, Enforce geographic restrictions on API access, Use time-based access windows for sensitive integrations, Segment networks processing sensitive data via AI applications, Rotate OAuth tokens and API keys automatically with short lifespans, Store high-privilege credentials in encrypted vaults or HSMs, Monitor for unusual AI data consumption patterns (spikes, off-hours, unusual sources), Audit integration lifecycles to deactivate unused or former vendor connections, Treat AI vendors as part of your critical supply chain with corresponding security reviews, Adopt zero-trust principles for AI system authentications, Conduct red-team exercises specifically targeting AI integration pathwaysImplement IP allow-listing for all AI integration tokens, Enforce geographic restrictions on API access, Use time-based access windows for sensitive integrations, Segment networks processing sensitive data via AI applications, Rotate OAuth tokens and API keys automatically with short lifespans, Store high-privilege credentials in encrypted vaults or HSMs, Monitor for unusual AI data consumption patterns (spikes, off-hours, unusual sources), Audit integration lifecycles to deactivate unused or former vendor connections, Treat AI vendors as part of your critical supply chain with corresponding security reviews, Adopt zero-trust principles for AI system authentications, Conduct red-team exercises specifically targeting AI integration pathwaysImplement IP allow-listing for all AI integration tokens, Enforce geographic restrictions on API access, Use time-based access windows for sensitive integrations, Segment networks processing sensitive data via AI applications, Rotate OAuth tokens and API keys automatically with short lifespans, Store high-privilege credentials in encrypted vaults or HSMs, Monitor for unusual AI data consumption patterns (spikes, off-hours, unusual sources), Audit integration lifecycles to deactivate unused or former vendor connections, Treat AI vendors as part of your critical supply chain with corresponding security reviews, Adopt zero-trust principles for AI system authentications, Conduct red-team exercises specifically targeting AI integration pathwaysImplement IP allow-listing for all AI integration tokens, Enforce geographic restrictions on API access, Use time-based access windows for sensitive integrations, Segment networks processing sensitive data via AI applications, Rotate OAuth tokens and API keys automatically with short lifespans, Store high-privilege credentials in encrypted vaults or HSMs, Monitor for unusual AI data consumption patterns (spikes, off-hours, unusual sources), Audit integration lifecycles to deactivate unused or former vendor connections, Treat AI vendors as part of your critical supply chain with corresponding security reviews, Adopt zero-trust principles for AI system authentications, Conduct red-team exercises specifically targeting AI integration pathways

Incident : Data Breach SAL5092150100725

Recommendations: Implement strict API/OAuth permission controls and regular audits., Enforce MFA for all critical systems, including third-party integrations., Sanitize development repositories to remove hardcoded credentials., Monitor for anomalous OAuth token usage and lateral movement., Educate employees on vishing and social engineering tactics., Segment networks to limit blast radius from compromised integrations., Adopt zero-trust principles for SaaS and cloud environments.Implement strict API/OAuth permission controls and regular audits., Enforce MFA for all critical systems, including third-party integrations., Sanitize development repositories to remove hardcoded credentials., Monitor for anomalous OAuth token usage and lateral movement., Educate employees on vishing and social engineering tactics., Segment networks to limit blast radius from compromised integrations., Adopt zero-trust principles for SaaS and cloud environments.Implement strict API/OAuth permission controls and regular audits., Enforce MFA for all critical systems, including third-party integrations., Sanitize development repositories to remove hardcoded credentials., Monitor for anomalous OAuth token usage and lateral movement., Educate employees on vishing and social engineering tactics., Segment networks to limit blast radius from compromised integrations., Adopt zero-trust principles for SaaS and cloud environments.Implement strict API/OAuth permission controls and regular audits., Enforce MFA for all critical systems, including third-party integrations., Sanitize development repositories to remove hardcoded credentials., Monitor for anomalous OAuth token usage and lateral movement., Educate employees on vishing and social engineering tactics., Segment networks to limit blast radius from compromised integrations., Adopt zero-trust principles for SaaS and cloud environments.Implement strict API/OAuth permission controls and regular audits., Enforce MFA for all critical systems, including third-party integrations., Sanitize development repositories to remove hardcoded credentials., Monitor for anomalous OAuth token usage and lateral movement., Educate employees on vishing and social engineering tactics., Segment networks to limit blast radius from compromised integrations., Adopt zero-trust principles for SaaS and cloud environments.Implement strict API/OAuth permission controls and regular audits., Enforce MFA for all critical systems, including third-party integrations., Sanitize development repositories to remove hardcoded credentials., Monitor for anomalous OAuth token usage and lateral movement., Educate employees on vishing and social engineering tactics., Segment networks to limit blast radius from compromised integrations., Adopt zero-trust principles for SaaS and cloud environments.Implement strict API/OAuth permission controls and regular audits., Enforce MFA for all critical systems, including third-party integrations., Sanitize development repositories to remove hardcoded credentials., Monitor for anomalous OAuth token usage and lateral movement., Educate employees on vishing and social engineering tactics., Segment networks to limit blast radius from compromised integrations., Adopt zero-trust principles for SaaS and cloud environments.

Incident : data breach SAL2593525101325

Recommendations: Monitor dark web/Telegram channels for leaked data related to the breach., Enhance third-party risk management for vendors like Salesloft/Salesforce., Prepare incident response plans for data leaks originating from cybercriminal forums., Law enforcement should prioritize tracking Scattered Lapsus$ Hunters' new communication channels (e.g., Telegram).Monitor dark web/Telegram channels for leaked data related to the breach., Enhance third-party risk management for vendors like Salesloft/Salesforce., Prepare incident response plans for data leaks originating from cybercriminal forums., Law enforcement should prioritize tracking Scattered Lapsus$ Hunters' new communication channels (e.g., Telegram).Monitor dark web/Telegram channels for leaked data related to the breach., Enhance third-party risk management for vendors like Salesloft/Salesforce., Prepare incident response plans for data leaks originating from cybercriminal forums., Law enforcement should prioritize tracking Scattered Lapsus$ Hunters' new communication channels (e.g., Telegram).Monitor dark web/Telegram channels for leaked data related to the breach., Enhance third-party risk management for vendors like Salesloft/Salesforce., Prepare incident response plans for data leaks originating from cybercriminal forums., Law enforcement should prioritize tracking Scattered Lapsus$ Hunters' new communication channels (e.g., Telegram).

Incident : Data Breach (OAuth Token Compromise) SAL0932309111025

Recommendations: Implement **unified visibility** of all non-human identities (OAuth apps, API keys, service accounts, bots) across SaaS applications using automated discovery tools., Enforce **least privilege** for NHIs by auditing and restricting overly permissive access scopes. Ensure integrations and tokens can only access the data they explicitly require., Deploy **continuous anomaly monitoring** to detect deviations in NHI behavior (e.g., unusual access times, data volumes, or locations). Baseline normal activity and flag anomalies in real time., Automate **credential rotation and expiration** for all NHIs. Use platforms that detect stale tokens, rotate secrets regularly, and disable unused credentials., Apply **compensating controls** for NHIs where MFA is not feasible (e.g., IP restrictions, scoped access, session monitoring)., Maintain a **real-time inventory** of third-party integrations, especially those connected via user consent (OAuth), and verify their legitimacy and security posture., Disable **orphaned or ghost NHIs** (credentials not tied to active workflows or users), as these are prime targets for attackers., Leverage **Dynamic SaaS Security Platforms** (e.g., Reco) to automate detection, response, and remediation for NHI-related risks, including token revocation and integration quarantine., Conduct **regular audits** of NHI permissions and usage context. Classify NHIs by type (e.g., integrations, AI assistants, RPA bots) to tailor risk controls appropriately., Educate teams on the risks of NHIs and integrate NHI security into broader **identity and access management (IAM)** strategies.Implement **unified visibility** of all non-human identities (OAuth apps, API keys, service accounts, bots) across SaaS applications using automated discovery tools., Enforce **least privilege** for NHIs by auditing and restricting overly permissive access scopes. Ensure integrations and tokens can only access the data they explicitly require., Deploy **continuous anomaly monitoring** to detect deviations in NHI behavior (e.g., unusual access times, data volumes, or locations). Baseline normal activity and flag anomalies in real time., Automate **credential rotation and expiration** for all NHIs. Use platforms that detect stale tokens, rotate secrets regularly, and disable unused credentials., Apply **compensating controls** for NHIs where MFA is not feasible (e.g., IP restrictions, scoped access, session monitoring)., Maintain a **real-time inventory** of third-party integrations, especially those connected via user consent (OAuth), and verify their legitimacy and security posture., Disable **orphaned or ghost NHIs** (credentials not tied to active workflows or users), as these are prime targets for attackers., Leverage **Dynamic SaaS Security Platforms** (e.g., Reco) to automate detection, response, and remediation for NHI-related risks, including token revocation and integration quarantine., Conduct **regular audits** of NHI permissions and usage context. Classify NHIs by type (e.g., integrations, AI assistants, RPA bots) to tailor risk controls appropriately., Educate teams on the risks of NHIs and integrate NHI security into broader **identity and access management (IAM)** strategies.Implement **unified visibility** of all non-human identities (OAuth apps, API keys, service accounts, bots) across SaaS applications using automated discovery tools., Enforce **least privilege** for NHIs by auditing and restricting overly permissive access scopes. Ensure integrations and tokens can only access the data they explicitly require., Deploy **continuous anomaly monitoring** to detect deviations in NHI behavior (e.g., unusual access times, data volumes, or locations). Baseline normal activity and flag anomalies in real time., Automate **credential rotation and expiration** for all NHIs. Use platforms that detect stale tokens, rotate secrets regularly, and disable unused credentials., Apply **compensating controls** for NHIs where MFA is not feasible (e.g., IP restrictions, scoped access, session monitoring)., Maintain a **real-time inventory** of third-party integrations, especially those connected via user consent (OAuth), and verify their legitimacy and security posture., Disable **orphaned or ghost NHIs** (credentials not tied to active workflows or users), as these are prime targets for attackers., Leverage **Dynamic SaaS Security Platforms** (e.g., Reco) to automate detection, response, and remediation for NHI-related risks, including token revocation and integration quarantine., Conduct **regular audits** of NHI permissions and usage context. Classify NHIs by type (e.g., integrations, AI assistants, RPA bots) to tailor risk controls appropriately., Educate teams on the risks of NHIs and integrate NHI security into broader **identity and access management (IAM)** strategies.Implement **unified visibility** of all non-human identities (OAuth apps, API keys, service accounts, bots) across SaaS applications using automated discovery tools., Enforce **least privilege** for NHIs by auditing and restricting overly permissive access scopes. Ensure integrations and tokens can only access the data they explicitly require., Deploy **continuous anomaly monitoring** to detect deviations in NHI behavior (e.g., unusual access times, data volumes, or locations). Baseline normal activity and flag anomalies in real time., Automate **credential rotation and expiration** for all NHIs. Use platforms that detect stale tokens, rotate secrets regularly, and disable unused credentials., Apply **compensating controls** for NHIs where MFA is not feasible (e.g., IP restrictions, scoped access, session monitoring)., Maintain a **real-time inventory** of third-party integrations, especially those connected via user consent (OAuth), and verify their legitimacy and security posture., Disable **orphaned or ghost NHIs** (credentials not tied to active workflows or users), as these are prime targets for attackers., Leverage **Dynamic SaaS Security Platforms** (e.g., Reco) to automate detection, response, and remediation for NHI-related risks, including token revocation and integration quarantine., Conduct **regular audits** of NHI permissions and usage context. Classify NHIs by type (e.g., integrations, AI assistants, RPA bots) to tailor risk controls appropriately., Educate teams on the risks of NHIs and integrate NHI security into broader **identity and access management (IAM)** strategies.Implement **unified visibility** of all non-human identities (OAuth apps, API keys, service accounts, bots) across SaaS applications using automated discovery tools., Enforce **least privilege** for NHIs by auditing and restricting overly permissive access scopes. Ensure integrations and tokens can only access the data they explicitly require., Deploy **continuous anomaly monitoring** to detect deviations in NHI behavior (e.g., unusual access times, data volumes, or locations). Baseline normal activity and flag anomalies in real time., Automate **credential rotation and expiration** for all NHIs. Use platforms that detect stale tokens, rotate secrets regularly, and disable unused credentials., Apply **compensating controls** for NHIs where MFA is not feasible (e.g., IP restrictions, scoped access, session monitoring)., Maintain a **real-time inventory** of third-party integrations, especially those connected via user consent (OAuth), and verify their legitimacy and security posture., Disable **orphaned or ghost NHIs** (credentials not tied to active workflows or users), as these are prime targets for attackers., Leverage **Dynamic SaaS Security Platforms** (e.g., Reco) to automate detection, response, and remediation for NHI-related risks, including token revocation and integration quarantine., Conduct **regular audits** of NHI permissions and usage context. Classify NHIs by type (e.g., integrations, AI assistants, RPA bots) to tailor risk controls appropriately., Educate teams on the risks of NHIs and integrate NHI security into broader **identity and access management (IAM)** strategies.Implement **unified visibility** of all non-human identities (OAuth apps, API keys, service accounts, bots) across SaaS applications using automated discovery tools., Enforce **least privilege** for NHIs by auditing and restricting overly permissive access scopes. Ensure integrations and tokens can only access the data they explicitly require., Deploy **continuous anomaly monitoring** to detect deviations in NHI behavior (e.g., unusual access times, data volumes, or locations). Baseline normal activity and flag anomalies in real time., Automate **credential rotation and expiration** for all NHIs. Use platforms that detect stale tokens, rotate secrets regularly, and disable unused credentials., Apply **compensating controls** for NHIs where MFA is not feasible (e.g., IP restrictions, scoped access, session monitoring)., Maintain a **real-time inventory** of third-party integrations, especially those connected via user consent (OAuth), and verify their legitimacy and security posture., Disable **orphaned or ghost NHIs** (credentials not tied to active workflows or users), as these are prime targets for attackers., Leverage **Dynamic SaaS Security Platforms** (e.g., Reco) to automate detection, response, and remediation for NHI-related risks, including token revocation and integration quarantine., Conduct **regular audits** of NHI permissions and usage context. Classify NHIs by type (e.g., integrations, AI assistants, RPA bots) to tailor risk controls appropriately., Educate teams on the risks of NHIs and integrate NHI security into broader **identity and access management (IAM)** strategies.Implement **unified visibility** of all non-human identities (OAuth apps, API keys, service accounts, bots) across SaaS applications using automated discovery tools., Enforce **least privilege** for NHIs by auditing and restricting overly permissive access scopes. Ensure integrations and tokens can only access the data they explicitly require., Deploy **continuous anomaly monitoring** to detect deviations in NHI behavior (e.g., unusual access times, data volumes, or locations). Baseline normal activity and flag anomalies in real time., Automate **credential rotation and expiration** for all NHIs. Use platforms that detect stale tokens, rotate secrets regularly, and disable unused credentials., Apply **compensating controls** for NHIs where MFA is not feasible (e.g., IP restrictions, scoped access, session monitoring)., Maintain a **real-time inventory** of third-party integrations, especially those connected via user consent (OAuth), and verify their legitimacy and security posture., Disable **orphaned or ghost NHIs** (credentials not tied to active workflows or users), as these are prime targets for attackers., Leverage **Dynamic SaaS Security Platforms** (e.g., Reco) to automate detection, response, and remediation for NHI-related risks, including token revocation and integration quarantine., Conduct **regular audits** of NHI permissions and usage context. Classify NHIs by type (e.g., integrations, AI assistants, RPA bots) to tailor risk controls appropriately., Educate teams on the risks of NHIs and integrate NHI security into broader **identity and access management (IAM)** strategies.Implement **unified visibility** of all non-human identities (OAuth apps, API keys, service accounts, bots) across SaaS applications using automated discovery tools., Enforce **least privilege** for NHIs by auditing and restricting overly permissive access scopes. Ensure integrations and tokens can only access the data they explicitly require., Deploy **continuous anomaly monitoring** to detect deviations in NHI behavior (e.g., unusual access times, data volumes, or locations). Baseline normal activity and flag anomalies in real time., Automate **credential rotation and expiration** for all NHIs. Use platforms that detect stale tokens, rotate secrets regularly, and disable unused credentials., Apply **compensating controls** for NHIs where MFA is not feasible (e.g., IP restrictions, scoped access, session monitoring)., Maintain a **real-time inventory** of third-party integrations, especially those connected via user consent (OAuth), and verify their legitimacy and security posture., Disable **orphaned or ghost NHIs** (credentials not tied to active workflows or users), as these are prime targets for attackers., Leverage **Dynamic SaaS Security Platforms** (e.g., Reco) to automate detection, response, and remediation for NHI-related risks, including token revocation and integration quarantine., Conduct **regular audits** of NHI permissions and usage context. Classify NHIs by type (e.g., integrations, AI assistants, RPA bots) to tailor risk controls appropriately., Educate teams on the risks of NHIs and integrate NHI security into broader **identity and access management (IAM)** strategies.Implement **unified visibility** of all non-human identities (OAuth apps, API keys, service accounts, bots) across SaaS applications using automated discovery tools., Enforce **least privilege** for NHIs by auditing and restricting overly permissive access scopes. Ensure integrations and tokens can only access the data they explicitly require., Deploy **continuous anomaly monitoring** to detect deviations in NHI behavior (e.g., unusual access times, data volumes, or locations). Baseline normal activity and flag anomalies in real time., Automate **credential rotation and expiration** for all NHIs. Use platforms that detect stale tokens, rotate secrets regularly, and disable unused credentials., Apply **compensating controls** for NHIs where MFA is not feasible (e.g., IP restrictions, scoped access, session monitoring)., Maintain a **real-time inventory** of third-party integrations, especially those connected via user consent (OAuth), and verify their legitimacy and security posture., Disable **orphaned or ghost NHIs** (credentials not tied to active workflows or users), as these are prime targets for attackers., Leverage **Dynamic SaaS Security Platforms** (e.g., Reco) to automate detection, response, and remediation for NHI-related risks, including token revocation and integration quarantine., Conduct **regular audits** of NHI permissions and usage context. Classify NHIs by type (e.g., integrations, AI assistants, RPA bots) to tailor risk controls appropriately., Educate teams on the risks of NHIs and integrate NHI security into broader **identity and access management (IAM)** strategies.Implement **unified visibility** of all non-human identities (OAuth apps, API keys, service accounts, bots) across SaaS applications using automated discovery tools., Enforce **least privilege** for NHIs by auditing and restricting overly permissive access scopes. Ensure integrations and tokens can only access the data they explicitly require., Deploy **continuous anomaly monitoring** to detect deviations in NHI behavior (e.g., unusual access times, data volumes, or locations). Baseline normal activity and flag anomalies in real time., Automate **credential rotation and expiration** for all NHIs. Use platforms that detect stale tokens, rotate secrets regularly, and disable unused credentials., Apply **compensating controls** for NHIs where MFA is not feasible (e.g., IP restrictions, scoped access, session monitoring)., Maintain a **real-time inventory** of third-party integrations, especially those connected via user consent (OAuth), and verify their legitimacy and security posture., Disable **orphaned or ghost NHIs** (credentials not tied to active workflows or users), as these are prime targets for attackers., Leverage **Dynamic SaaS Security Platforms** (e.g., Reco) to automate detection, response, and remediation for NHI-related risks, including token revocation and integration quarantine., Conduct **regular audits** of NHI permissions and usage context. Classify NHIs by type (e.g., integrations, AI assistants, RPA bots) to tailor risk controls appropriately., Educate teams on the risks of NHIs and integrate NHI security into broader **identity and access management (IAM)** strategies.

Incident : third-party breach SAL4794547112625

Recommendations: Implement AI-powered third-party risk management (TPRM) platforms (e.g., RiskProfiler)., Enable continuous monitoring of vendor security postures, including multi-tier suppliers., Automate vendor risk questionnaires with dynamic updates for real-time compliance., Benchmark vendor security against industry peers to identify gaps., Integrate threat intelligence tools to map attack paths and prioritize containment., Adopt agentic AI for contextual learning and adaptive risk scoring., Monitor hidden dependencies (subsidiaries, partners) to prevent cascading disruptions., Replace manual Excel-based assessments with autonomous, real-time systems.Implement AI-powered third-party risk management (TPRM) platforms (e.g., RiskProfiler)., Enable continuous monitoring of vendor security postures, including multi-tier suppliers., Automate vendor risk questionnaires with dynamic updates for real-time compliance., Benchmark vendor security against industry peers to identify gaps., Integrate threat intelligence tools to map attack paths and prioritize containment., Adopt agentic AI for contextual learning and adaptive risk scoring., Monitor hidden dependencies (subsidiaries, partners) to prevent cascading disruptions., Replace manual Excel-based assessments with autonomous, real-time systems.Implement AI-powered third-party risk management (TPRM) platforms (e.g., RiskProfiler)., Enable continuous monitoring of vendor security postures, including multi-tier suppliers., Automate vendor risk questionnaires with dynamic updates for real-time compliance., Benchmark vendor security against industry peers to identify gaps., Integrate threat intelligence tools to map attack paths and prioritize containment., Adopt agentic AI for contextual learning and adaptive risk scoring., Monitor hidden dependencies (subsidiaries, partners) to prevent cascading disruptions., Replace manual Excel-based assessments with autonomous, real-time systems.Implement AI-powered third-party risk management (TPRM) platforms (e.g., RiskProfiler)., Enable continuous monitoring of vendor security postures, including multi-tier suppliers., Automate vendor risk questionnaires with dynamic updates for real-time compliance., Benchmark vendor security against industry peers to identify gaps., Integrate threat intelligence tools to map attack paths and prioritize containment., Adopt agentic AI for contextual learning and adaptive risk scoring., Monitor hidden dependencies (subsidiaries, partners) to prevent cascading disruptions., Replace manual Excel-based assessments with autonomous, real-time systems.Implement AI-powered third-party risk management (TPRM) platforms (e.g., RiskProfiler)., Enable continuous monitoring of vendor security postures, including multi-tier suppliers., Automate vendor risk questionnaires with dynamic updates for real-time compliance., Benchmark vendor security against industry peers to identify gaps., Integrate threat intelligence tools to map attack paths and prioritize containment., Adopt agentic AI for contextual learning and adaptive risk scoring., Monitor hidden dependencies (subsidiaries, partners) to prevent cascading disruptions., Replace manual Excel-based assessments with autonomous, real-time systems.Implement AI-powered third-party risk management (TPRM) platforms (e.g., RiskProfiler)., Enable continuous monitoring of vendor security postures, including multi-tier suppliers., Automate vendor risk questionnaires with dynamic updates for real-time compliance., Benchmark vendor security against industry peers to identify gaps., Integrate threat intelligence tools to map attack paths and prioritize containment., Adopt agentic AI for contextual learning and adaptive risk scoring., Monitor hidden dependencies (subsidiaries, partners) to prevent cascading disruptions., Replace manual Excel-based assessments with autonomous, real-time systems.Implement AI-powered third-party risk management (TPRM) platforms (e.g., RiskProfiler)., Enable continuous monitoring of vendor security postures, including multi-tier suppliers., Automate vendor risk questionnaires with dynamic updates for real-time compliance., Benchmark vendor security against industry peers to identify gaps., Integrate threat intelligence tools to map attack paths and prioritize containment., Adopt agentic AI for contextual learning and adaptive risk scoring., Monitor hidden dependencies (subsidiaries, partners) to prevent cascading disruptions., Replace manual Excel-based assessments with autonomous, real-time systems.Implement AI-powered third-party risk management (TPRM) platforms (e.g., RiskProfiler)., Enable continuous monitoring of vendor security postures, including multi-tier suppliers., Automate vendor risk questionnaires with dynamic updates for real-time compliance., Benchmark vendor security against industry peers to identify gaps., Integrate threat intelligence tools to map attack paths and prioritize containment., Adopt agentic AI for contextual learning and adaptive risk scoring., Monitor hidden dependencies (subsidiaries, partners) to prevent cascading disruptions., Replace manual Excel-based assessments with autonomous, real-time systems.

What are the key lessons learned from past incidents ?

Key Lessons Learned: The key lessons learned from past incidents are Timely detection of reconnaissance activities is critical (6-month delay in this case).,OAuth token security and rotation policies require stricter controls.,GitHub account security (e.g., MFA, access reviews) must be prioritized to prevent supply chain risks.,Third-party integrations (e.g., Salesforce) can amplify breach impact; segmentation and monitoring are essential.OAuth tokens require the same security rigor as passwords, including MFA and regular rotation.,Third-party integration security must be elevated to a board-level priority with dedicated oversight.,Supply chain risks extend beyond direct vendors to fourth/fifth-party SaaS ecosystems.,Anti-forensics techniques (e.g., log deletion) can delay detection, necessitating enhanced monitoring.,Data shared via external platforms (e.g., chatbots) may contain sensitive information requiring classification and protection.,eDiscovery preparedness must account for multi-platform, cross-jurisdictional breach responses.AI integrations expand attack surfaces beyond traditional perimeters,Trust-based architectures create detection blind spots for AI-powered exfiltration,Authentication tokens for AI systems must be treated as crown jewels,IP allow-listing and geographic restrictions are critical for high-privilege AI tokens,Integration lifecycle management is essential to prevent stale credential exposure,AI behavior baselining is necessary to detect anomalous data access patterns,Third-party AI vendors introduce supply chain risks that require defense-in-depthSocial engineering (vishing) remains a critical attack vector for initial access.,Over-permissive API/OAuth tokens create extensive lateral movement risks.,Third-party integrations (e.g., Salesloft, Drift) expand attack surfaces in SaaS ecosystems.,Credential hygiene (e.g., GitHub repositories) is a persistent weak point.,RaaS models enable scalable extortion campaigns with lower technical barriers.Cybercriminal forums remain resilient despite law enforcement takedowns, adapting to alternative platforms (e.g., Telegram).,Destruction of database backups can disrupt cybercriminal operations but may not fully deter them.,Collaboration between international law enforcement (FBI/French authorities) is critical for disrupting cybercriminal infrastructure.,Companies must assume leaked data will be exploited even if initial leak attempts are thwarted.Non-human identities (NHIs) such as OAuth tokens, API keys, and service accounts are high-value targets for attackers due to their broad privileges and lack of oversight. Organizations must extend identity security controls to include NHIs, not just human users.,Publicly exposed API tokens can act as unguarded backdoors, granting attackers direct access to sensitive systems without needing to bypass interactive login protections. Token hygiene (e.g., avoiding public exposure, enforcing least privilege) is critical.,Orphaned or unrotated service credentials can undermine incident response efforts. Even after rotating human credentials, overlooked NHIs can provide attackers with persistent access. Comprehensive credential rotation must include all identities—human and non-human.,Dynamic SaaS Security Platforms are essential for discovering, monitoring, and securing NHIs. Traditional identity controls are insufficient for the scale and complexity of machine identities in modern SaaS environments.Supply chain breaches can cascade rapidly across interconnected systems.,Manual vendor risk assessments are insufficient for modern threat landscapes.,AI-powered continuous monitoring is critical for detecting shadow IT and third-party exposures.,MSSPs must prioritize extended vendor relationship oversight beyond immediate suppliers.,Proactive threat visibility and autonomous remediation are key to mitigating third-party risks.

References

Where can I find more information about each incident ?

Incident : data breach SAL725082725

Source: The Register

Incident : data breach SAL725082725

Source: Google Threat Intelligence Group (GTIG) Advisory

Incident : data breach SAL725082725

Source: Salesloft Advisory

Incident : Supply Chain Attack SAL2792527090825

Source: TechCrunch

URL: https://techcrunch.com

Date Accessed: 2024-09-01T00:00:00Z

Incident : Supply Chain Attack SAL2792527090825

Source: Salesloft Data Breach Page

Date Accessed: 2024-08-26T00:00:00Z

Incident : Supply Chain Attack SAL2792527090825

Source: Google Threat Intelligence Group (Mandiant)

Date Accessed: 2024-08-01T00:00:00Z

Incident : Supply Chain Attack SAL2792527090825

Source: DataBreaches.net

URL: https://www.databreaches.net

Date Accessed: 2024-08-30T00:00:00Z

Incident : Supply Chain Attack SAL2792527090825

Source: Bleeping Computer

URL: https://www.bleepingcomputer.com

Date Accessed: 2024-08-28T00:00:00Z

Incident : Supply Chain Attack SAL4092740091625

Source: HaystackID/ComplexDiscovery OÜ

Date Accessed: 2025

Incident : Supply Chain Attack SAL2862828092525

Source: Incident Analysis Report (Hypothetical)

Incident : Data Breach SAL5092150100725

Source: Cybersecurity Article (Title Not Provided)

Incident : data breach SAL2593525101325

Source: BleepingComputer

Incident : data breach SAL2593525101325

Source: CyberInsider

Incident : data breach SAL2593525101325

Source: TechRadar

URL: https://www.techradar.com

Incident : Data Breach (OAuth Token Compromise) SAL0932309111025

Source: Reco Blog: 'The Hidden Risk of Non-Human Identities in SaaS'

Incident : Data Breach (OAuth Token Compromise) SAL0932309111025

Source: Author: Gal Nakash (CPO and Cofounder, Reco)

Incident : third-party breach SAL4794547112625

Source: RiskProfiler Guest Blog

Incident : third-party breach SAL4794547112625

Source: IBM Cost of a Data Breach Report 2025

Where can stakeholders find additional resources on cybersecurity best practices ?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: The Register, and Source: Google Threat Intelligence Group (GTIG) Advisory, and Source: Salesloft Advisory, and Source: TechCrunchUrl: https://techcrunch.comDate Accessed: 2024-09-01T00:00:00Z, and Source: Salesloft Data Breach PageDate Accessed: 2024-08-26T00:00:00Z, and Source: Google Threat Intelligence Group (Mandiant)Date Accessed: 2024-08-01T00:00:00Z, and Source: DataBreaches.netUrl: https://www.databreaches.netDate Accessed: 2024-08-30T00:00:00Z, and Source: Bleeping ComputerUrl: https://www.bleepingcomputer.comDate Accessed: 2024-08-28T00:00:00Z, and Source: HaystackID/ComplexDiscovery OÜDate Accessed: 2025, and Source: Incident Analysis Report (Hypothetical), and Source: Cybersecurity Article (Title Not Provided), and Source: BleepingComputer, and Source: CyberInsider, and Source: TechRadarUrl: https://www.techradar.com, and Source: Reco Blog: 'The Hidden Risk of Non-Human Identities in SaaS', and Source: Author: Gal Nakash (CPO and Cofounder, Reco), and Source: RiskProfiler Guest Blog, and Source: IBM Cost of a Data Breach Report 2025.

Investigation Status

What is the current status of the investigation for each incident ?

Incident : data breach SAL725082725

Investigation Status: ongoing (Drift app remains off Salesforce AppExchange pending security assurance)

Incident : Supply Chain Attack SAL2792527090825

Investigation Status: Contained (as of August 2024)

Incident : Supply Chain Attack SAL4092740091625

Investigation Status: Ongoing (as of 2025)

Incident : Supply Chain Attack SAL2862828092525

Investigation Status: Ongoing (Forensic Analysis and Impact Assessment)

Incident : Data Breach SAL5092150100725

Investigation Status: Ongoing (as of October 2025)

Incident : data breach SAL2593525101325

Investigation Status: ongoing (no arrests made; forum operations pivoted to Telegram)

Incident : Data Breach (OAuth Token Compromise) SAL0932309111025

Investigation Status: [None, None, None]

Incident : third-party breach SAL4794547112625

Investigation Status: Ongoing (details limited to public disclosures)

How does the company communicate the status of incident investigations to stakeholders ?

Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Direct Notifications To Affected Customers, Public Advisories From Salesloft And Gtig, Indicators Of Compromise (Iocs) Shared With Admins, Public Disclosure Via Data Breach Page, Media Statements, Public Disclosure (Via Haystackid/Complexdiscovery), Customer Advisories, Regulatory Notifications, Public Disclosures, Customer Advisories, Transparency Reports, Advisories On Proactive Third-Party Risk Management and Mssp-Focused Mitigation Guidance.

Stakeholder and Customer Advisories

Were there any advisories issued to stakeholders or customers for each incident ?

Incident : data breach SAL725082725

Stakeholder Advisories: Direct Notifications To Affected Customers, Public Advisories With Iocs.

Customer Advisories: Urged to treat Salesforce data as compromised if using Drift integrationRecommended immediate remediation steps

Incident : Supply Chain Attack SAL2792527090825

Stakeholder Advisories: Public Disclosure Via Salesloft’S Breach Page; Likely Private Notifications To Affected Customers (E.G., Bugcrowd, Cloudflare)..

Customer Advisories: Customers advised to rotate credentials, review Salesforce access logs, and monitor for unauthorized activity.

Incident : Supply Chain Attack SAL4092740091625

Stakeholder Advisories: Customer Notifications Issued, Regulatory Disclosures In Progress, Legal Counsel Engaged For Litigation Preparedness.

Customer Advisories: Guidance on Password/Token RotationRecommendations for Monitoring Suspicious ActivitySupport for Affected CRM Data

Incident : Supply Chain Attack SAL2862828092525

Stakeholder Advisories: Customer Notifications Issued, Industry-Wide Alerts Recommended.

Customer Advisories: Security BulletinsRemediation GuidanceCompromised Data Notifications

Incident : Data Breach (OAuth Token Compromise) SAL0932309111025

Incident : third-party breach SAL4794547112625

Stakeholder Advisories: Mssps Urged To Adopt Proactive Third-Party Risk Strategies.

Customer Advisories: Organizations advised to audit third-party integrations and token security

What advisories does the company provide to stakeholders and customers following an incident ?

Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Direct Notifications To Affected Customers, Public Advisories With Iocs, Urged To Treat Salesforce Data As Compromised If Using Drift Integration, Recommended Immediate Remediation Steps, , Public Disclosure Via Salesloft’S Breach Page; Likely Private Notifications To Affected Customers (E.G., Bugcrowd, Cloudflare)., Customers Advised To Rotate Credentials, Review Salesforce Access Logs, And Monitor For Unauthorized Activity., , Customer Notifications Issued, Regulatory Disclosures In Progress, Legal Counsel Engaged For Litigation Preparedness, Guidance On Password/Token Rotation, Recommendations For Monitoring Suspicious Activity, Support For Affected Crm Data, , Customer Notifications Issued, Industry-Wide Alerts Recommended, Security Bulletins, Remediation Guidance, Compromised Data Notifications, , Mssps Urged To Adopt Proactive Third-Party Risk Strategies, Organizations Advised To Audit Third-Party Integrations And Token Security and .

Initial Access Broker

How did the initial access broker gain entry for each incident ?

Incident : data breach SAL725082725

Entry Point: Stolen OAuth tokens (Drift app integration with Salesforce)

High Value Targets: Aws Access Keys, Snowflake Tokens, Gcp Service Account Keys, Salesforce Object Data,

Data Sold on Dark Web: Aws Access Keys, Snowflake Tokens, Gcp Service Account Keys, Salesforce Object Data,

Incident : Supply Chain Attack SAL2792527090825

Entry Point: Salesloft GitHub Account

Reconnaissance Period: March 2024 – June 2024 (3 months)

Backdoors Established: ['Guest User Added to GitHub', 'Unauthorized Workflows Created']

High Value Targets: Oauth Tokens (Drift Customers), Aws Access Keys, Snowflake Tokens, Salesforce Instances,

Data Sold on Dark Web: Oauth Tokens (Drift Customers), Aws Access Keys, Snowflake Tokens, Salesforce Instances,

Incident : Supply Chain Attack SAL4092740091625

Entry Point: Compromised Salesloft GitHub Account (March–June 2025)

Reconnaissance Period: March 2025 – August 2025 (5+ months)

Backdoors Established: ['Persistent OAuth Token Access', 'Automated Data Extraction Scripts']

High Value Targets: Salesforce Instances Of Cybersecurity Firms, Crm Data, Support Case Histories,

Data Sold on Dark Web: Salesforce Instances Of Cybersecurity Firms, Crm Data, Support Case Histories,

Incident : Supply Chain Attack SAL2862828092525

Entry Point: Salesloft Internal GitHub Repository

Reconnaissance Period: March-June 2025 (3-4 Months)

Backdoors Established: ['Stolen OAuth Token for Drift Access']

High Value Targets: Drift Cloud Application, Connected Salesforce Instances, Openai Api Credentials,

Data Sold on Dark Web: Drift Cloud Application, Connected Salesforce Instances, Openai Api Credentials,

Incident : Data Breach SAL5092150100725

Entry Point: Social Engineering (Vishing) → Malicious Salesforce Integrations

Reconnaissance Period: Late 2024 (Initial Access) to August 2025 (Mass Exfiltration)

Backdoors Established: Yes (OAuth Tokens for Persistent Access)

High Value Targets: Salesforce Crm Data, Third-Party Integration Tokens, Aws Cloud Environments,

Data Sold on Dark Web: Salesforce Crm Data, Third-Party Integration Tokens, Aws Cloud Environments,

Incident : data breach SAL2593525101325

High Value Targets: Salesloft, Salesforce, 40+ Companies (E.G., Qantas, Gap, Disney),

Data Sold on Dark Web: Salesloft, Salesforce, 40+ Companies (E.G., Qantas, Gap, Disney),

Incident : Data Breach (OAuth Token Compromise) SAL0932309111025

Entry Point: Compromised Oauth Tokens (Drift-Salesforce Integration), Exposed Github Api Token (Public Repository), Orphaned Api Token (Okta Service Account),

Reconnaissance Period: [None, None, None]

Backdoors Established: ['Yes (via hijacked OAuth tokens)', 'Yes (via exposed API token)', 'Yes (via unrotated service token)']

High Value Targets: Salesforce Crm Data, Aws/Snowflake Credentials, Internal Source Code (270 Gb), Atlassian Suite (Jira, Confluence, Bitbucket),

Data Sold on Dark Web: Salesforce Crm Data, Aws/Snowflake Credentials, Internal Source Code (270 Gb), Atlassian Suite (Jira, Confluence, Bitbucket),

Incident : third-party breach SAL4794547112625

Entry Point: Salesloft compromise (token theft)

High Value Targets: Salesforce Drift Tokens, Connected Enterprise Systems,

Data Sold on Dark Web: Salesforce Drift Tokens, Connected Enterprise Systems,

Post-Incident Analysis

What were the root causes and corrective actions taken for each incident ?

Incident : data breach SAL725082725

Root Causes: Insecure Oauth Token Management In Drift-Salesforce Integration, Potential Lack Of Monitoring For Anomalous Token Usage,

Corrective Actions: Token Revocation, App Removal From Marketplace, Enhanced Customer Guidance On Credential Hygiene,

Incident : Supply Chain Attack SAL2792527090825

Root Causes: Inadequate Monitoring Of Github Account Activities (E.G., Guest User Additions, Repository Access)., Delayed Detection Of Reconnaissance (March–June 2024)., Over-Reliance On Oauth Tokens Without Sufficient Safeguards (E.G., Short-Lived Tokens, Anomaly Detection)., Lack Of Segmentation Between Salesloft’S Github/Aws And Customer Environments (E.G., Salesforce).,

Corrective Actions: Enhanced Logging And Alerting For Github Actions (E.G., User Additions, Workflow Changes)., Implementation Of Token Expiration Policies And Real-Time Revocation Capabilities., Third-Party Security Audits For Cloud And Integration Environments., Customer Notification Protocols For Supply Chain Incidents.,

Incident : Supply Chain Attack SAL4092740091625

Root Causes: Inadequate Protection Of Github Credentials Leading To Initial Compromise., Lack Of Mfa Enforcement For Oauth Tokens, Allowing Bypass Of Authentication Controls., Insufficient Monitoring Of Third-Party Integration Activity (E.G., Drift-Salesforce Oauth Flows)., Over-Permissioned Oauth Tokens With Excessive Data Access Scopes., Delayed Detection Due To Anti-Forensics Techniques (Log Deletion)., Gaps In Cross-Platform Visibility For Data Flows In Saas Ecosystems.,

Corrective Actions: Mandate **Mfa For All Oauth Token Usage** And Treat Tokens As High-Value Credentials., Implement **Real-Time Monitoring** For Anomalous Oauth/Api Activity With Automated Alerts., Enforce **Least-Privilege Access** For Third-Party Integrations, Regularly Auditing Permission Scopes., Develop **Dedicated Supply Chain Risk Management Programs** For Saas Ecosystems., Enhance **Log Retention And Anti-Tampering Controls** To Prevent Evidence Destruction., Establish **Cross-Vendor Incident Response Playbooks** For Coordinated Breach Handling., Integrate **Information Governance** With Cybersecurity To Classify And Protect Data In Shared Environments., Conduct **Regular Red-Team Exercises** Targeting Third-Party Integration Attack Surfaces.,

Incident : Supply Chain Attack SAL2862828092525

Root Causes: Insufficient Protection Of High-Privilege Credentials In Github Repositories, Lack Of Ip Restrictions On Oauth Tokens, Over-Permissive Api Access For Ai Integrations, Failure To Deactivate Former Customer (Spycloud) Credentials, Detection Gaps For Ai-Powered Data Exfiltration Patterns, Inadequate Segmentation Between Ai Systems And Core Business Data,

Corrective Actions: Mandatory Ip Allow-Listing For All Integration Tokens, Implementation Of Just-In-Time Access For Ai Systems, Enhanced Credential Rotation Policies With Automated Enforcement, Ai-Specific Anomaly Detection For Data Access Patterns, Supply Chain Security Reviews For All Ai Vendors, Integration Lifecycle Management Automation, Zero-Trust Architecture Adoption For Ai Ecosystems, Reduced Token Permissions To Least-Privilege For Ai Integrations,

Incident : Data Breach SAL5092150100725

Root Causes: Successful Vishing Attacks Due To Lack Of Employee Awareness., Storing Credentials In Github Repositories (Poor Hygiene)., Over-Permissive Oauth Tokens Enabling Lateral Movement., Inadequate Monitoring Of Third-Party Integration Activities.,

Corrective Actions: Mandatory Mfa For All Saas And Cloud Access., Automated Credential Scanning In Code Repositories., Reduced Oauth Token Permissions And Scope., Enhanced Behavioral Analytics For Api/Oauth Usage., Employee Training On Social Engineering Tactics.,

Incident : data breach SAL2593525101325

Root Causes: Exploitation Of Cybercriminal Forums For Data Leaks And Extortion., Lack Of Arrests Allows Threat Actors To Continue Operations Under New Infrastructure., Insufficient Protection Of Corporate Data Shared With Third-Party Vendors (E.G., Salesloft/Salesforce).,

Corrective Actions: Strengthen Vendor Security Assessments For Platforms Handling Sensitive Data., Improve International Coordination For Takedowns Of Cybercriminal Infrastructure., Develop Strategies To Mitigate Data Leaks Even After Initial Disruption Of Threat Actor Operations.,

Incident : Data Breach (OAuth Token Compromise) SAL0932309111025

Root Causes: Lack Of Visibility And Oversight For Non-Human Identities (Oauth Tokens) With Excessive Privileges., Public Exposure Of A Github Api Token Due To Misconfiguration Or Lack Of Secret Management., Incomplete Incident Response: Human Credentials Were Rotated, But Non-Human Credentials (Api Tokens) Were Overlooked, Leaving A Backdoor Open., Overprivileged Nhis: Integrations And Tokens Had Broader Access Than Necessary, Increasing The Blast Radius Of Compromises.,

Corrective Actions: Adopt A **Dynamic Saas Security Platform** To Automate Discovery, Monitoring, And Remediation Of Nhis., Implement **Least Privilege Enforcement** For All Nhis, Auditing And Restricting Access Scopes To The Minimum Required., Deploy **Real-Time Anomaly Detection** For Nhi Behavior, With Automated Responses To Suspicious Activity (E.G., Token Revocation)., Establish **Automated Credential Rotation** For Nhis, Ensuring Tokens And Keys Are Regularly Refreshed And Unused Credentials Are Disabled., Conduct **Comprehensive Nhi Inventories** Across All Saas Applications, Classifying Identities By Type And Risk Level., Integrate **Nhi Security Into Iam Strategies**, Treating Machine Identities With The Same Rigor As Human Accounts., Enforce **Compensating Controls** For Nhis (E.G., Ip Restrictions, Session Monitoring) Where Mfa Is Not Applicable., Educate Security And Devops Teams On The Risks Of Nhis And The Importance Of Token Hygiene (E.G., Avoiding Hardcoding, Public Exposure).,

Incident : third-party breach SAL4794547112625

Root Causes: Inadequate Token Security In Salesloft/Salesforce Integration, Lack Of Visibility Into Third-Party/Shadow It Integrations, Manual, Point-In-Time Vendor Risk Assessments, Failure To Monitor Extended Supply Chain Dependencies,

Corrective Actions: Deploy Ai-Driven Tprm Solutions For Continuous Monitoring., Implement Autonomous Vendor Risk Questionnaires With Real-Time Updates., Map And Secure All Attack Paths In The Supply Chain Ecosystem., Enhance Token Security And Third-Party Access Controls., Adopt Peer Benchmarking To Identify Vendor Compliance Gaps.,

What is the company's process for conducting post-incident analysis ?

Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Google Threat Intelligence Group (Gtig), , Advisory To Monitor Salesforce Objects For Malicious Activity, , Google’S Mandiant (Incident Response Unit), , Cybersecurity Firms (E.G., Cloudflare, Palo Alto Networks), Legal Counsel, Forensic Investigators, , Real-Time Oauth Token Activity Monitoring, Anomalous Api Call Detection, , Likely (Not Specified), , Ai Behavior Baselining, Anomaly Detection For Data Access Patterns, , , , Riskprofiler (Ai-Powered Tprm Solutions), , Continuous Vendor Security Posture Monitoring, Ai-Driven Anomaly Detection, .

What corrective actions has the company taken based on post-incident analysis ?

Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Token Revocation, App Removal From Marketplace, Enhanced Customer Guidance On Credential Hygiene, , Enhanced Logging And Alerting For Github Actions (E.G., User Additions, Workflow Changes)., Implementation Of Token Expiration Policies And Real-Time Revocation Capabilities., Third-Party Security Audits For Cloud And Integration Environments., Customer Notification Protocols For Supply Chain Incidents., , Mandate **Mfa For All Oauth Token Usage** And Treat Tokens As High-Value Credentials., Implement **Real-Time Monitoring** For Anomalous Oauth/Api Activity With Automated Alerts., Enforce **Least-Privilege Access** For Third-Party Integrations, Regularly Auditing Permission Scopes., Develop **Dedicated Supply Chain Risk Management Programs** For Saas Ecosystems., Enhance **Log Retention And Anti-Tampering Controls** To Prevent Evidence Destruction., Establish **Cross-Vendor Incident Response Playbooks** For Coordinated Breach Handling., Integrate **Information Governance** With Cybersecurity To Classify And Protect Data In Shared Environments., Conduct **Regular Red-Team Exercises** Targeting Third-Party Integration Attack Surfaces., , Mandatory Ip Allow-Listing For All Integration Tokens, Implementation Of Just-In-Time Access For Ai Systems, Enhanced Credential Rotation Policies With Automated Enforcement, Ai-Specific Anomaly Detection For Data Access Patterns, Supply Chain Security Reviews For All Ai Vendors, Integration Lifecycle Management Automation, Zero-Trust Architecture Adoption For Ai Ecosystems, Reduced Token Permissions To Least-Privilege For Ai Integrations, , Mandatory Mfa For All Saas And Cloud Access., Automated Credential Scanning In Code Repositories., Reduced Oauth Token Permissions And Scope., Enhanced Behavioral Analytics For Api/Oauth Usage., Employee Training On Social Engineering Tactics., , Strengthen Vendor Security Assessments For Platforms Handling Sensitive Data., Improve International Coordination For Takedowns Of Cybercriminal Infrastructure., Develop Strategies To Mitigate Data Leaks Even After Initial Disruption Of Threat Actor Operations., , Adopt A **Dynamic Saas Security Platform** To Automate Discovery, Monitoring, And Remediation Of Nhis., Implement **Least Privilege Enforcement** For All Nhis, Auditing And Restricting Access Scopes To The Minimum Required., Deploy **Real-Time Anomaly Detection** For Nhi Behavior, With Automated Responses To Suspicious Activity (E.G., Token Revocation)., Establish **Automated Credential Rotation** For Nhis, Ensuring Tokens And Keys Are Regularly Refreshed And Unused Credentials Are Disabled., Conduct **Comprehensive Nhi Inventories** Across All Saas Applications, Classifying Identities By Type And Risk Level., Integrate **Nhi Security Into Iam Strategies**, Treating Machine Identities With The Same Rigor As Human Accounts., Enforce **Compensating Controls** For Nhis (E.G., Ip Restrictions, Session Monitoring) Where Mfa Is Not Applicable., Educate Security And Devops Teams On The Risks Of Nhis And The Importance Of Token Hygiene (E.G., Avoiding Hardcoding, Public Exposure)., , Deploy Ai-Driven Tprm Solutions For Continuous Monitoring., Implement Autonomous Vendor Risk Questionnaires With Real-Time Updates., Map And Secure All Attack Paths In The Supply Chain Ecosystem., Enhance Token Security And Third-Party Access Controls., Adopt Peer Benchmarking To Identify Vendor Compliance Gaps., .

Additional Questions

General Information

Has the company ever paid ransoms ?

Ransom Payment History: The company has Paid ransoms in the past.

What was the amount of the last ransom demanded ?

Last Ransom Demanded: The amount of the last ransom demanded was Yes (Extortion via Tor Leak Site).

Who was the attacking group in the last incident ?

Last Attacking Group: The attacking group in the last incident were an UNC6395 (for Salesloft Drift incidents)ShinyHunters (UNC6240) (for separate Salesforce incidents), UNC6395 (per Google Threat Intelligence Group)ShinyHunters (alleged), UNC6395GRUB1 (Cloudflare designation), Scattered Lapsus$ Hunters (fusion of ShinyHunters, Scattered Spider, and Lapsus$), Scattered Lapsus$ Hunters and .

Incident Details

What was the most recent incident detected ?

Most Recent Incident Detected: The most recent incident detected was on 2024-08-01T00:00:00Z.

What was the most recent incident publicly disclosed ?

Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2025-10-03.

What was the most recent incident resolved ?

Most Recent Incident Resolved: The most recent incident resolved was on 2024-08-26T00:00:00Z.

Impact of the Incidents

What was the highest financial loss from an incident ?

Highest Financial Loss: The highest financial loss from an incident was [None, None, None].

What was the most significant data compromised in an incident ?

Most Significant Data Compromised: The most significant data compromised in an incident were Salesforce objects (cases, accounts, users, opportunities), AWS access keys, passwords, Snowflake-related access tokens, potential Google Cloud Platform service account keys, , Authentication Tokens (OAuth), AWS Access Keys, Passwords, Snowflake-Related Tokens, Support Ticket Data (via Salesforce), , Customer Relationship Management (CRM) Data, Support Case Information, Sensitive Credentials (API keys, passwords), Business Communications, , Customer Conversation Data, Contact Information, Authentication Tokens (Including OpenAI API Credentials), Salesforce Instance Data, , Customer Leads, Deal Details, Confidential Operational Information, OAuth Tokens, Third-Party Integration Data, , , Salesforce CRM data (including AWS keys and Snowflake tokens from support case attachments), 270 GB of internal source code and data, Access to Cloudflare's Atlassian suite (Jira, Confluence, Bitbucket), , authentication tokens (Salesforce Drift), potential customer data (via cascading breaches) and .

What was the most significant system affected in an incident ?

Most Significant System Affected: The most significant system affected in an incident were Salesforce databases (via Drift integration)Drift app and Salesloft GitHub AccountSalesloft AWS Cloud EnvironmentDrift’s AI/Chatbot PlatformCustomer Salesforce Instances (e.g., Bugcrowd, Cloudflare, Google, Proofpoint, Palo Alto Networks, Tenable) and Salesforce Instances (700+ organizations)Drift Chatbot IntegrationGitHub Account (initial compromise) and Salesloft GitHub RepositoriesDrift Cloud ApplicationConnected Salesforce InstancesOpenAI API Integrations and Salesforce EnvironmentsSalesloft (Sales Engagement Platform)Drift AI ChatbotGitHub RepositoriesAWS Cloud Environments and Salesforce CRM (via Drift integration)GitHub (New York Times' cloud code repository)Atlassian Suite (Jira, Confluence, Bitbucket) and SalesforceCloudflaremultiple unnamed enterprises.

Response to the Incidents

What third-party assistance was involved in the most recent incident ?

Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was google threat intelligence group (gtig), , google’s mandiant (incident response unit), , cybersecurity firms (e.g., cloudflare, palo alto networks), legal counsel, forensic investigators, , likely (not specified), , , riskprofiler (ai-powered tprm solutions), .

What containment measures were taken in the most recent incident ?

Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident were revoked all active OAuth access and refresh tokensremoved Drift app from Salesforce AppExchange, Isolation of Compromised GitHub AccountRevocation of Stolen TokensRestoration of Salesforce Integration, OAuth Token RevocationDisabling Compromised IntegrationsIsolating Affected Systems, Token RevocationAccess RestrictionsIP Allow-Listing (Okta), domain seizure (breachforums.hn, Tor site)FBI/French authorities intervention and Token revocation (post-incident)Token revocation (post-discovery of compromise).

Data Breach Information

What was the most sensitive data compromised in a breach ?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Access to Cloudflare's Atlassian suite (Jira, Confluence, Bitbucket), Deal Details, passwords, authentication tokens (Salesforce Drift), Contact Information, Customer Conversation Data, Third-Party Integration Data, Business Communications, Salesforce objects (cases, accounts, users, opportunities), AWS access keys, Customer Leads, Passwords, 270 GB of internal source code and data, Authentication Tokens (Including OpenAI API Credentials), Sensitive Credentials (API keys, passwords), potential customer data (via cascading breaches), Customer Relationship Management (CRM) Data, Support Case Information, potential Google Cloud Platform service account keys, Confidential Operational Information, OAuth Tokens, AWS Access Keys, Salesforce CRM data (including AWS keys and Snowflake tokens from support case attachments), Support Ticket Data (via Salesforce), Snowflake-Related Tokens, Snowflake-related access tokens, Salesforce Instance Data and Authentication Tokens (OAuth).

What was the number of records exposed in the most significant breach ?

Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 0.

Ransomware Information

What was the highest ransom paid in a ransomware incident ?

Highest Ransom Paid: The highest ransom paid in a ransomware incident was [None, None, None].

Regulatory Compliance

What was the most significant legal action taken for a regulatory violation ?

Most Significant Legal Action: The most significant legal action taken for a regulatory violation was Class-Action Lawsuits (e.g., against Salesforce), Regulatory Investigations (Expected), , Expected (Not Yet Filed), , domain seizures by FBI/French authorities, , None, None, None, .

Lessons Learned and Recommendations

What was the most significant lesson learned from past incidents ?

Most Significant Lesson Learned: The most significant lesson learned from past incidents was Proactive threat visibility and autonomous remediation are key to mitigating third-party risks.

What was the most significant recommendation implemented to improve cybersecurity ?

Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Integrate threat intelligence tools to map attack paths and prioritize containment., Implement **unified visibility** of all non-human identities (OAuth apps, API keys, service accounts, bots) across SaaS applications using automated discovery tools., Educate teams on the risks of NHIs and integrate NHI security into broader **identity and access management (IAM)** strategies., Automate vendor risk questionnaires with dynamic updates for real-time compliance., Revoke and rotate compromised API keys and credentials, Law enforcement should prioritize tracking Scattered Lapsus$ Hunters' new communication channels (e.g., Telegram)., Adopt zero-trust principles for AI system authentications, Automate **credential rotation and expiration** for all NHIs. Use platforms that detect stale tokens, rotate secrets regularly, and disable unused credentials., Adopt zero-trust principles for SaaS and cloud environments., Maintain a **real-time inventory** of third-party integrations, especially those connected via user consent (OAuth), and verify their legitimacy and security posture., Invest in **automated anomaly detection** for OAuth token usage and API activity., Enforce geographic restrictions on API access, Adopt agentic AI for contextual learning and adaptive risk scoring., Conduct thorough investigations for signs of lateral movement or further compromise, Store high-privilege credentials in encrypted vaults or HSMs, Adopt **zero-trust access controls** for all third-party integrations, treating them as untrusted by default., Rotate OAuth tokens and API keys automatically with short lifespans, Enforce MFA for all critical systems, including third-party integrations., Prepare incident response plans for data leaks originating from cybercriminal forums., Conduct **regular audits** of NHI permissions and usage context. Classify NHIs by type (e.g., integrations, AI assistants, RPA bots) to tailor risk controls appropriately., Enhance incident response coordination with customers in supply chain scenarios to mitigate downstream impacts., Replace manual Excel-based assessments with autonomous, real-time systems., Integrate **information governance** with cybersecurity to classify and protect data in SaaS environments., Educate employees on vishing and social engineering tactics., Implement IP allow-listing for all AI integration tokens, Use time-based access windows for sensitive integrations, Train employees on **secure data-sharing practices** via external platforms (e.g., chatbots, support tools)., Adopt zero-trust principles for third-party integrations (e.g., Salesforce, AWS)., Conduct **regular audits** of third-party integrations and their permission scopes., Audit integration lifecycles to deactivate unused or former vendor connections, Implement strict API/OAuth permission controls and regular audits., Conduct regular red-team exercises to test detection capabilities for reconnaissance and lateral movement., Enhance third-party risk management for vendors like Salesloft/Salesforce., Enable continuous monitoring of vendor security postures, including multi-tier suppliers., Monitor for unauthorized access or abuse of stolen secrets, Expand **third-party risk assessments** to include fourth/fifth-party SaaS dependencies., Conduct red-team exercises specifically targeting AI integration pathways, Benchmark vendor security against industry peers to identify gaps., Implement continuous monitoring for GitHub and cloud environments to detect anomalous activities (e.g., guest user additions, workflow changes)., Enhance OAuth token security and third-party app integrations, Enforce least-privilege access and regular token rotation for OAuth and API integrations., Disable **orphaned or ghost NHIs** (credentials not tied to active workflows or users), as these are prime targets for attackers., Apply **compensating controls** for NHIs where MFA is not feasible (e.g., IP restrictions, scoped access, session monitoring)., Establish **pre-negotiated breach response protocols** with vendors, including liability frameworks., Enhance **legal hold procedures** for multi-tenant cloud environments to ensure evidence integrity., Monitor for unusual AI data consumption patterns (spikes, off-hours, unusual sources), Monitor for anomalous OAuth token usage and lateral movement., Leverage **Dynamic SaaS Security Platforms** (e.g., Reco) to automate detection, response, and remediation for NHI-related risks, including token revocation and integration quarantine., Develop **cross-platform visibility tools** to track data flows across interconnected systems., Segment networks to limit blast radius from compromised integrations., Review Salesforce objects for sensitive data and secrets, Treat AI vendors as part of your critical supply chain with corresponding security reviews, Enforce **least privilege** for NHIs by auditing and restricting overly permissive access scopes. Ensure integrations and tokens can only access the data they explicitly require., Monitor dark web/Telegram channels for leaked data related to the breach., Monitor hidden dependencies (subsidiaries, partners) to prevent cascading disruptions., Implement AI-powered third-party risk management (TPRM) platforms (e.g., RiskProfiler)., Deploy **continuous anomaly monitoring** to detect deviations in NHI behavior (e.g., unusual access times, data volumes, or locations). Baseline normal activity and flag anomalies in real time., Segment networks processing sensitive data via AI applications, Sanitize development repositories to remove hardcoded credentials., Implement **strict OAuth token lifecycle management** (rotation, scoped permissions and real-time monitoring)..

References

What is the most recent source of information about an incident ?

Most Recent Source: The most recent source of information about an incident are TechCrunch, The Register, Google Threat Intelligence Group (Mandiant), HaystackID/ComplexDiscovery OÜ, Author: Gal Nakash (CPO and Cofounder, Reco), Bleeping Computer, DataBreaches.net, Cybersecurity Article (Title Not Provided), Incident Analysis Report (Hypothetical), Salesloft Advisory, BleepingComputer, TechRadar, Reco Blog: 'The Hidden Risk of Non-Human Identities in SaaS', Google Threat Intelligence Group (GTIG) Advisory, Salesloft Data Breach Page, RiskProfiler Guest Blog, IBM Cost of a Data Breach Report 2025 and CyberInsider.

What is the most recent URL for additional resources on cybersecurity best practices ?

Most Recent URL for Additional Resources: The most recent URL for additional resources on cybersecurity best practices is https://techcrunch.com, https://www.databreaches.net, https://www.bleepingcomputer.com, https://www.techradar.com .

Investigation Status

What is the current status of the most recent investigation ?

Current Status of Most Recent Investigation: The current status of the most recent investigation is ongoing (Drift app remains off Salesforce AppExchange pending security assurance).

Stakeholder and Customer Advisories

What was the most recent stakeholder advisory issued ?

Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was Direct notifications to affected customers, Public advisories with IOCs, Public disclosure via Salesloft’s breach page; likely private notifications to affected customers (e.g., Bugcrowd, Cloudflare)., Customer Notifications Issued, Regulatory Disclosures in Progress, Legal Counsel Engaged for Litigation Preparedness, Customer Notifications Issued, Industry-Wide Alerts Recommended, MSSPs urged to adopt proactive third-party risk strategies, .

What was the most recent customer advisory issued ?

Most Recent Customer Advisory: The most recent customer advisory issued were an Urged to treat Salesforce data as compromised if using Drift integrationRecommended immediate remediation steps, Customers advised to rotate credentials, review Salesforce access logs, and monitor for unauthorized activity., Guidance on Password/Token RotationRecommendations for Monitoring Suspicious ActivitySupport for Affected CRM Data, Security BulletinsRemediation GuidanceCompromised Data Notifications, and Organizations advised to audit third-party integrations and token security.

Initial Access Broker

What was the most recent entry point used by an initial access broker ?

Most Recent Entry Point: The most recent entry point used by an initial access broker were an Salesloft Internal GitHub Repository, Salesloft compromise (token theft), Stolen OAuth tokens (Drift app integration with Salesforce), Social Engineering (Vishing) → Malicious Salesforce Integrations, Salesloft GitHub Account and Compromised Salesloft GitHub Account (March–June 2025).

What was the most recent reconnaissance period for an incident ?

Most Recent Reconnaissance Period: The most recent reconnaissance period for an incident was March 2024 – June 2024 (3 months), March 2025 – August 2025 (5+ months), March-June 2025 (3-4 Months), Late 2024 (Initial Access) to August 2025 (Mass Exfiltration), .

Post-Incident Analysis

What was the most significant root cause identified in post-incident analysis ?

Most Significant Root Cause: The most significant root cause identified in post-incident analysis was Insecure OAuth token management in Drift-Salesforce integrationPotential lack of monitoring for anomalous token usage, Inadequate monitoring of GitHub account activities (e.g., guest user additions, repository access).Delayed detection of reconnaissance (March–June 2024).Over-reliance on OAuth tokens without sufficient safeguards (e.g., short-lived tokens, anomaly detection).Lack of segmentation between Salesloft’s GitHub/AWS and customer environments (e.g., Salesforce)., Inadequate protection of GitHub credentials leading to initial compromise.Lack of MFA enforcement for OAuth tokens, allowing bypass of authentication controls.Insufficient monitoring of third-party integration activity (e.g., Drift-Salesforce OAuth flows).Over-permissioned OAuth tokens with excessive data access scopes.Delayed detection due to anti-forensics techniques (log deletion).Gaps in cross-platform visibility for data flows in SaaS ecosystems., Insufficient protection of high-privilege credentials in GitHub repositoriesLack of IP restrictions on OAuth tokensOver-permissive API access for AI integrationsFailure to deactivate former customer (SpyCloud) credentialsDetection gaps for AI-powered data exfiltration patternsInadequate segmentation between AI systems and core business data, Successful vishing attacks due to lack of employee awareness.Storing credentials in GitHub repositories (poor hygiene).Over-permissive OAuth tokens enabling lateral movement.Inadequate monitoring of third-party integration activities., Exploitation of cybercriminal forums for data leaks and extortion.Lack of arrests allows threat actors to continue operations under new infrastructure.Insufficient protection of corporate data shared with third-party vendors (e.g., Salesloft/Salesforce)., Lack of visibility and oversight for non-human identities (OAuth tokens) with excessive privileges.Public exposure of a GitHub API token due to misconfiguration or lack of secret management.Incomplete incident response: human credentials were rotated, but non-human credentials (API tokens) were overlooked, leaving a backdoor open.Overprivileged NHIs: integrations and tokens had broader access than necessary, increasing the blast radius of compromises., Inadequate token security in Salesloft/Salesforce integrationLack of visibility into third-party/shadow IT integrationsManual, point-in-time vendor risk assessmentsFailure to monitor extended supply chain dependencies.

What was the most significant corrective action taken based on post-incident analysis ?

Most Significant Corrective Action: The most significant corrective action taken based on post-incident analysis was Token revocationApp removal from marketplaceEnhanced customer guidance on credential hygiene, Enhanced logging and alerting for GitHub actions (e.g., user additions, workflow changes).Implementation of token expiration policies and real-time revocation capabilities.Third-party security audits for cloud and integration environments.Customer notification protocols for supply chain incidents., Mandate **MFA for all OAuth token usage** and treat tokens as high-value credentials.Implement **real-time monitoring** for anomalous OAuth/API activity with automated alerts.Enforce **least-privilege access** for third-party integrations, regularly auditing permission scopes.Develop **dedicated supply chain risk management programs** for SaaS ecosystems.Enhance **log retention and anti-tampering controls** to prevent evidence destruction.Establish **cross-vendor incident response playbooks** for coordinated breach handling.Integrate **information governance** with cybersecurity to classify and protect data in shared environments.Conduct **regular red-team exercises** targeting third-party integration attack surfaces., Mandatory IP allow-listing for all integration tokensImplementation of just-in-time access for AI systemsEnhanced credential rotation policies with automated enforcementAI-specific anomaly detection for data access patternsSupply chain security reviews for all AI vendorsIntegration lifecycle management automationZero-trust architecture adoption for AI ecosystemsReduced token permissions to least-privilege for AI integrations, Mandatory MFA for all SaaS and cloud access.Automated credential scanning in code repositories.Reduced OAuth token permissions and scope.Enhanced behavioral analytics for API/OAuth usage.Employee training on social engineering tactics., Strengthen vendor security assessments for platforms handling sensitive data.Improve international coordination for takedowns of cybercriminal infrastructure.Develop strategies to mitigate data leaks even after initial disruption of threat actor operations., Adopt a **Dynamic SaaS Security Platform** to automate discovery, monitoring, and remediation of NHIs.Implement **least privilege enforcement** for all NHIs, auditing and restricting access scopes to the minimum required.Deploy **real-time anomaly detection** for NHI behavior, with automated responses to suspicious activity (e.g., token revocation).Establish **automated credential rotation** for NHIs, ensuring tokens and keys are regularly refreshed and unused credentials are disabled.Conduct **comprehensive NHI inventories** across all SaaS applications, classifying identities by type and risk level.Integrate **NHI security into IAM strategies**, treating machine identities with the same rigor as human accounts.Enforce **compensating controls** for NHIs (e.g., IP restrictions, session monitoring) where MFA is not applicable.Educate security and DevOps teams on the risks of NHIs and the importance of token hygiene (e.g., avoiding hardcoding, public exposure)., Deploy AI-driven TPRM solutions for continuous monitoring.Implement autonomous vendor risk questionnaires with real-time updates.Map and secure all attack paths in the supply chain ecosystem.Enhance token security and third-party access controls.Adopt peer benchmarking to identify vendor compliance gaps..

cve

Latest Global CVEs (Not Company-Specific)

Description

Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versions 19.2.16, 20.3.14, and 21.0.1, there is a XSRF token leakage via protocol-relative URLs in angular HTTP clients. The vulnerability is a Credential Leak by App Logic that leads to the unauthorized disclosure of the Cross-Site Request Forgery (XSRF) token to an attacker-controlled domain. Angular's HttpClient has a built-in XSRF protection mechanism that works by checking if a request URL starts with a protocol (http:// or https://) to determine if it is cross-origin. If the URL starts with protocol-relative URL (//), it is incorrectly treated as a same-origin request, and the XSRF token is automatically added to the X-XSRF-TOKEN header. This issue has been patched in versions 19.2.16, 20.3.14, and 21.0.1. A workaround for this issue involves avoiding using protocol-relative URLs (URLs starting with //) in HttpClient requests. All backend communication URLs should be hardcoded as relative paths (starting with a single /) or fully qualified, trusted absolute URLs.

Risk Information
cvss4
Base: 7.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.

Risk Information
cvss4
Base: 8.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream OID-based security decisions. This issue has been patched in version 1.3.2.

Risk Information
cvss4
Base: 6.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, working with large buffers in Lua scripts can lead to a stack overflow. Users of Lua rules and output scripts may be affected when working with large buffers. This includes a rule passing a large buffer to a Lua script. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves disabling Lua rules and output scripts, or making sure limits, such as stream.depth.reassembly and HTTP response body limits (response-body-limit), are set to less than half the stack size.

Risk Information
cvss3
Base: 7.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Description

Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. In versions from 8.0.0 to before 8.0.2, a NULL dereference can occur when the entropy keyword is used in conjunction with base64_data. This issue has been patched in version 8.0.2. A workaround involves disabling rules that use entropy in conjunction with base64_data.

Risk Information
cvss3
Base: 7.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=salesloft' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge