Company Details
salesloft
1,182
118,230
5112
salesloft.com
0
SAL_7799328
In-progress

Salesloft Company CyberSecurity Posture
salesloft.comSalesloft powers durable revenue growth for the world’s most demanding companies. Salesloft’s industry-leading Revenue Orchestration Platform uses purpose-built AI to help market-facing teams prioritize and take action on what matters most, from first touch to upsell and renewal. More than 5,000 customers including Google, 3M, IBM, Shopify, Square, and Cisco gain a performance force multiplier with Salesloft by shifting to a durable revenue engagement model, helping them solve the complexities of modern B2B sales and unlock revenue efficiency.
Company Details
salesloft
1,182
118,230
5112
salesloft.com
0
SAL_7799328
In-progress
Between 0 and 549

Salesloft Global Score (TPRM)XXXX

Description: The cybercriminal group **Scattered Lapsus$ Hunters** breached **Salesloft/Salesforce** and exfiltrated sensitive corporate data, which they threatened to leak publicly. Despite law enforcement (FBI and French authorities) seizing the domains (*breachforums.hn* and its Tor counterpart) used by the group to host the stolen files, the attackers swiftly restored access via alternative channels. The leaked data included proprietary and potentially confidential information from **Salesloft/Salesforce**, alongside files from over **40 other major companies** (e.g., Qantas, Gap, Toyota, Disney). The breach underscores the group’s persistence in extortion and data exposure, even after infrastructure disruptions. While no arrests were made, the incident highlights the escalating risks of **third-party vendor breaches** and the challenges in mitigating **large-scale data leaks** once threat actors gain initial access. The group’s shift from traditional forums to **Telegram** for operations further complicates tracking and enforcement efforts.
Description: Attackers exploited stolen OAuth tokens from the **Salesloft Drift** app—a third-party sales automation tool integrated with **Salesforce**—to gain unauthorized access to Salesforce databases between **August 8 and 18**. The threat actors (tracked as **UNC6395**) executed queries targeting sensitive Salesforce objects, including **cases, accounts, users, and opportunities**, with a primary focus on stealing credentials such as **AWS access keys, passwords, and Snowflake-related tokens**. The breach forced Salesloft and Salesforce to **revoke all active access and refresh tokens**, disrupting integrations and requiring IT admins to re-authenticate connections. Salesforce temporarily **removed Drift from its AppExchange** pending security validation. While the attack did not directly compromise **Google Cloud Platform (GCP)**, affected organizations were urged to **audit Salesforce objects for exposed secrets**, rotate credentials, and revoke compromised API keys. **Google Threat Intelligence Group (GTIG)** confirmed **data exfiltration**, warning that **Salesforce data should be considered compromised**. The incident highlights risks in third-party OAuth integrations, where stolen tokens enable lateral movement into core enterprise systems like Salesforce, exposing **customer leads, contact details, and authentication secrets** to malicious actors.
Description: In August 2025, hackers breached **Salesloft’s SaaS platform** by stealing **OAuth access tokens** linked to its **Drift chatbot integration with Salesforce**. The attackers exploited these tokens—functioning as trusted non-human identities—to impersonate the integration and gain unauthorized access to **Salesforce CRM data across hundreds of organizations**. Over a **10-day campaign**, they exfiltrated sensitive records, including **stored credentials like AWS keys and Snowflake tokens** from support case attachments. The breach highlighted the risks of **unmonitored machine identities** with excessive privileges, enabling large-scale data theft without traditional human account compromises.
Description: The attack on **Salesloft** began with the compromise of an internal **GitHub repository**, where attackers stole a high-privilege **OAuth token** granting access to its **Drift cloud application**. Exploiting Drift’s trusted integrations, the attackers pivoted to **Salesforce instances** of multiple high-profile customers—including **Palo Alto Networks, Cloudflare, Zscaler, and Tenable**—exfiltrating **customer conversation data, contact details, and sensitive business information**. The breach exposed a **supply-chain vulnerability**, where a single compromised AI-powered integration (Drift’s chatbot) enabled mass data theft across **700+ organizations**, including cybersecurity leaders. The attackers also harvested **OpenAI API credentials**, demonstrating the cascading risks of interconnected AI ecosystems. While companies like **Okta** mitigated damage via **IP allow-listing**, others faced **reputational harm, forensic costs, and erosion of customer trust**. The incident highlighted critical gaps in **third-party risk management, token security, and AI integration monitoring**, with long-term implications for enterprise security postures.
Description: The **Salesloft breach** originated from a compromise where threat actors stole **Salesforce Drift tokens**, enabling unauthorized access to Salesforce and Cloudflare systems, along with other connected enterprises. This **supply chain attack** cascaded across multiple organizations, exposing sensitive data and raising concerns about third-party risk management. The breach exploited vendor vulnerabilities, highlighting gaps in **MSSP threat preparedness** and **external threat visibility**. While the exact data compromised was not detailed, the incident involved **large-scale credential theft** and **unauthorized system access**, potentially affecting customer and operational data across dependent enterprises. The attack underscored the risks of **shadow integrations** and **unpatched third-party exposures**, emphasizing the need for real-time monitoring and autonomous risk assessment in supply chains.
Description: The **Salesloft breach (August 8–18, 2025)** was a sophisticated **supply chain attack** targeting its **GitHub account and OAuth tokens** linked to the **Drift chatbot integration**. Exploiting these tokens, attackers bypassed multi-factor authentication (MFA) and gained unauthorized access to **over 700 organizations**, including major cybersecurity firms like **Cloudflare, Palo Alto Networks, and Google**. The breach involved **automated data exfiltration** using Python tools, deletion of query logs to evade detection, and compromise of **Salesforce instances**, exposing **customer relationship data, support case details, and sensitive credentials** (API keys, passwords). The incident triggered **class-action lawsuits**, regulatory scrutiny (GDPR/CCPA), and highlighted critical gaps in **third-party integration security, OAuth governance, and cross-platform data visibility**. The attack underscored risks in **SaaS ecosystems**, where interconnected platforms amplify exposure to **fourth/fifth-party vulnerabilities** and **zero-trust failures**.
Description: Salesloft suffered a breach in March 2024 when hackers (linked to **UNC6395/ShinyHunters**) compromised its **GitHub account**, conducting reconnaissance for three months before stealing **authentication tokens** (including OAuth tokens for **Drift’s AI/chatbot platform**). These tokens were then used in a **supply-chain attack**, granting access to **Salesloft’s AWS environment** and **customer systems** (e.g., **Bugcrowd, Cloudflare, Google, Palo Alto Networks, Proofpoint, Tenable**). The attackers targeted **Salesforce instances**, exfiltrating sensitive data from **support tickets**, including **AWS access keys, passwords, and Snowflake-related tokens**. The breach enabled credential theft for extortion, with victims contacted privately. Salesloft took **six months to detect** the intrusion, raising concerns about its security posture. While the incident is now contained, the attack exposed **customer integration ecosystems**, risking downstream breaches across high-profile tech firms. The hackers’ focus on **credential harvesting** suggests potential for further exploitation of compromised systems.
Description: Salesloft, a sales engagement platform leveraging AI chatbots (Drift) and deep Salesforce integrations, suffered a large-scale breach orchestrated by the **Scattered Lapsus$ Hunters** group. The attack began in late 2024 via **voice phishing (vishing)**, tricking employees into installing malicious Salesforce integrations, granting API-level access to corporate data. By mid-2025, attackers compromised Salesloft’s **GitHub repository**, extracting credentials and AWS OAuth tokens used by clients for third-party integrations. These tokens enabled **lateral movement** across systems, culminating in mass data exfiltration from Salesloft Drift customers by August 2025. On **October 3, 2025**, the group launched a **Tor-based extortion portal**, publicly listing victims and stolen data volumes, demanding ransom payments by **October 10** to prevent leaks. The breach exposed **sensitive CRM data**—customer leads, deal details, and operational intelligence—via abused integrations and token theft. While Salesforce’s core platform remained unbreached, the attack exploited **integration vulnerabilities** and poor credential hygiene, highlighting risks in SaaS ecosystems. The incident underscores the shift toward **ransomware-as-a-service (RaaS)**, with the group monetizing stolen data through extortion rather than encryption.


Salesloft has 1263.64% more incidents than the average of same-industry companies with at least one recorded incident.
Salesloft has 837.5% more incidents than the average of all companies with at least one recorded incident.
Salesloft reported 6 incidents this year: 0 cyber attacks, 0 ransomware, 0 vulnerabilities, 6 data breaches, compared to industry peers with at least 1 incident.
Salesloft cyber incidents detection timeline including parent company and subsidiaries

Salesloft powers durable revenue growth for the world’s most demanding companies. Salesloft’s industry-leading Revenue Orchestration Platform uses purpose-built AI to help market-facing teams prioritize and take action on what matters most, from first touch to upsell and renewal. More than 5,000 customers including Google, 3M, IBM, Shopify, Square, and Cisco gain a performance force multiplier with Salesloft by shifting to a durable revenue engagement model, helping them solve the complexities of modern B2B sales and unlock revenue efficiency.


Tencent is a world-leading internet and technology company that develops innovative products and services to improve the quality of life of people around the world. Founded in 1998 with its headquarters in Shenzhen, China, Tencent's guiding principle is to use technology for good. Our communication

NiCE is transforming the world with AI that puts people first. Our purpose-built AI-powered platforms automate engagements into proactive, safe, intelligent actions, empowering individuals and organizations to innovate and act, from interaction to resolution. Trusted by organizations throughout 150

Rakuten Group, Inc. (TSE: 4755) is a global technology leader in services that empower individuals, communities, businesses and society. Founded in Tokyo in 1997 as an online marketplace, Rakuten has expanded to offer services in e-commerce, fintech, digital content and communications to 2 billion m

Wolt is a Helsinki-based technology company with a mission to bring joy, simplicity and earnings to the neighborhoods of the world. Wolt develops a local commerce platform that connects people looking to order food, groceries, and other goods with people interested in selling and delivering them. Wo
A problem isn't truly solved until it's solved for all. Googlers build products that help create opportunities for everyone, whether down the street or across the globe. Bring your insight, imagination and a healthy disregard for the impossible. Bring everything that makes you unique. Together, we c

About Lazada Group Founded in 2012, Lazada Group is the leading eCommerce platform in Southeast Asia. We are accelerating progress in Indonesia, Malaysia, the Philippines, Singapore, Thailand and Vietnam through commerce and technology. With the largest logistics and payments networks in the regio

JD.com, also known as JINGDONG, is a leading e-commerce company transferring to be a technology and service enterprise with supply chain at its core. JD.com’s business has expanded across retail, technology, logistics, health, property development, industrials, and international business. Ranking 44

Nielsen shapes the world’s media and content as a global leader in audience insights, data and analytics. Through our understanding of people and their behaviors across all channels and platforms, we empower our clients with independent and actionable intelligence so they can connect and engage with

GlobalLogic, a Hitachi Group company, is a trusted partner in design, data, and digital engineering for the world’s largest and most innovative companies. Since our inception in 2000, we have been at the forefront of the digital revolution, helping to create some of the most widely used digital prod
.png)
Salesforce failed to address the massive wave of OAuth breaches at its Dreamforce conference, but securing third-party authentication is...
Discover what the Salesloft breach reveals about OAuth token abuse, hidden trust risks, and how to contain threats before they spread.
Okta thwarted the supply-chain attack with security controls it had in place. Zscaler did not. Their experiences provide insights into the...
Scattered Lapsus$ Hunters has launched an unusual crowdsourced extortion scheme, offering $10 in Bitcoin to anyone willing to help pressure...
In August 2025, sales automation platform Salesloft issued an alert that it had detected a “security issue” in Drift – the AI chatbot used...
The Salesloft-Drift breach wasn't just another data breach - it revealed how interconnected AI tools create cascading vulnerabilities across...
In the shadowy world of cybercrime, a group known as ShinyHunters has thrust Salesforce into the spotlight with audacious claims of...
Threat actors behind a spate of attacks on Salesloft Drift claim to have stolen over 1.5 billion records, according to reports.
SolarWinds Corporation has released an official security advisory in response to a significant data breach involving Salesforce systems.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Salesloft is https://salesloft.com.
According to Rankiteo, Salesloft’s AI-generated cybersecurity score is 284, reflecting their Critical security posture.
According to Rankiteo, Salesloft currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Salesloft is not certified under SOC 2 Type 1.
According to Rankiteo, Salesloft does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Salesloft is not listed as GDPR compliant.
According to Rankiteo, Salesloft does not currently maintain PCI DSS compliance.
According to Rankiteo, Salesloft is not compliant with HIPAA regulations.
According to Rankiteo,Salesloft is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Salesloft operates primarily in the Software Development industry.
Salesloft employs approximately 1,182 people worldwide.
Salesloft presently has no subsidiaries across any sectors.
Salesloft’s official LinkedIn profile has approximately 118,230 followers.
Salesloft is classified under the NAICS code 5112, which corresponds to Software Publishers.
No, Salesloft does not have a profile on Crunchbase.
Yes, Salesloft maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/salesloft.
As of November 27, 2025, Rankiteo reports that Salesloft has experienced 8 cybersecurity incidents.
Salesloft has an estimated 26,565 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach and Ransomware.
Total Financial Loss: The total financial loss from these incidents is estimated to be $0.
Detection and Response: The company detects and responds to cybersecurity incidents through an third party assistance with google threat intelligence group (gtig), and containment measures with revoked all active oauth access and refresh tokens, containment measures with removed drift app from salesforce appexchange, and remediation measures with re-authentication of drift-salesforce connections, remediation measures with review of salesforce objects for sensitive data, remediation measures with revocation of api keys, remediation measures with credential rotation, and communication strategy with direct notifications to affected customers, communication strategy with public advisories from salesloft and gtig, communication strategy with indicators of compromise (iocs) shared with admins, and enhanced monitoring with advisory to monitor salesforce objects for malicious activity, and incident response plan activated with yes (with assistance from google’s mandiant), and third party assistance with google’s mandiant (incident response unit), and containment measures with isolation of compromised github account, containment measures with revocation of stolen tokens, containment measures with restoration of salesforce integration, and recovery measures with salesforce integration restored (as of august 2024), and communication strategy with public disclosure via data breach page, communication strategy with media statements, and and third party assistance with cybersecurity firms (e.g., cloudflare, palo alto networks), third party assistance with legal counsel, third party assistance with forensic investigators, and containment measures with oauth token revocation, containment measures with disabling compromised integrations, containment measures with isolating affected systems, and remediation measures with token lifecycle management enhancements, remediation measures with zero-trust access controls for third-party integrations, remediation measures with expanded monitoring of oauth activity, and recovery measures with restoration of affected salesforce instances, recovery measures with customer notification and support, recovery measures with legal hold procedures for ediscovery, and communication strategy with public disclosure (via haystackid/complexdiscovery), communication strategy with customer advisories, communication strategy with regulatory notifications, and network segmentation with isolation of compromised saas integrations, and enhanced monitoring with real-time oauth token activity monitoring, enhanced monitoring with anomalous api call detection, and incident response plan activated with forensic investigations, incident response plan activated with customer notifications, incident response plan activated with integration audits, and third party assistance with likely (not specified), and containment measures with token revocation, containment measures with access restrictions, containment measures with ip allow-listing (okta), and remediation measures with credential rotation, remediation measures with integration lifecycle reviews, remediation measures with security control enhancements, and recovery measures with system restorations, recovery measures with customer trust rebuilding, and communication strategy with public disclosures, communication strategy with customer advisories, communication strategy with transparency reports, and network segmentation with recommended for ai applications, and enhanced monitoring with ai behavior baselining, enhanced monitoring with anomaly detection for data access patterns, and remediation measures with enforcing api permission controls, remediation measures with auditing third-party integrations, remediation measures with multi-factor authentication (mfa) enforcement, remediation measures with sanitizing development repositories, and and containment measures with domain seizure (breachforums.hn, tor site), containment measures with fbi/french authorities intervention, and incident response plan activated with partial (5,000 user credentials rotated, but nhi token overlooked), and and and containment measures with token revocation (post-incident), containment measures with token revocation (post-discovery of compromise), and and and and and and and and third party assistance with riskprofiler (ai-powered tprm solutions), and remediation measures with ai-powered third-party risk monitoring, remediation measures with autonomous attack path mapping, remediation measures with streamlined third-party risk questionnaires, remediation measures with real-time vendor portfolio breach detection, remediation measures with prioritized threat alerts for fast response, and communication strategy with advisories on proactive third-party risk management, communication strategy with mssp-focused mitigation guidance, and enhanced monitoring with continuous vendor security posture monitoring, enhanced monitoring with ai-driven anomaly detection..
Title: Salesforce-related breaches via stolen OAuth tokens from Salesloft Drift app
Description: Attackers stole OAuth tokens from the third-party Salesloft Drift app, which integrates with Salesforce databases, to access sensitive Salesforce data. The campaign is separate from other high-profile Salesforce breaches attributed to ShinyHunters (UNC6240). The attackers (UNC6395) focused on stealing credentials, including AWS access keys, passwords, and Snowflake-related tokens. Salesloft and Google Threat Intelligence Group (GTIG) revoked all active tokens and removed Drift from Salesforce AppExchange pending investigation. Affected organizations were advised to review Salesforce objects for compromised data, revoke API keys, and rotate credentials.
Type: data breach
Attack Vector: stolen OAuth tokenssocial engineering (in separate but related incidents)
Vulnerability Exploited: Weakness in OAuth token security (Drift app integration with Salesforce)
Threat Actor: UNC6395 (for Salesloft Drift incidents)ShinyHunters (UNC6240) (for separate Salesforce incidents)
Motivation: credential theftdata exfiltrationpotential financial gain
Title: Salesloft GitHub Account Breach Leading to Supply Chain Attack on Major Tech Customers
Description: Salesloft disclosed a breach of its GitHub account in March 2024, where hackers stole authentication tokens later used in a mass-hack targeting its big tech customers, including Bugcrowd, Cloudflare, Google, Proofpoint, Palo Alto Networks, and Tenable. The hackers, attributed to UNC6395 (potentially ShinyHunters), accessed Salesloft’s AWS cloud environment and Drift’s OAuth tokens, enabling unauthorized access to customer systems, including Salesforce instances. The primary objective was credential theft, focusing on AWS access keys, passwords, and Snowflake-related tokens. The intrusion went undetected for six months before containment in August 2024.
Date Detected: 2024-08-01T00:00:00Z
Date Publicly Disclosed: 2024-08-26T00:00:00Z
Date Resolved: 2024-08-26T00:00:00Z
Type: Supply Chain Attack
Attack Vector: Compromised GitHub AccountReconnaissance (March–June 2024)Stolen OAuth TokensAWS Cloud Environment Exploitation
Vulnerability Exploited: Improper GitHub Access ControlsLack of Timely Detection (6-month delay)OAuth Token Misuse
Threat Actor: UNC6395 (per Google Threat Intelligence Group)ShinyHunters (alleged)
Motivation: Credential TheftExtortionData Exfiltration
Title: Salesloft Drift Supply Chain Breach (2025)
Description: A sophisticated supply chain attack targeting Salesloft and Drift integrations, orchestrated by UNC6395 (GRUB1), compromised OAuth tokens to access hundreds of Salesforce instances. The breach exposed vulnerabilities in third-party integration security, affecting over 700 organizations, including major cybersecurity firms. Attackers used automated tools and anti-forensics techniques to extract data while evading detection for over two weeks (August 8–18, 2025). Initial access was gained via a compromised GitHub account between March and June 2025.
Date Detected: 2025-08-18
Type: Supply Chain Attack
Attack Vector: Compromised GitHub AccountOAuth Token AbuseThird-Party Integration ExploitationAutomated Python ToolsAnti-Forensics Techniques (Log Deletion)
Vulnerability Exploited: Weak OAuth Token ManagementLack of MFA for OAuth TokensInsufficient Third-Party Integration MonitoringInadequate Log Retention
Threat Actor: UNC6395GRUB1 (Cloudflare designation)
Motivation: Data ExfiltrationEspionagePotential Financial Gain (via dark web data sales)
Title: AI-Powered Supply Chain Attack via Compromised Salesloft-Drift Integration (2025)
Description: A sophisticated cyberattack began with the compromise of Salesloft's internal GitHub repository, where attackers stole an OAuth token granting privileged access to Salesloft's Drift account. This access was leveraged to exfiltrate data from connected Salesforce instances of over 700 organizations, including major cybersecurity firms like Cloudflare, Palo Alto Networks, and Zscaler. The breach exploited AI integrations' broad data access patterns and trust-based architectures, highlighting vulnerabilities in modern AI ecosystems. Okta was spared due to IP allow-listing controls.
Type: Supply Chain Attack
Attack Vector: Compromised GitHub RepositoryStolen OAuth TokenPrivilege Escalation via Drift IntegrationAI-Powered Data Exfiltration
Vulnerability Exploited: Improper Credential ManagementOver-Permissive API AccessLack of IP Restrictions on TokensInsufficient Integration Lifecycle Management
Motivation: Data TheftEspionageFinancial Gain (Potential)Supply Chain Disruption
Title: Scattered Lapsus$ Hunters Launches Extortionware Portal Targeting Salesforce Data via OAuth Token Theft
Description: The hacker collective Scattered Lapsus$ Hunters (a fusion of ShinyHunters, Scattered Spider, and Lapsus$) launched a dedicated leak website on the Tor network in October 2025, demanding ransom payments from victims to remove stolen Salesforce data. The attack originated in late 2024 via social engineering (vishing) to install malicious Salesforce integrations, followed by credential harvesting from Salesloft’s GitHub repository and OAuth token theft from its AWS environment. The group exfiltrated data from Salesforce and third-party integrations, leveraging lateral movement across systems. A ransom deadline of October 10, 2025, was set, marking an evolution into ransomware-as-a-service (RaaS) tactics.
Date Publicly Disclosed: 2025-10-03
Type: Data Breach
Attack Vector: Social Engineering (Vishing)Malicious Salesforce IntegrationsAPI ExploitationGitHub Credential HarvestingOAuth Token TheftLateral Movement via Cloud Environments (AWS)
Vulnerability Exploited: Poor Credential Hygiene (GitHub Repository)Over-Permissive API/OAuth Token AccessLack of Multi-Factor Authentication (MFA) EnforcementInsecure Third-Party Integration Controls
Threat Actor: Scattered Lapsus$ Hunters (fusion of ShinyHunters, Scattered Spider, and Lapsus$)
Motivation: Financial Gain (Extortion/Ransom)Data Theft for ResaleReputation DamageRaaS Monetization
Title: Law enforcement seizes domains used by Scattered Lapsus$ Hunters; Salesloft/Salesforce breach files leaked
Description: The domains used by Scattered Lapsus$ Hunters to host data leak websites were seized by law enforcement (FBI and French authorities) just as the group was preparing to leak files stolen in the Salesloft/Salesforce breach. Despite the takedown of clearnet domain (breachforums.hn) and Tor site, the latter was quickly restored, and files from over 40 companies—including Qantas, Gap, Vietnam Airlines, Toyota, Disney, McDonald’s, Ikea, and Adidas—were leaked. The group declared 'the era of forums is over' and announced a pivot to Telegram groups, citing FBI destruction of database backups (2023) and escrow databases as reasons for abandoning forums. No arrests were made.
Type: data breach
Attack Vector: data leak site hostingforum-based extortion
Threat Actor: Scattered Lapsus$ Hunters
Motivation: financial gainreputationdisruption
Title: ['Salesloft/Drift OAuth Token Breach (2025)', 'New York Times GitHub Token Leak (2024)', 'Cloudflare Atlassian Compromise (2023)']
Description: ["In August 2025, hackers breached Salesloft's SaaS platform and stole OAuth access tokens for its Drift chatbot integration with Salesforce. By hijacking these tokens (which function as a trusted non-human identity between Drift and Salesforce), the attackers were able to impersonate the integration and access Salesforce CRM data at hundreds of organizations. Over a ten-day campaign, they used this backdoor to query and exfiltrate sensitive records, even pulling stored credentials like AWS keys and Snowflake tokens from support case attachments.", "In January 2024, the New York Times suffered a breach not through a phished password or zero-day exploit, but via an exposed GitHub API token. Attackers discovered a token credential for the Times' cloud code repository, which had inadvertently been made public, and used it to access about 270 GB of internal source code and data. This token acted as a non-human identity with broad privileges, allowing direct repository access without any interactive login.", "The fallout from the 2023 Okta breach revealed the danger of orphaned and unrotated service credentials. Cloudflare, an Okta customer, had rotated some 5,000 user credentials after the incident. However, an overlooked non-human account (an API token tied to a service account) remained active. Attackers leveraged that one leftover token (with its associated service credentials) to gain access to Cloudflare's Atlassian suite (Jira, Confluence, Bitbucket), effectively bypassing the human password reset effort."]
Date Detected: 2025-082024-012023
Date Resolved: [None, None, None]
Type: Data Breach (OAuth Token Compromise)
Attack Vector: Compromised OAuth Tokens (Non-Human Identity)Exposed GitHub API Token (Non-Human Identity)Orphaned API Token (Non-Human Identity)
Vulnerability Exploited: Overprivileged OAuth TokensPublicly Exposed API TokenUnrotated Service Account Token
Motivation: Data ExfiltrationData TheftUnauthorized Access
Title: CloudFlare-Salesforce-Salesloft Third-Party Data Breach
Description: The breach originated from a Salesloft compromise where threat actors stole Salesforce Drift tokens, causing a large-scale compromise in Salesforce, Cloudflare, and several other organizations. This exploit later cascaded across major enterprises, resulting in third-party breaches. The incident highlights the risks of supply chain attacks and the importance of proactive third-party risk management for MSSPs (Managed Security Service Providers).
Type: third-party breach
Attack Vector: compromised vendor (Salesloft)stolen authentication tokens (Salesforce Drift)cascading supply chain exploitation
Vulnerability Exploited: weak token securitythird-party integration risksshadow IT (unapproved third-party tool integrations)
Common Attack Types: The most common types of attacks the company has faced is Breach.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Stolen OAuth tokens (Drift app integration with Salesforce), Salesloft GitHub Account, Compromised Salesloft GitHub Account (March–June 2025), Salesloft Internal GitHub Repository, Social Engineering (Vishing) → Malicious Salesforce Integrations, Compromised OAuth tokens (Drift-Salesforce integration)Exposed GitHub API token (public repository)Orphaned API token (Okta service account) and Salesloft compromise (token theft).

Data Compromised: Salesforce objects (cases, accounts, users, opportunities), Aws access keys, Passwords, Snowflake-related access tokens, Potential google cloud platform service account keys
Systems Affected: Salesforce databases (via Drift integration)Drift app
Operational Impact: revocation of OAuth tokensre-authentication required for Drift-Salesforce integrationsDrift app removed from Salesforce AppExchange
Brand Reputation Impact: potential reputational damage to Salesloft, Drift, and affected organizations
Identity Theft Risk: ['high (due to stolen credentials)']

Data Compromised: Authentication tokens (oauth), Aws access keys, Passwords, Snowflake-related tokens, Support ticket data (via salesforce)
Systems Affected: Salesloft GitHub AccountSalesloft AWS Cloud EnvironmentDrift’s AI/Chatbot PlatformCustomer Salesforce Instances (e.g., Bugcrowd, Cloudflare, Google, Proofpoint, Palo Alto Networks, Tenable)
Operational Impact: Disruption of Salesloft-Salesforce Integration (temporarily)Customer System Compromises
Brand Reputation Impact: Potential Loss of Trust Among High-Profile CustomersNegative Media Coverage
Identity Theft Risk: ['High (due to stolen credentials)']

Data Compromised: Customer relationship management (crm) data, Support case information, Sensitive credentials (api keys, passwords), Business communications
Systems Affected: Salesforce Instances (700+ organizations)Drift Chatbot IntegrationGitHub Account (initial compromise)
Operational Impact: Disruption of CRM and Support OperationsIncident Response Across Multiple VendorsLegal and Compliance Burden
Customer Complaints: ['Class-Action Lawsuits Filed (including against Salesforce)']
Brand Reputation Impact: Significant Reputational Damage to Salesloft, Drift, and Affected FirmsErosion of Trust in SaaS Supply Chain Security
Legal Liabilities: Multiple Class-Action LawsuitsPotential Regulatory Fines (GDPR, CCPA, etc.)Contractual Liability Disputes
Identity Theft Risk: ['High (due to exposed credentials and PII in support cases)']

Data Compromised: Customer conversation data, Contact information, Authentication tokens (including openai api credentials), Salesforce instance data
Systems Affected: Salesloft GitHub RepositoriesDrift Cloud ApplicationConnected Salesforce InstancesOpenAI API Integrations
Operational Impact: Forensic InvestigationsCustomer Trust ErosionIntegration AuditsSecurity Control Overhauls
Customer Complaints: ['Expected (Not Quantified)']
Brand Reputation Impact: Severe (Especially for Cybersecurity Firms)Loss of Customer TrustIncreased Scrutiny of AI Security Practices
Legal Liabilities: Potential Regulatory FinesContractual Breach ClaimsLitigation Risk
Identity Theft Risk: ['High (Due to PII in Conversation Data)']
Payment Information Risk: ['Low (Not Explicitly Mentioned)']

Data Compromised: Customer leads, Deal details, Confidential operational information, Oauth tokens, Third-party integration data
Systems Affected: Salesforce EnvironmentsSalesloft (Sales Engagement Platform)Drift AI ChatbotGitHub RepositoriesAWS Cloud Environments
Operational Impact: Unauthorized Data ExfiltrationPotential Business DisruptionLoss of Customer TrustRegulatory Scrutiny
Brand Reputation Impact: High (Public Extortion Portal, High-Profile Victims)
Identity Theft Risk: Moderate (PII in CRM Data)

Brand Reputation Impact: high (for affected companies)moderate (for Scattered Lapsus$ Hunters due to forum shutdown)
Identity Theft Risk: potential (due to leaked corporate data)

Data Compromised: Salesforce crm data (including aws keys and snowflake tokens from support case attachments), 270 gb of internal source code and data, Access to cloudflare's atlassian suite (jira, confluence, bitbucket)
Systems Affected: Salesforce CRM (via Drift integration)GitHub (New York Times' cloud code repository)Atlassian Suite (Jira, Confluence, Bitbucket)
Downtime: [None, None, None]
Operational Impact: Unauthorized access to CRM data across hundreds of organizationsExposure of internal source code and proprietary dataBypass of human password reset efforts, enabling stealthy backdoor access
Conversion Rate Impact: [None, None, None]
Revenue Loss: [None, None, None]
Customer Complaints: [None, None, None]
Brand Reputation Impact: Potential reputational damage due to unauthorized CRM data accessReputational risk from exposure of internal source codeReputational impact from unauthorized access to Atlassian suite
Identity Theft Risk: ['High (AWS keys and Snowflake tokens exposed)', 'Moderate (internal credentials potentially exposed in source code)', 'Moderate (potential access to sensitive Atlassian data)']
Payment Information Risk: [None, None, None]

Data Compromised: Authentication tokens (salesforce drift), Potential customer data (via cascading breaches)
Systems Affected: SalesforceCloudflaremultiple unnamed enterprises
Operational Impact: disrupted trust in MSSP threat preparednesspotential operational disruptions for affected organizations
Brand Reputation Impact: eroded confidence in supply chain securityquestions about MSSP reliability
Average Financial Loss: The average financial loss per incident is $0.00.
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Credentials (Aws Access Keys, Passwords), Snowflake Access Tokens, Salesforce Object Data (Cases, Accounts, Users, Opportunities), Potential Gcp Service Account Keys, , Authentication Tokens (Oauth), Aws Access Keys, Passwords, Snowflake Access Tokens, Support Ticket Data, , Crm Data, Support Case Records, Credentials (Api Keys, Passwords), Business Communications, , Customer Conversation Logs, Contact Information, Api Credentials, Salesforce Data, , Crm Data (Customer Leads, Deal Details), Oauth Tokens, Credentials/Access Keys, Operational Confidential Information, , Corporate Files, Potentially Pii (Unspecified), , Crm Data (Salesforce), Aws Keys, Snowflake Tokens, Internal Source Code (270 Gb), Proprietary Data, Atlassian Suite Data (Jira, Confluence, Bitbucket), , Authentication Tokens (Salesforce Drift), Potential Cascading Data Exposure and .

Entity Name: Salesloft (Drift)
Entity Type: SaaS (Sales Engagement Platform)
Industry: Technology (Sales Automation)
Customers Affected: Organizations using Drift integrated with Salesforce

Entity Name: Salesforce
Entity Type: CRM Platform
Industry: Technology
Customers Affected: Customers using Drift-Salesforce integration

Entity Name: Google (via Google Cloud Platform)
Entity Type: Technology
Industry: Cloud Computing
Customers Affected: Potential exposure of GCP service account keys in Salesforce objects

Entity Name: Affected Salesforce-Drift customers (e.g., unnamed organizations)

Entity Name: Salesloft
Entity Type: SaaS Company
Industry: Sales Engagement Platform
Location: Atlanta, Georgia, USA
Customers Affected: Multiple (including Bugcrowd, Cloudflare, Google, Proofpoint, Palo Alto Networks, Tenable, and others)

Entity Name: Drift
Entity Type: Subsidiary/Platform
Industry: AI and Chatbot-Powered Marketing
Customers Affected: Indirectly via Salesloft Breach

Entity Name: Bugcrowd
Entity Type: Customer
Industry: Cybersecurity (Crowdsourced Security Testing)

Entity Name: Cloudflare
Entity Type: Customer
Industry: Web Infrastructure and Security

Entity Name: Google
Entity Type: Customer
Industry: Technology

Entity Name: Proofpoint
Entity Type: Customer
Industry: Cybersecurity (Email Security)

Entity Name: Palo Alto Networks
Entity Type: Customer
Industry: Cybersecurity

Entity Name: Tenable
Entity Type: Customer
Industry: Cybersecurity (Vulnerability Management)

Entity Name: Salesloft
Entity Type: SaaS Provider
Industry: Sales Engagement Platform
Location: Atlanta, Georgia, USA
Customers Affected: 700+ organizations

Entity Name: Drift
Entity Type: SaaS Provider
Industry: Conversational Marketing/Chatbot
Location: Boston, Massachusetts, USA

Entity Name: Cloudflare
Entity Type: Cybersecurity Firm
Industry: Web Infrastructure Security
Location: San Francisco, California, USA

Entity Name: Palo Alto Networks
Entity Type: Cybersecurity Firm
Industry: Network Security
Location: Santa Clara, California, USA

Entity Name: Zscaler
Entity Type: Cybersecurity Firm
Industry: Cloud Security
Location: San Jose, California, USA

Entity Name: Google
Entity Type: Tech Giant
Industry: Search/Cloud Services
Location: Mountain View, California, USA

Entity Name: Proofpoint
Entity Type: Cybersecurity Firm
Industry: Email Security
Location: Sunnyvale, California, USA

Entity Name: SpyCloud
Entity Type: Cybersecurity Firm
Industry: Identity Protection
Location: Austin, Texas, USA

Entity Name: Tanium
Entity Type: Cybersecurity Firm
Industry: Endpoint Security
Location: Emeryville, California, USA

Entity Name: Tenable
Entity Type: Cybersecurity Firm
Industry: Vulnerability Management
Location: Columbia, Maryland, USA

Entity Name: Salesforce
Entity Type: SaaS Provider
Industry: Customer Relationship Management (CRM)
Location: San Francisco, California, USA
Customers Affected: 700+ organizations (via integrated instances)

Entity Name: Salesloft
Entity Type: SaaS Provider
Industry: Sales Engagement Platform
Customers Affected: 700+ (Indirectly via Drift Integration)

Entity Name: Drift
Entity Type: SaaS Provider
Industry: Conversational Marketing/AI Chatbots
Customers Affected: 700+ (Directly via Salesforce Integrations)

Entity Name: Cloudflare
Entity Type: Public Company
Industry: Cybersecurity/Web Infrastructure

Entity Name: Palo Alto Networks
Entity Type: Public Company
Industry: Cybersecurity

Entity Name: Zscaler
Entity Type: Public Company
Industry: Cybersecurity/Cloud Security

Entity Name: Tenable
Entity Type: Public Company
Industry: Cybersecurity/Vulnerability Management

Entity Name: Proofpoint
Entity Type: Public Company
Industry: Cybersecurity/Email Security

Entity Name: SpyCloud
Entity Type: Private Company
Industry: Cybersecurity/Identity Protection

Entity Name: Okta
Entity Type: Public Company
Industry: Identity Management
Customers Affected: 0 (Attack Attempted but Blocked)

Entity Name: Salesloft
Entity Type: Private Company
Industry: Sales Engagement/CRM Software
Customers Affected: Multiple (via Salesforce Integrations)

Entity Name: Google
Entity Type: Public Company
Industry: Technology/Cloud Services
Location: Global
Size: Large

Entity Name: Cisco
Entity Type: Public Company
Industry: Networking/IT
Location: Global
Size: Large

Entity Name: Unnamed Salesforce Customers

Entity Name: Salesloft
Entity Type: company
Industry: sales engagement software

Entity Name: Salesforce
Entity Type: company
Industry: cloud-based CRM

Entity Name: Qantas
Entity Type: company
Industry: aviation
Location: Australia

Entity Name: Gap
Entity Type: company
Industry: retail (apparel)
Location: United States

Entity Name: Vietnam Airlines
Entity Type: company
Industry: aviation
Location: Vietnam

Entity Name: Toyota
Entity Type: company
Industry: automotive
Location: Japan

Entity Name: Disney
Entity Type: company
Industry: entertainment
Location: United States

Entity Name: McDonald’s
Entity Type: company
Industry: fast food
Location: United States

Entity Name: Ikea
Entity Type: company
Industry: retail (furniture)
Location: Sweden/Netherlands

Entity Name: Adidas
Entity Type: company
Industry: retail (sporting goods)
Location: Germany

Entity Name: Salesloft
Entity Type: SaaS Platform
Industry: Sales Engagement/CRM
Customers Affected: Hundreds of organizations (via Salesforce CRM access)

Entity Name: Drift
Entity Type: Chatbot Integration
Industry: Conversational Marketing

Entity Name: Salesforce (via Drift integration)
Entity Type: CRM Platform
Industry: Customer Relationship Management
Customers Affected: Hundreds of organizations

Entity Name: The New York Times
Entity Type: Media Organization
Industry: News/Publishing
Location: New York, USA

Entity Name: GitHub (New York Times' repository)
Entity Type: Code Hosting Platform
Industry: Software Development

Entity Name: Cloudflare
Entity Type: Web Infrastructure/Security
Industry: Cybersecurity/CDN

Entity Name: Atlassian (Jira, Confluence, Bitbucket)
Entity Type: Collaboration/DevOps Tools
Industry: Software Development

Entity Name: Salesloft
Entity Type: vendor/third-party
Industry: sales engagement platform

Entity Name: Salesforce
Entity Type: CRM platform
Industry: cloud computing/enterprise software

Entity Name: Cloudflare
Entity Type: web infrastructure/security
Industry: cybersecurity/CDN

Entity Name: Multiple unnamed enterprises
Entity Type: various industries
Location: global

Incident Response Plan Activated: True
Third Party Assistance: Google Threat Intelligence Group (Gtig).
Containment Measures: revoked all active OAuth access and refresh tokensremoved Drift app from Salesforce AppExchange
Remediation Measures: re-authentication of Drift-Salesforce connectionsreview of Salesforce objects for sensitive datarevocation of API keyscredential rotation
Communication Strategy: direct notifications to affected customerspublic advisories from Salesloft and GTIGindicators of compromise (IOCs) shared with admins
Enhanced Monitoring: advisory to monitor Salesforce objects for malicious activity

Incident Response Plan Activated: Yes (with assistance from Google’s Mandiant)
Third Party Assistance: Google’S Mandiant (Incident Response Unit).
Containment Measures: Isolation of Compromised GitHub AccountRevocation of Stolen TokensRestoration of Salesforce Integration
Recovery Measures: Salesforce Integration Restored (as of August 2024)
Communication Strategy: Public Disclosure via Data Breach PageMedia Statements

Incident Response Plan Activated: True
Third Party Assistance: Cybersecurity Firms (E.G., Cloudflare, Palo Alto Networks), Legal Counsel, Forensic Investigators.
Containment Measures: OAuth Token RevocationDisabling Compromised IntegrationsIsolating Affected Systems
Remediation Measures: Token Lifecycle Management EnhancementsZero-Trust Access Controls for Third-Party IntegrationsExpanded Monitoring of OAuth Activity
Recovery Measures: Restoration of Affected Salesforce InstancesCustomer Notification and SupportLegal Hold Procedures for eDiscovery
Communication Strategy: Public Disclosure (via HaystackID/ComplexDiscovery)Customer AdvisoriesRegulatory Notifications
Network Segmentation: ['Isolation of Compromised SaaS Integrations']
Enhanced Monitoring: Real-Time OAuth Token Activity MonitoringAnomalous API Call Detection

Incident Response Plan Activated: ['Forensic Investigations', 'Customer Notifications', 'Integration Audits']
Third Party Assistance: Likely (Not Specified).
Containment Measures: Token RevocationAccess RestrictionsIP Allow-Listing (Okta)
Remediation Measures: Credential RotationIntegration Lifecycle ReviewsSecurity Control Enhancements
Recovery Measures: System RestorationsCustomer Trust Rebuilding
Communication Strategy: Public DisclosuresCustomer AdvisoriesTransparency Reports
Network Segmentation: ['Recommended for AI Applications']
Enhanced Monitoring: AI Behavior BaseliningAnomaly Detection for Data Access Patterns

Remediation Measures: Enforcing API Permission ControlsAuditing Third-Party IntegrationsMulti-Factor Authentication (MFA) EnforcementSanitizing Development Repositories

Containment Measures: domain seizure (breachforums.hn, Tor site)FBI/French authorities intervention

Incident Response Plan Activated: [None, None, 'Partial (5,000 user credentials rotated, but NHI token overlooked)']
Containment Measures: Token revocation (post-incident)Token revocation (post-discovery of compromise)
Adaptive Behavioral WAF: [None, None, None]
On-Demand Scrubbing Services: [None, None, None]
Network Segmentation: [None, None, None]

Third Party Assistance: Riskprofiler (Ai-Powered Tprm Solutions).
Remediation Measures: AI-powered third-party risk monitoringautonomous attack path mappingstreamlined third-party risk questionnairesreal-time vendor portfolio breach detectionprioritized threat alerts for fast response
Communication Strategy: advisories on proactive third-party risk managementMSSP-focused mitigation guidance
Enhanced Monitoring: continuous vendor security posture monitoringAI-driven anomaly detection
Incident Response Plan: The company's incident response plan is described as Yes (with assistance from Google’s Mandiant), , Forensic Investigations, Customer Notifications, Integration Audits, , Partial (5,000 user credentials rotated, but NHI token overlooked), .
Third-Party Assistance: The company involves third-party assistance in incident response through Google Threat Intelligence Group (GTIG), , Google’s Mandiant (Incident Response Unit), , Cybersecurity Firms (e.g., Cloudflare, Palo Alto Networks), Legal Counsel, Forensic Investigators, , Likely (Not Specified), , , RiskProfiler (AI-powered TPRM solutions), .

Type of Data Compromised: Credentials (aws access keys, passwords), Snowflake access tokens, Salesforce object data (cases, accounts, users, opportunities), Potential gcp service account keys
Sensitivity of Data: high (credentials, access tokens, business-critical Salesforce data)

Type of Data Compromised: Authentication tokens (oauth), Aws access keys, Passwords, Snowflake access tokens, Support ticket data
Sensitivity of Data: High (credentials, access tokens, potentially PII in support tickets)
Data Exfiltration: Yes
Personally Identifiable Information: Potentially (via support tickets)

Type of Data Compromised: Crm data, Support case records, Credentials (api keys, passwords), Business communications
Sensitivity of Data: High (includes PII, credentials, and proprietary business data)

Type of Data Compromised: Customer conversation logs, Contact information, Api credentials, Salesforce data
Sensitivity of Data: High (PII, Business Communications, Authentication Tokens)
Data Exfiltration: Confirmed (Systematic via Salesforce Integrations)
File Types Exposed: Conversation LogsContact DatabasesAPI TokensPotentially Calendar/Email Data
Personally Identifiable Information: NamesEmail AddressesPotentially Phone NumbersBusiness Roles

Type of Data Compromised: Crm data (customer leads, deal details), Oauth tokens, Credentials/access keys, Operational confidential information
Sensitivity of Data: High (Business-Critical CRM Data, Authentication Tokens)
Data Exfiltration: Yes (Mass Data Extraction via OAuth Tokens)
Personally Identifiable Information: Likely (Customer Data in CRM)

Type of Data Compromised: Corporate files, Potentially pii (unspecified)
Sensitivity of Data: high (corporate proprietary data)
Personally Identifiable Information: potential (not confirmed)

Type of Data Compromised: Crm data (salesforce), aws keys, snowflake tokens, Internal source code (270 gb), proprietary data, Atlassian suite data (jira, confluence, bitbucket)
Number of Records Exposed: None, None, None
Sensitivity of Data: High (credentials, CRM data)High (source code, internal data)High (Atlassian suite data)
Data Exfiltration: Yes (sensitive records, credentials)Yes (270 GB of data)Likely (unauthorized access to Atlassian data)
Data Encryption: [None, None, None]
File Types Exposed: CRM records, support case attachments (containing credentials)Source code files, internal documentationJira tickets, Confluence pages, Bitbucket repositories
Personally Identifiable Information: Possible (via CRM data)Possible (in source code/comments)Possible (in Atlassian data)

Type of Data Compromised: Authentication tokens (salesforce drift), Potential cascading data exposure
Sensitivity of Data: high (authentication credentials)
Data Exfiltration: tokens stolen; potential downstream data access
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: re-authentication of Drift-Salesforce connections, review of Salesforce objects for sensitive data, revocation of API keys, credential rotation, , Token Lifecycle Management Enhancements, Zero-Trust Access Controls for Third-Party Integrations, Expanded Monitoring of OAuth Activity, , Credential Rotation, Integration Lifecycle Reviews, Security Control Enhancements, , Enforcing API Permission Controls, Auditing Third-Party Integrations, Multi-Factor Authentication (MFA) Enforcement, Sanitizing Development Repositories, , , AI-powered third-party risk monitoring, autonomous attack path mapping, streamlined third-party risk questionnaires, real-time vendor portfolio breach detection, prioritized threat alerts for fast response, .
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by revoked all active oauth access and refresh tokens, removed drift app from salesforce appexchange, , isolation of compromised github account, revocation of stolen tokens, restoration of salesforce integration, , oauth token revocation, disabling compromised integrations, isolating affected systems, , token revocation, access restrictions, ip allow-listing (okta), , domain seizure (breachforums.hn, tor site), fbi/french authorities intervention, , token revocation (post-incident), token revocation (post-discovery of compromise) and .

Data Exfiltration: True

Data Exfiltration: Yes (credential theft focus)

Data Exfiltration: True

Data Exfiltration: ['Confirmed (But Not Ransomware-Related)']

Ransom Demanded: Yes (Extortion via Tor Leak Site)
Data Encryption: No (Extortion-Based, Not Encryption)
Data Exfiltration: Yes

Data Exfiltration: True

Ransom Demanded: [None, None, None]
Data Encryption: [None, None, None]
Data Exfiltration: ['Yes', 'Yes', 'Likely']
Data Recovery from Ransomware: The company recovers data encrypted by ransomware through Salesforce Integration Restored (as of August 2024), , Restoration of Affected Salesforce Instances, Customer Notification and Support, Legal Hold Procedures for eDiscovery, , System Restorations, Customer Trust Rebuilding, , .

Regulations Violated: Potential GDPR (EU), CCPA (California), Industry-Specific Data Protection Laws,
Legal Actions: Class-Action Lawsuits (e.g., against Salesforce), Regulatory Investigations (Expected),
Regulatory Notifications: Ongoing (GDPR, CCPA, etc.)

Regulations Violated: Potential GDPR (for EU Customer Data), CCPA (for California Residents), Industry-Specific Compliance Standards,
Legal Actions: Expected (Not Yet Filed),
Regulatory Notifications: Likely Required (Not Confirmed)

Legal Actions: domain seizures by FBI/French authorities,

Fines Imposed: [None, None, None]
Legal Actions: None, None, None,
Ensuring Regulatory Compliance: The company ensures compliance with regulatory requirements through Class-Action Lawsuits (e.g., against Salesforce), Regulatory Investigations (Expected), , Expected (Not Yet Filed), , domain seizures by FBI/French authorities, , None, None, None, .

Lessons Learned: Timely detection of reconnaissance activities is critical (6-month delay in this case)., OAuth token security and rotation policies require stricter controls., GitHub account security (e.g., MFA, access reviews) must be prioritized to prevent supply chain risks., Third-party integrations (e.g., Salesforce) can amplify breach impact; segmentation and monitoring are essential.

Lessons Learned: OAuth tokens require the same security rigor as passwords, including MFA and regular rotation., Third-party integration security must be elevated to a board-level priority with dedicated oversight., Supply chain risks extend beyond direct vendors to fourth/fifth-party SaaS ecosystems., Anti-forensics techniques (e.g., log deletion) can delay detection, necessitating enhanced monitoring., Data shared via external platforms (e.g., chatbots) may contain sensitive information requiring classification and protection., eDiscovery preparedness must account for multi-platform, cross-jurisdictional breach responses.

Lessons Learned: AI integrations expand attack surfaces beyond traditional perimeters, Trust-based architectures create detection blind spots for AI-powered exfiltration, Authentication tokens for AI systems must be treated as crown jewels, IP allow-listing and geographic restrictions are critical for high-privilege AI tokens, Integration lifecycle management is essential to prevent stale credential exposure, AI behavior baselining is necessary to detect anomalous data access patterns, Third-party AI vendors introduce supply chain risks that require defense-in-depth

Lessons Learned: Social engineering (vishing) remains a critical attack vector for initial access., Over-permissive API/OAuth tokens create extensive lateral movement risks., Third-party integrations (e.g., Salesloft, Drift) expand attack surfaces in SaaS ecosystems., Credential hygiene (e.g., GitHub repositories) is a persistent weak point., RaaS models enable scalable extortion campaigns with lower technical barriers.

Lessons Learned: Cybercriminal forums remain resilient despite law enforcement takedowns, adapting to alternative platforms (e.g., Telegram)., Destruction of database backups can disrupt cybercriminal operations but may not fully deter them., Collaboration between international law enforcement (FBI/French authorities) is critical for disrupting cybercriminal infrastructure., Companies must assume leaked data will be exploited even if initial leak attempts are thwarted.

Lessons Learned: Non-human identities (NHIs) such as OAuth tokens, API keys, and service accounts are high-value targets for attackers due to their broad privileges and lack of oversight. Organizations must extend identity security controls to include NHIs, not just human users., Publicly exposed API tokens can act as unguarded backdoors, granting attackers direct access to sensitive systems without needing to bypass interactive login protections. Token hygiene (e.g., avoiding public exposure, enforcing least privilege) is critical., Orphaned or unrotated service credentials can undermine incident response efforts. Even after rotating human credentials, overlooked NHIs can provide attackers with persistent access. Comprehensive credential rotation must include all identities—human and non-human., Dynamic SaaS Security Platforms are essential for discovering, monitoring, and securing NHIs. Traditional identity controls are insufficient for the scale and complexity of machine identities in modern SaaS environments.

Lessons Learned: Supply chain breaches can cascade rapidly across interconnected systems., Manual vendor risk assessments are insufficient for modern threat landscapes., AI-powered continuous monitoring is critical for detecting shadow IT and third-party exposures., MSSPs must prioritize extended vendor relationship oversight beyond immediate suppliers., Proactive threat visibility and autonomous remediation are key to mitigating third-party risks.

Recommendations: Review Salesforce objects for sensitive data and secrets, Revoke and rotate compromised API keys and credentials, Monitor for unauthorized access or abuse of stolen secrets, Enhance OAuth token security and third-party app integrations, Conduct thorough investigations for signs of lateral movement or further compromiseReview Salesforce objects for sensitive data and secrets, Revoke and rotate compromised API keys and credentials, Monitor for unauthorized access or abuse of stolen secrets, Enhance OAuth token security and third-party app integrations, Conduct thorough investigations for signs of lateral movement or further compromiseReview Salesforce objects for sensitive data and secrets, Revoke and rotate compromised API keys and credentials, Monitor for unauthorized access or abuse of stolen secrets, Enhance OAuth token security and third-party app integrations, Conduct thorough investigations for signs of lateral movement or further compromiseReview Salesforce objects for sensitive data and secrets, Revoke and rotate compromised API keys and credentials, Monitor for unauthorized access or abuse of stolen secrets, Enhance OAuth token security and third-party app integrations, Conduct thorough investigations for signs of lateral movement or further compromiseReview Salesforce objects for sensitive data and secrets, Revoke and rotate compromised API keys and credentials, Monitor for unauthorized access or abuse of stolen secrets, Enhance OAuth token security and third-party app integrations, Conduct thorough investigations for signs of lateral movement or further compromise

Recommendations: Implement continuous monitoring for GitHub and cloud environments to detect anomalous activities (e.g., guest user additions, workflow changes)., Enforce least-privilege access and regular token rotation for OAuth and API integrations., Conduct regular red-team exercises to test detection capabilities for reconnaissance and lateral movement., Enhance incident response coordination with customers in supply chain scenarios to mitigate downstream impacts., Adopt zero-trust principles for third-party integrations (e.g., Salesforce, AWS).Implement continuous monitoring for GitHub and cloud environments to detect anomalous activities (e.g., guest user additions, workflow changes)., Enforce least-privilege access and regular token rotation for OAuth and API integrations., Conduct regular red-team exercises to test detection capabilities for reconnaissance and lateral movement., Enhance incident response coordination with customers in supply chain scenarios to mitigate downstream impacts., Adopt zero-trust principles for third-party integrations (e.g., Salesforce, AWS).Implement continuous monitoring for GitHub and cloud environments to detect anomalous activities (e.g., guest user additions, workflow changes)., Enforce least-privilege access and regular token rotation for OAuth and API integrations., Conduct regular red-team exercises to test detection capabilities for reconnaissance and lateral movement., Enhance incident response coordination with customers in supply chain scenarios to mitigate downstream impacts., Adopt zero-trust principles for third-party integrations (e.g., Salesforce, AWS).Implement continuous monitoring for GitHub and cloud environments to detect anomalous activities (e.g., guest user additions, workflow changes)., Enforce least-privilege access and regular token rotation for OAuth and API integrations., Conduct regular red-team exercises to test detection capabilities for reconnaissance and lateral movement., Enhance incident response coordination with customers in supply chain scenarios to mitigate downstream impacts., Adopt zero-trust principles for third-party integrations (e.g., Salesforce, AWS).Implement continuous monitoring for GitHub and cloud environments to detect anomalous activities (e.g., guest user additions, workflow changes)., Enforce least-privilege access and regular token rotation for OAuth and API integrations., Conduct regular red-team exercises to test detection capabilities for reconnaissance and lateral movement., Enhance incident response coordination with customers in supply chain scenarios to mitigate downstream impacts., Adopt zero-trust principles for third-party integrations (e.g., Salesforce, AWS).

Recommendations: Implement **strict OAuth token lifecycle management** (rotation, scoped permissions, real-time monitoring)., Adopt **zero-trust access controls** for all third-party integrations, treating them as untrusted by default., Expand **third-party risk assessments** to include fourth/fifth-party SaaS dependencies., Develop **cross-platform visibility tools** to track data flows across interconnected systems., Establish **pre-negotiated breach response protocols** with vendors, including liability frameworks., Enhance **legal hold procedures** for multi-tenant cloud environments to ensure evidence integrity., Invest in **automated anomaly detection** for OAuth token usage and API activity., Conduct **regular audits** of third-party integrations and their permission scopes., Train employees on **secure data-sharing practices** via external platforms (e.g., chatbots, support tools)., Integrate **information governance** with cybersecurity to classify and protect data in SaaS environments.Implement **strict OAuth token lifecycle management** (rotation, scoped permissions, real-time monitoring)., Adopt **zero-trust access controls** for all third-party integrations, treating them as untrusted by default., Expand **third-party risk assessments** to include fourth/fifth-party SaaS dependencies., Develop **cross-platform visibility tools** to track data flows across interconnected systems., Establish **pre-negotiated breach response protocols** with vendors, including liability frameworks., Enhance **legal hold procedures** for multi-tenant cloud environments to ensure evidence integrity., Invest in **automated anomaly detection** for OAuth token usage and API activity., Conduct **regular audits** of third-party integrations and their permission scopes., Train employees on **secure data-sharing practices** via external platforms (e.g., chatbots, support tools)., Integrate **information governance** with cybersecurity to classify and protect data in SaaS environments.Implement **strict OAuth token lifecycle management** (rotation, scoped permissions, real-time monitoring)., Adopt **zero-trust access controls** for all third-party integrations, treating them as untrusted by default., Expand **third-party risk assessments** to include fourth/fifth-party SaaS dependencies., Develop **cross-platform visibility tools** to track data flows across interconnected systems., Establish **pre-negotiated breach response protocols** with vendors, including liability frameworks., Enhance **legal hold procedures** for multi-tenant cloud environments to ensure evidence integrity., Invest in **automated anomaly detection** for OAuth token usage and API activity., Conduct **regular audits** of third-party integrations and their permission scopes., Train employees on **secure data-sharing practices** via external platforms (e.g., chatbots, support tools)., Integrate **information governance** with cybersecurity to classify and protect data in SaaS environments.Implement **strict OAuth token lifecycle management** (rotation, scoped permissions, real-time monitoring)., Adopt **zero-trust access controls** for all third-party integrations, treating them as untrusted by default., Expand **third-party risk assessments** to include fourth/fifth-party SaaS dependencies., Develop **cross-platform visibility tools** to track data flows across interconnected systems., Establish **pre-negotiated breach response protocols** with vendors, including liability frameworks., Enhance **legal hold procedures** for multi-tenant cloud environments to ensure evidence integrity., Invest in **automated anomaly detection** for OAuth token usage and API activity., Conduct **regular audits** of third-party integrations and their permission scopes., Train employees on **secure data-sharing practices** via external platforms (e.g., chatbots, support tools)., Integrate **information governance** with cybersecurity to classify and protect data in SaaS environments.Implement **strict OAuth token lifecycle management** (rotation, scoped permissions, real-time monitoring)., Adopt **zero-trust access controls** for all third-party integrations, treating them as untrusted by default., Expand **third-party risk assessments** to include fourth/fifth-party SaaS dependencies., Develop **cross-platform visibility tools** to track data flows across interconnected systems., Establish **pre-negotiated breach response protocols** with vendors, including liability frameworks., Enhance **legal hold procedures** for multi-tenant cloud environments to ensure evidence integrity., Invest in **automated anomaly detection** for OAuth token usage and API activity., Conduct **regular audits** of third-party integrations and their permission scopes., Train employees on **secure data-sharing practices** via external platforms (e.g., chatbots, support tools)., Integrate **information governance** with cybersecurity to classify and protect data in SaaS environments.Implement **strict OAuth token lifecycle management** (rotation, scoped permissions, real-time monitoring)., Adopt **zero-trust access controls** for all third-party integrations, treating them as untrusted by default., Expand **third-party risk assessments** to include fourth/fifth-party SaaS dependencies., Develop **cross-platform visibility tools** to track data flows across interconnected systems., Establish **pre-negotiated breach response protocols** with vendors, including liability frameworks., Enhance **legal hold procedures** for multi-tenant cloud environments to ensure evidence integrity., Invest in **automated anomaly detection** for OAuth token usage and API activity., Conduct **regular audits** of third-party integrations and their permission scopes., Train employees on **secure data-sharing practices** via external platforms (e.g., chatbots, support tools)., Integrate **information governance** with cybersecurity to classify and protect data in SaaS environments.Implement **strict OAuth token lifecycle management** (rotation, scoped permissions, real-time monitoring)., Adopt **zero-trust access controls** for all third-party integrations, treating them as untrusted by default., Expand **third-party risk assessments** to include fourth/fifth-party SaaS dependencies., Develop **cross-platform visibility tools** to track data flows across interconnected systems., Establish **pre-negotiated breach response protocols** with vendors, including liability frameworks., Enhance **legal hold procedures** for multi-tenant cloud environments to ensure evidence integrity., Invest in **automated anomaly detection** for OAuth token usage and API activity., Conduct **regular audits** of third-party integrations and their permission scopes., Train employees on **secure data-sharing practices** via external platforms (e.g., chatbots, support tools)., Integrate **information governance** with cybersecurity to classify and protect data in SaaS environments.Implement **strict OAuth token lifecycle management** (rotation, scoped permissions, real-time monitoring)., Adopt **zero-trust access controls** for all third-party integrations, treating them as untrusted by default., Expand **third-party risk assessments** to include fourth/fifth-party SaaS dependencies., Develop **cross-platform visibility tools** to track data flows across interconnected systems., Establish **pre-negotiated breach response protocols** with vendors, including liability frameworks., Enhance **legal hold procedures** for multi-tenant cloud environments to ensure evidence integrity., Invest in **automated anomaly detection** for OAuth token usage and API activity., Conduct **regular audits** of third-party integrations and their permission scopes., Train employees on **secure data-sharing practices** via external platforms (e.g., chatbots, support tools)., Integrate **information governance** with cybersecurity to classify and protect data in SaaS environments.Implement **strict OAuth token lifecycle management** (rotation, scoped permissions, real-time monitoring)., Adopt **zero-trust access controls** for all third-party integrations, treating them as untrusted by default., Expand **third-party risk assessments** to include fourth/fifth-party SaaS dependencies., Develop **cross-platform visibility tools** to track data flows across interconnected systems., Establish **pre-negotiated breach response protocols** with vendors, including liability frameworks., Enhance **legal hold procedures** for multi-tenant cloud environments to ensure evidence integrity., Invest in **automated anomaly detection** for OAuth token usage and API activity., Conduct **regular audits** of third-party integrations and their permission scopes., Train employees on **secure data-sharing practices** via external platforms (e.g., chatbots, support tools)., Integrate **information governance** with cybersecurity to classify and protect data in SaaS environments.Implement **strict OAuth token lifecycle management** (rotation, scoped permissions, real-time monitoring)., Adopt **zero-trust access controls** for all third-party integrations, treating them as untrusted by default., Expand **third-party risk assessments** to include fourth/fifth-party SaaS dependencies., Develop **cross-platform visibility tools** to track data flows across interconnected systems., Establish **pre-negotiated breach response protocols** with vendors, including liability frameworks., Enhance **legal hold procedures** for multi-tenant cloud environments to ensure evidence integrity., Invest in **automated anomaly detection** for OAuth token usage and API activity., Conduct **regular audits** of third-party integrations and their permission scopes., Train employees on **secure data-sharing practices** via external platforms (e.g., chatbots, support tools)., Integrate **information governance** with cybersecurity to classify and protect data in SaaS environments.

Recommendations: Implement IP allow-listing for all AI integration tokens, Enforce geographic restrictions on API access, Use time-based access windows for sensitive integrations, Segment networks processing sensitive data via AI applications, Rotate OAuth tokens and API keys automatically with short lifespans, Store high-privilege credentials in encrypted vaults or HSMs, Monitor for unusual AI data consumption patterns (spikes, off-hours, unusual sources), Audit integration lifecycles to deactivate unused or former vendor connections, Treat AI vendors as part of your critical supply chain with corresponding security reviews, Adopt zero-trust principles for AI system authentications, Conduct red-team exercises specifically targeting AI integration pathwaysImplement IP allow-listing for all AI integration tokens, Enforce geographic restrictions on API access, Use time-based access windows for sensitive integrations, Segment networks processing sensitive data via AI applications, Rotate OAuth tokens and API keys automatically with short lifespans, Store high-privilege credentials in encrypted vaults or HSMs, Monitor for unusual AI data consumption patterns (spikes, off-hours, unusual sources), Audit integration lifecycles to deactivate unused or former vendor connections, Treat AI vendors as part of your critical supply chain with corresponding security reviews, Adopt zero-trust principles for AI system authentications, Conduct red-team exercises specifically targeting AI integration pathwaysImplement IP allow-listing for all AI integration tokens, Enforce geographic restrictions on API access, Use time-based access windows for sensitive integrations, Segment networks processing sensitive data via AI applications, Rotate OAuth tokens and API keys automatically with short lifespans, Store high-privilege credentials in encrypted vaults or HSMs, Monitor for unusual AI data consumption patterns (spikes, off-hours, unusual sources), Audit integration lifecycles to deactivate unused or former vendor connections, Treat AI vendors as part of your critical supply chain with corresponding security reviews, Adopt zero-trust principles for AI system authentications, Conduct red-team exercises specifically targeting AI integration pathwaysImplement IP allow-listing for all AI integration tokens, Enforce geographic restrictions on API access, Use time-based access windows for sensitive integrations, Segment networks processing sensitive data via AI applications, Rotate OAuth tokens and API keys automatically with short lifespans, Store high-privilege credentials in encrypted vaults or HSMs, Monitor for unusual AI data consumption patterns (spikes, off-hours, unusual sources), Audit integration lifecycles to deactivate unused or former vendor connections, Treat AI vendors as part of your critical supply chain with corresponding security reviews, Adopt zero-trust principles for AI system authentications, Conduct red-team exercises specifically targeting AI integration pathwaysImplement IP allow-listing for all AI integration tokens, Enforce geographic restrictions on API access, Use time-based access windows for sensitive integrations, Segment networks processing sensitive data via AI applications, Rotate OAuth tokens and API keys automatically with short lifespans, Store high-privilege credentials in encrypted vaults or HSMs, Monitor for unusual AI data consumption patterns (spikes, off-hours, unusual sources), Audit integration lifecycles to deactivate unused or former vendor connections, Treat AI vendors as part of your critical supply chain with corresponding security reviews, Adopt zero-trust principles for AI system authentications, Conduct red-team exercises specifically targeting AI integration pathwaysImplement IP allow-listing for all AI integration tokens, Enforce geographic restrictions on API access, Use time-based access windows for sensitive integrations, Segment networks processing sensitive data via AI applications, Rotate OAuth tokens and API keys automatically with short lifespans, Store high-privilege credentials in encrypted vaults or HSMs, Monitor for unusual AI data consumption patterns (spikes, off-hours, unusual sources), Audit integration lifecycles to deactivate unused or former vendor connections, Treat AI vendors as part of your critical supply chain with corresponding security reviews, Adopt zero-trust principles for AI system authentications, Conduct red-team exercises specifically targeting AI integration pathwaysImplement IP allow-listing for all AI integration tokens, Enforce geographic restrictions on API access, Use time-based access windows for sensitive integrations, Segment networks processing sensitive data via AI applications, Rotate OAuth tokens and API keys automatically with short lifespans, Store high-privilege credentials in encrypted vaults or HSMs, Monitor for unusual AI data consumption patterns (spikes, off-hours, unusual sources), Audit integration lifecycles to deactivate unused or former vendor connections, Treat AI vendors as part of your critical supply chain with corresponding security reviews, Adopt zero-trust principles for AI system authentications, Conduct red-team exercises specifically targeting AI integration pathwaysImplement IP allow-listing for all AI integration tokens, Enforce geographic restrictions on API access, Use time-based access windows for sensitive integrations, Segment networks processing sensitive data via AI applications, Rotate OAuth tokens and API keys automatically with short lifespans, Store high-privilege credentials in encrypted vaults or HSMs, Monitor for unusual AI data consumption patterns (spikes, off-hours, unusual sources), Audit integration lifecycles to deactivate unused or former vendor connections, Treat AI vendors as part of your critical supply chain with corresponding security reviews, Adopt zero-trust principles for AI system authentications, Conduct red-team exercises specifically targeting AI integration pathwaysImplement IP allow-listing for all AI integration tokens, Enforce geographic restrictions on API access, Use time-based access windows for sensitive integrations, Segment networks processing sensitive data via AI applications, Rotate OAuth tokens and API keys automatically with short lifespans, Store high-privilege credentials in encrypted vaults or HSMs, Monitor for unusual AI data consumption patterns (spikes, off-hours, unusual sources), Audit integration lifecycles to deactivate unused or former vendor connections, Treat AI vendors as part of your critical supply chain with corresponding security reviews, Adopt zero-trust principles for AI system authentications, Conduct red-team exercises specifically targeting AI integration pathwaysImplement IP allow-listing for all AI integration tokens, Enforce geographic restrictions on API access, Use time-based access windows for sensitive integrations, Segment networks processing sensitive data via AI applications, Rotate OAuth tokens and API keys automatically with short lifespans, Store high-privilege credentials in encrypted vaults or HSMs, Monitor for unusual AI data consumption patterns (spikes, off-hours, unusual sources), Audit integration lifecycles to deactivate unused or former vendor connections, Treat AI vendors as part of your critical supply chain with corresponding security reviews, Adopt zero-trust principles for AI system authentications, Conduct red-team exercises specifically targeting AI integration pathwaysImplement IP allow-listing for all AI integration tokens, Enforce geographic restrictions on API access, Use time-based access windows for sensitive integrations, Segment networks processing sensitive data via AI applications, Rotate OAuth tokens and API keys automatically with short lifespans, Store high-privilege credentials in encrypted vaults or HSMs, Monitor for unusual AI data consumption patterns (spikes, off-hours, unusual sources), Audit integration lifecycles to deactivate unused or former vendor connections, Treat AI vendors as part of your critical supply chain with corresponding security reviews, Adopt zero-trust principles for AI system authentications, Conduct red-team exercises specifically targeting AI integration pathways

Recommendations: Implement strict API/OAuth permission controls and regular audits., Enforce MFA for all critical systems, including third-party integrations., Sanitize development repositories to remove hardcoded credentials., Monitor for anomalous OAuth token usage and lateral movement., Educate employees on vishing and social engineering tactics., Segment networks to limit blast radius from compromised integrations., Adopt zero-trust principles for SaaS and cloud environments.Implement strict API/OAuth permission controls and regular audits., Enforce MFA for all critical systems, including third-party integrations., Sanitize development repositories to remove hardcoded credentials., Monitor for anomalous OAuth token usage and lateral movement., Educate employees on vishing and social engineering tactics., Segment networks to limit blast radius from compromised integrations., Adopt zero-trust principles for SaaS and cloud environments.Implement strict API/OAuth permission controls and regular audits., Enforce MFA for all critical systems, including third-party integrations., Sanitize development repositories to remove hardcoded credentials., Monitor for anomalous OAuth token usage and lateral movement., Educate employees on vishing and social engineering tactics., Segment networks to limit blast radius from compromised integrations., Adopt zero-trust principles for SaaS and cloud environments.Implement strict API/OAuth permission controls and regular audits., Enforce MFA for all critical systems, including third-party integrations., Sanitize development repositories to remove hardcoded credentials., Monitor for anomalous OAuth token usage and lateral movement., Educate employees on vishing and social engineering tactics., Segment networks to limit blast radius from compromised integrations., Adopt zero-trust principles for SaaS and cloud environments.Implement strict API/OAuth permission controls and regular audits., Enforce MFA for all critical systems, including third-party integrations., Sanitize development repositories to remove hardcoded credentials., Monitor for anomalous OAuth token usage and lateral movement., Educate employees on vishing and social engineering tactics., Segment networks to limit blast radius from compromised integrations., Adopt zero-trust principles for SaaS and cloud environments.Implement strict API/OAuth permission controls and regular audits., Enforce MFA for all critical systems, including third-party integrations., Sanitize development repositories to remove hardcoded credentials., Monitor for anomalous OAuth token usage and lateral movement., Educate employees on vishing and social engineering tactics., Segment networks to limit blast radius from compromised integrations., Adopt zero-trust principles for SaaS and cloud environments.Implement strict API/OAuth permission controls and regular audits., Enforce MFA for all critical systems, including third-party integrations., Sanitize development repositories to remove hardcoded credentials., Monitor for anomalous OAuth token usage and lateral movement., Educate employees on vishing and social engineering tactics., Segment networks to limit blast radius from compromised integrations., Adopt zero-trust principles for SaaS and cloud environments.

Recommendations: Monitor dark web/Telegram channels for leaked data related to the breach., Enhance third-party risk management for vendors like Salesloft/Salesforce., Prepare incident response plans for data leaks originating from cybercriminal forums., Law enforcement should prioritize tracking Scattered Lapsus$ Hunters' new communication channels (e.g., Telegram).Monitor dark web/Telegram channels for leaked data related to the breach., Enhance third-party risk management for vendors like Salesloft/Salesforce., Prepare incident response plans for data leaks originating from cybercriminal forums., Law enforcement should prioritize tracking Scattered Lapsus$ Hunters' new communication channels (e.g., Telegram).Monitor dark web/Telegram channels for leaked data related to the breach., Enhance third-party risk management for vendors like Salesloft/Salesforce., Prepare incident response plans for data leaks originating from cybercriminal forums., Law enforcement should prioritize tracking Scattered Lapsus$ Hunters' new communication channels (e.g., Telegram).Monitor dark web/Telegram channels for leaked data related to the breach., Enhance third-party risk management for vendors like Salesloft/Salesforce., Prepare incident response plans for data leaks originating from cybercriminal forums., Law enforcement should prioritize tracking Scattered Lapsus$ Hunters' new communication channels (e.g., Telegram).

Recommendations: Implement **unified visibility** of all non-human identities (OAuth apps, API keys, service accounts, bots) across SaaS applications using automated discovery tools., Enforce **least privilege** for NHIs by auditing and restricting overly permissive access scopes. Ensure integrations and tokens can only access the data they explicitly require., Deploy **continuous anomaly monitoring** to detect deviations in NHI behavior (e.g., unusual access times, data volumes, or locations). Baseline normal activity and flag anomalies in real time., Automate **credential rotation and expiration** for all NHIs. Use platforms that detect stale tokens, rotate secrets regularly, and disable unused credentials., Apply **compensating controls** for NHIs where MFA is not feasible (e.g., IP restrictions, scoped access, session monitoring)., Maintain a **real-time inventory** of third-party integrations, especially those connected via user consent (OAuth), and verify their legitimacy and security posture., Disable **orphaned or ghost NHIs** (credentials not tied to active workflows or users), as these are prime targets for attackers., Leverage **Dynamic SaaS Security Platforms** (e.g., Reco) to automate detection, response, and remediation for NHI-related risks, including token revocation and integration quarantine., Conduct **regular audits** of NHI permissions and usage context. Classify NHIs by type (e.g., integrations, AI assistants, RPA bots) to tailor risk controls appropriately., Educate teams on the risks of NHIs and integrate NHI security into broader **identity and access management (IAM)** strategies.Implement **unified visibility** of all non-human identities (OAuth apps, API keys, service accounts, bots) across SaaS applications using automated discovery tools., Enforce **least privilege** for NHIs by auditing and restricting overly permissive access scopes. Ensure integrations and tokens can only access the data they explicitly require., Deploy **continuous anomaly monitoring** to detect deviations in NHI behavior (e.g., unusual access times, data volumes, or locations). Baseline normal activity and flag anomalies in real time., Automate **credential rotation and expiration** for all NHIs. Use platforms that detect stale tokens, rotate secrets regularly, and disable unused credentials., Apply **compensating controls** for NHIs where MFA is not feasible (e.g., IP restrictions, scoped access, session monitoring)., Maintain a **real-time inventory** of third-party integrations, especially those connected via user consent (OAuth), and verify their legitimacy and security posture., Disable **orphaned or ghost NHIs** (credentials not tied to active workflows or users), as these are prime targets for attackers., Leverage **Dynamic SaaS Security Platforms** (e.g., Reco) to automate detection, response, and remediation for NHI-related risks, including token revocation and integration quarantine., Conduct **regular audits** of NHI permissions and usage context. Classify NHIs by type (e.g., integrations, AI assistants, RPA bots) to tailor risk controls appropriately., Educate teams on the risks of NHIs and integrate NHI security into broader **identity and access management (IAM)** strategies.Implement **unified visibility** of all non-human identities (OAuth apps, API keys, service accounts, bots) across SaaS applications using automated discovery tools., Enforce **least privilege** for NHIs by auditing and restricting overly permissive access scopes. Ensure integrations and tokens can only access the data they explicitly require., Deploy **continuous anomaly monitoring** to detect deviations in NHI behavior (e.g., unusual access times, data volumes, or locations). Baseline normal activity and flag anomalies in real time., Automate **credential rotation and expiration** for all NHIs. Use platforms that detect stale tokens, rotate secrets regularly, and disable unused credentials., Apply **compensating controls** for NHIs where MFA is not feasible (e.g., IP restrictions, scoped access, session monitoring)., Maintain a **real-time inventory** of third-party integrations, especially those connected via user consent (OAuth), and verify their legitimacy and security posture., Disable **orphaned or ghost NHIs** (credentials not tied to active workflows or users), as these are prime targets for attackers., Leverage **Dynamic SaaS Security Platforms** (e.g., Reco) to automate detection, response, and remediation for NHI-related risks, including token revocation and integration quarantine., Conduct **regular audits** of NHI permissions and usage context. Classify NHIs by type (e.g., integrations, AI assistants, RPA bots) to tailor risk controls appropriately., Educate teams on the risks of NHIs and integrate NHI security into broader **identity and access management (IAM)** strategies.Implement **unified visibility** of all non-human identities (OAuth apps, API keys, service accounts, bots) across SaaS applications using automated discovery tools., Enforce **least privilege** for NHIs by auditing and restricting overly permissive access scopes. Ensure integrations and tokens can only access the data they explicitly require., Deploy **continuous anomaly monitoring** to detect deviations in NHI behavior (e.g., unusual access times, data volumes, or locations). Baseline normal activity and flag anomalies in real time., Automate **credential rotation and expiration** for all NHIs. Use platforms that detect stale tokens, rotate secrets regularly, and disable unused credentials., Apply **compensating controls** for NHIs where MFA is not feasible (e.g., IP restrictions, scoped access, session monitoring)., Maintain a **real-time inventory** of third-party integrations, especially those connected via user consent (OAuth), and verify their legitimacy and security posture., Disable **orphaned or ghost NHIs** (credentials not tied to active workflows or users), as these are prime targets for attackers., Leverage **Dynamic SaaS Security Platforms** (e.g., Reco) to automate detection, response, and remediation for NHI-related risks, including token revocation and integration quarantine., Conduct **regular audits** of NHI permissions and usage context. Classify NHIs by type (e.g., integrations, AI assistants, RPA bots) to tailor risk controls appropriately., Educate teams on the risks of NHIs and integrate NHI security into broader **identity and access management (IAM)** strategies.Implement **unified visibility** of all non-human identities (OAuth apps, API keys, service accounts, bots) across SaaS applications using automated discovery tools., Enforce **least privilege** for NHIs by auditing and restricting overly permissive access scopes. Ensure integrations and tokens can only access the data they explicitly require., Deploy **continuous anomaly monitoring** to detect deviations in NHI behavior (e.g., unusual access times, data volumes, or locations). Baseline normal activity and flag anomalies in real time., Automate **credential rotation and expiration** for all NHIs. Use platforms that detect stale tokens, rotate secrets regularly, and disable unused credentials., Apply **compensating controls** for NHIs where MFA is not feasible (e.g., IP restrictions, scoped access, session monitoring)., Maintain a **real-time inventory** of third-party integrations, especially those connected via user consent (OAuth), and verify their legitimacy and security posture., Disable **orphaned or ghost NHIs** (credentials not tied to active workflows or users), as these are prime targets for attackers., Leverage **Dynamic SaaS Security Platforms** (e.g., Reco) to automate detection, response, and remediation for NHI-related risks, including token revocation and integration quarantine., Conduct **regular audits** of NHI permissions and usage context. Classify NHIs by type (e.g., integrations, AI assistants, RPA bots) to tailor risk controls appropriately., Educate teams on the risks of NHIs and integrate NHI security into broader **identity and access management (IAM)** strategies.Implement **unified visibility** of all non-human identities (OAuth apps, API keys, service accounts, bots) across SaaS applications using automated discovery tools., Enforce **least privilege** for NHIs by auditing and restricting overly permissive access scopes. Ensure integrations and tokens can only access the data they explicitly require., Deploy **continuous anomaly monitoring** to detect deviations in NHI behavior (e.g., unusual access times, data volumes, or locations). Baseline normal activity and flag anomalies in real time., Automate **credential rotation and expiration** for all NHIs. Use platforms that detect stale tokens, rotate secrets regularly, and disable unused credentials., Apply **compensating controls** for NHIs where MFA is not feasible (e.g., IP restrictions, scoped access, session monitoring)., Maintain a **real-time inventory** of third-party integrations, especially those connected via user consent (OAuth), and verify their legitimacy and security posture., Disable **orphaned or ghost NHIs** (credentials not tied to active workflows or users), as these are prime targets for attackers., Leverage **Dynamic SaaS Security Platforms** (e.g., Reco) to automate detection, response, and remediation for NHI-related risks, including token revocation and integration quarantine., Conduct **regular audits** of NHI permissions and usage context. Classify NHIs by type (e.g., integrations, AI assistants, RPA bots) to tailor risk controls appropriately., Educate teams on the risks of NHIs and integrate NHI security into broader **identity and access management (IAM)** strategies.Implement **unified visibility** of all non-human identities (OAuth apps, API keys, service accounts, bots) across SaaS applications using automated discovery tools., Enforce **least privilege** for NHIs by auditing and restricting overly permissive access scopes. Ensure integrations and tokens can only access the data they explicitly require., Deploy **continuous anomaly monitoring** to detect deviations in NHI behavior (e.g., unusual access times, data volumes, or locations). Baseline normal activity and flag anomalies in real time., Automate **credential rotation and expiration** for all NHIs. Use platforms that detect stale tokens, rotate secrets regularly, and disable unused credentials., Apply **compensating controls** for NHIs where MFA is not feasible (e.g., IP restrictions, scoped access, session monitoring)., Maintain a **real-time inventory** of third-party integrations, especially those connected via user consent (OAuth), and verify their legitimacy and security posture., Disable **orphaned or ghost NHIs** (credentials not tied to active workflows or users), as these are prime targets for attackers., Leverage **Dynamic SaaS Security Platforms** (e.g., Reco) to automate detection, response, and remediation for NHI-related risks, including token revocation and integration quarantine., Conduct **regular audits** of NHI permissions and usage context. Classify NHIs by type (e.g., integrations, AI assistants, RPA bots) to tailor risk controls appropriately., Educate teams on the risks of NHIs and integrate NHI security into broader **identity and access management (IAM)** strategies.Implement **unified visibility** of all non-human identities (OAuth apps, API keys, service accounts, bots) across SaaS applications using automated discovery tools., Enforce **least privilege** for NHIs by auditing and restricting overly permissive access scopes. Ensure integrations and tokens can only access the data they explicitly require., Deploy **continuous anomaly monitoring** to detect deviations in NHI behavior (e.g., unusual access times, data volumes, or locations). Baseline normal activity and flag anomalies in real time., Automate **credential rotation and expiration** for all NHIs. Use platforms that detect stale tokens, rotate secrets regularly, and disable unused credentials., Apply **compensating controls** for NHIs where MFA is not feasible (e.g., IP restrictions, scoped access, session monitoring)., Maintain a **real-time inventory** of third-party integrations, especially those connected via user consent (OAuth), and verify their legitimacy and security posture., Disable **orphaned or ghost NHIs** (credentials not tied to active workflows or users), as these are prime targets for attackers., Leverage **Dynamic SaaS Security Platforms** (e.g., Reco) to automate detection, response, and remediation for NHI-related risks, including token revocation and integration quarantine., Conduct **regular audits** of NHI permissions and usage context. Classify NHIs by type (e.g., integrations, AI assistants, RPA bots) to tailor risk controls appropriately., Educate teams on the risks of NHIs and integrate NHI security into broader **identity and access management (IAM)** strategies.Implement **unified visibility** of all non-human identities (OAuth apps, API keys, service accounts, bots) across SaaS applications using automated discovery tools., Enforce **least privilege** for NHIs by auditing and restricting overly permissive access scopes. Ensure integrations and tokens can only access the data they explicitly require., Deploy **continuous anomaly monitoring** to detect deviations in NHI behavior (e.g., unusual access times, data volumes, or locations). Baseline normal activity and flag anomalies in real time., Automate **credential rotation and expiration** for all NHIs. Use platforms that detect stale tokens, rotate secrets regularly, and disable unused credentials., Apply **compensating controls** for NHIs where MFA is not feasible (e.g., IP restrictions, scoped access, session monitoring)., Maintain a **real-time inventory** of third-party integrations, especially those connected via user consent (OAuth), and verify their legitimacy and security posture., Disable **orphaned or ghost NHIs** (credentials not tied to active workflows or users), as these are prime targets for attackers., Leverage **Dynamic SaaS Security Platforms** (e.g., Reco) to automate detection, response, and remediation for NHI-related risks, including token revocation and integration quarantine., Conduct **regular audits** of NHI permissions and usage context. Classify NHIs by type (e.g., integrations, AI assistants, RPA bots) to tailor risk controls appropriately., Educate teams on the risks of NHIs and integrate NHI security into broader **identity and access management (IAM)** strategies.Implement **unified visibility** of all non-human identities (OAuth apps, API keys, service accounts, bots) across SaaS applications using automated discovery tools., Enforce **least privilege** for NHIs by auditing and restricting overly permissive access scopes. Ensure integrations and tokens can only access the data they explicitly require., Deploy **continuous anomaly monitoring** to detect deviations in NHI behavior (e.g., unusual access times, data volumes, or locations). Baseline normal activity and flag anomalies in real time., Automate **credential rotation and expiration** for all NHIs. Use platforms that detect stale tokens, rotate secrets regularly, and disable unused credentials., Apply **compensating controls** for NHIs where MFA is not feasible (e.g., IP restrictions, scoped access, session monitoring)., Maintain a **real-time inventory** of third-party integrations, especially those connected via user consent (OAuth), and verify their legitimacy and security posture., Disable **orphaned or ghost NHIs** (credentials not tied to active workflows or users), as these are prime targets for attackers., Leverage **Dynamic SaaS Security Platforms** (e.g., Reco) to automate detection, response, and remediation for NHI-related risks, including token revocation and integration quarantine., Conduct **regular audits** of NHI permissions and usage context. Classify NHIs by type (e.g., integrations, AI assistants, RPA bots) to tailor risk controls appropriately., Educate teams on the risks of NHIs and integrate NHI security into broader **identity and access management (IAM)** strategies.

Recommendations: Implement AI-powered third-party risk management (TPRM) platforms (e.g., RiskProfiler)., Enable continuous monitoring of vendor security postures, including multi-tier suppliers., Automate vendor risk questionnaires with dynamic updates for real-time compliance., Benchmark vendor security against industry peers to identify gaps., Integrate threat intelligence tools to map attack paths and prioritize containment., Adopt agentic AI for contextual learning and adaptive risk scoring., Monitor hidden dependencies (subsidiaries, partners) to prevent cascading disruptions., Replace manual Excel-based assessments with autonomous, real-time systems.Implement AI-powered third-party risk management (TPRM) platforms (e.g., RiskProfiler)., Enable continuous monitoring of vendor security postures, including multi-tier suppliers., Automate vendor risk questionnaires with dynamic updates for real-time compliance., Benchmark vendor security against industry peers to identify gaps., Integrate threat intelligence tools to map attack paths and prioritize containment., Adopt agentic AI for contextual learning and adaptive risk scoring., Monitor hidden dependencies (subsidiaries, partners) to prevent cascading disruptions., Replace manual Excel-based assessments with autonomous, real-time systems.Implement AI-powered third-party risk management (TPRM) platforms (e.g., RiskProfiler)., Enable continuous monitoring of vendor security postures, including multi-tier suppliers., Automate vendor risk questionnaires with dynamic updates for real-time compliance., Benchmark vendor security against industry peers to identify gaps., Integrate threat intelligence tools to map attack paths and prioritize containment., Adopt agentic AI for contextual learning and adaptive risk scoring., Monitor hidden dependencies (subsidiaries, partners) to prevent cascading disruptions., Replace manual Excel-based assessments with autonomous, real-time systems.Implement AI-powered third-party risk management (TPRM) platforms (e.g., RiskProfiler)., Enable continuous monitoring of vendor security postures, including multi-tier suppliers., Automate vendor risk questionnaires with dynamic updates for real-time compliance., Benchmark vendor security against industry peers to identify gaps., Integrate threat intelligence tools to map attack paths and prioritize containment., Adopt agentic AI for contextual learning and adaptive risk scoring., Monitor hidden dependencies (subsidiaries, partners) to prevent cascading disruptions., Replace manual Excel-based assessments with autonomous, real-time systems.Implement AI-powered third-party risk management (TPRM) platforms (e.g., RiskProfiler)., Enable continuous monitoring of vendor security postures, including multi-tier suppliers., Automate vendor risk questionnaires with dynamic updates for real-time compliance., Benchmark vendor security against industry peers to identify gaps., Integrate threat intelligence tools to map attack paths and prioritize containment., Adopt agentic AI for contextual learning and adaptive risk scoring., Monitor hidden dependencies (subsidiaries, partners) to prevent cascading disruptions., Replace manual Excel-based assessments with autonomous, real-time systems.Implement AI-powered third-party risk management (TPRM) platforms (e.g., RiskProfiler)., Enable continuous monitoring of vendor security postures, including multi-tier suppliers., Automate vendor risk questionnaires with dynamic updates for real-time compliance., Benchmark vendor security against industry peers to identify gaps., Integrate threat intelligence tools to map attack paths and prioritize containment., Adopt agentic AI for contextual learning and adaptive risk scoring., Monitor hidden dependencies (subsidiaries, partners) to prevent cascading disruptions., Replace manual Excel-based assessments with autonomous, real-time systems.Implement AI-powered third-party risk management (TPRM) platforms (e.g., RiskProfiler)., Enable continuous monitoring of vendor security postures, including multi-tier suppliers., Automate vendor risk questionnaires with dynamic updates for real-time compliance., Benchmark vendor security against industry peers to identify gaps., Integrate threat intelligence tools to map attack paths and prioritize containment., Adopt agentic AI for contextual learning and adaptive risk scoring., Monitor hidden dependencies (subsidiaries, partners) to prevent cascading disruptions., Replace manual Excel-based assessments with autonomous, real-time systems.Implement AI-powered third-party risk management (TPRM) platforms (e.g., RiskProfiler)., Enable continuous monitoring of vendor security postures, including multi-tier suppliers., Automate vendor risk questionnaires with dynamic updates for real-time compliance., Benchmark vendor security against industry peers to identify gaps., Integrate threat intelligence tools to map attack paths and prioritize containment., Adopt agentic AI for contextual learning and adaptive risk scoring., Monitor hidden dependencies (subsidiaries, partners) to prevent cascading disruptions., Replace manual Excel-based assessments with autonomous, real-time systems.
Key Lessons Learned: The key lessons learned from past incidents are Timely detection of reconnaissance activities is critical (6-month delay in this case).,OAuth token security and rotation policies require stricter controls.,GitHub account security (e.g., MFA, access reviews) must be prioritized to prevent supply chain risks.,Third-party integrations (e.g., Salesforce) can amplify breach impact; segmentation and monitoring are essential.OAuth tokens require the same security rigor as passwords, including MFA and regular rotation.,Third-party integration security must be elevated to a board-level priority with dedicated oversight.,Supply chain risks extend beyond direct vendors to fourth/fifth-party SaaS ecosystems.,Anti-forensics techniques (e.g., log deletion) can delay detection, necessitating enhanced monitoring.,Data shared via external platforms (e.g., chatbots) may contain sensitive information requiring classification and protection.,eDiscovery preparedness must account for multi-platform, cross-jurisdictional breach responses.AI integrations expand attack surfaces beyond traditional perimeters,Trust-based architectures create detection blind spots for AI-powered exfiltration,Authentication tokens for AI systems must be treated as crown jewels,IP allow-listing and geographic restrictions are critical for high-privilege AI tokens,Integration lifecycle management is essential to prevent stale credential exposure,AI behavior baselining is necessary to detect anomalous data access patterns,Third-party AI vendors introduce supply chain risks that require defense-in-depthSocial engineering (vishing) remains a critical attack vector for initial access.,Over-permissive API/OAuth tokens create extensive lateral movement risks.,Third-party integrations (e.g., Salesloft, Drift) expand attack surfaces in SaaS ecosystems.,Credential hygiene (e.g., GitHub repositories) is a persistent weak point.,RaaS models enable scalable extortion campaigns with lower technical barriers.Cybercriminal forums remain resilient despite law enforcement takedowns, adapting to alternative platforms (e.g., Telegram).,Destruction of database backups can disrupt cybercriminal operations but may not fully deter them.,Collaboration between international law enforcement (FBI/French authorities) is critical for disrupting cybercriminal infrastructure.,Companies must assume leaked data will be exploited even if initial leak attempts are thwarted.Non-human identities (NHIs) such as OAuth tokens, API keys, and service accounts are high-value targets for attackers due to their broad privileges and lack of oversight. Organizations must extend identity security controls to include NHIs, not just human users.,Publicly exposed API tokens can act as unguarded backdoors, granting attackers direct access to sensitive systems without needing to bypass interactive login protections. Token hygiene (e.g., avoiding public exposure, enforcing least privilege) is critical.,Orphaned or unrotated service credentials can undermine incident response efforts. Even after rotating human credentials, overlooked NHIs can provide attackers with persistent access. Comprehensive credential rotation must include all identities—human and non-human.,Dynamic SaaS Security Platforms are essential for discovering, monitoring, and securing NHIs. Traditional identity controls are insufficient for the scale and complexity of machine identities in modern SaaS environments.Supply chain breaches can cascade rapidly across interconnected systems.,Manual vendor risk assessments are insufficient for modern threat landscapes.,AI-powered continuous monitoring is critical for detecting shadow IT and third-party exposures.,MSSPs must prioritize extended vendor relationship oversight beyond immediate suppliers.,Proactive threat visibility and autonomous remediation are key to mitigating third-party risks.

Source: The Register

Source: Google Threat Intelligence Group (GTIG) Advisory

Source: Salesloft Advisory

Source: TechCrunch
Date Accessed: 2024-09-01T00:00:00Z

Source: Salesloft Data Breach Page
Date Accessed: 2024-08-26T00:00:00Z

Source: Google Threat Intelligence Group (Mandiant)
Date Accessed: 2024-08-01T00:00:00Z

Source: DataBreaches.net
URL: https://www.databreaches.net
Date Accessed: 2024-08-30T00:00:00Z

Source: Bleeping Computer
URL: https://www.bleepingcomputer.com
Date Accessed: 2024-08-28T00:00:00Z

Source: HaystackID/ComplexDiscovery OÜ
Date Accessed: 2025

Source: Incident Analysis Report (Hypothetical)

Source: Cybersecurity Article (Title Not Provided)

Source: BleepingComputer

Source: CyberInsider

Source: Reco Blog: 'The Hidden Risk of Non-Human Identities in SaaS'

Source: Author: Gal Nakash (CPO and Cofounder, Reco)

Source: RiskProfiler Guest Blog

Source: IBM Cost of a Data Breach Report 2025
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: The Register, and Source: Google Threat Intelligence Group (GTIG) Advisory, and Source: Salesloft Advisory, and Source: TechCrunchUrl: https://techcrunch.comDate Accessed: 2024-09-01T00:00:00Z, and Source: Salesloft Data Breach PageDate Accessed: 2024-08-26T00:00:00Z, and Source: Google Threat Intelligence Group (Mandiant)Date Accessed: 2024-08-01T00:00:00Z, and Source: DataBreaches.netUrl: https://www.databreaches.netDate Accessed: 2024-08-30T00:00:00Z, and Source: Bleeping ComputerUrl: https://www.bleepingcomputer.comDate Accessed: 2024-08-28T00:00:00Z, and Source: HaystackID/ComplexDiscovery OÜDate Accessed: 2025, and Source: Incident Analysis Report (Hypothetical), and Source: Cybersecurity Article (Title Not Provided), and Source: BleepingComputer, and Source: CyberInsider, and Source: TechRadarUrl: https://www.techradar.com, and Source: Reco Blog: 'The Hidden Risk of Non-Human Identities in SaaS', and Source: Author: Gal Nakash (CPO and Cofounder, Reco), and Source: RiskProfiler Guest Blog, and Source: IBM Cost of a Data Breach Report 2025.

Investigation Status: ongoing (Drift app remains off Salesforce AppExchange pending security assurance)

Investigation Status: Contained (as of August 2024)

Investigation Status: Ongoing (as of 2025)

Investigation Status: Ongoing (Forensic Analysis and Impact Assessment)

Investigation Status: Ongoing (as of October 2025)

Investigation Status: ongoing (no arrests made; forum operations pivoted to Telegram)

Investigation Status: [None, None, None]

Investigation Status: Ongoing (details limited to public disclosures)
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Direct Notifications To Affected Customers, Public Advisories From Salesloft And Gtig, Indicators Of Compromise (Iocs) Shared With Admins, Public Disclosure Via Data Breach Page, Media Statements, Public Disclosure (Via Haystackid/Complexdiscovery), Customer Advisories, Regulatory Notifications, Public Disclosures, Customer Advisories, Transparency Reports, Advisories On Proactive Third-Party Risk Management and Mssp-Focused Mitigation Guidance.

Stakeholder Advisories: Direct Notifications To Affected Customers, Public Advisories With Iocs.
Customer Advisories: Urged to treat Salesforce data as compromised if using Drift integrationRecommended immediate remediation steps

Stakeholder Advisories: Public Disclosure Via Salesloft’S Breach Page; Likely Private Notifications To Affected Customers (E.G., Bugcrowd, Cloudflare)..
Customer Advisories: Customers advised to rotate credentials, review Salesforce access logs, and monitor for unauthorized activity.

Stakeholder Advisories: Customer Notifications Issued, Regulatory Disclosures In Progress, Legal Counsel Engaged For Litigation Preparedness.
Customer Advisories: Guidance on Password/Token RotationRecommendations for Monitoring Suspicious ActivitySupport for Affected CRM Data

Stakeholder Advisories: Customer Notifications Issued, Industry-Wide Alerts Recommended.
Customer Advisories: Security BulletinsRemediation GuidanceCompromised Data Notifications


Stakeholder Advisories: Mssps Urged To Adopt Proactive Third-Party Risk Strategies.
Customer Advisories: Organizations advised to audit third-party integrations and token security
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Direct Notifications To Affected Customers, Public Advisories With Iocs, Urged To Treat Salesforce Data As Compromised If Using Drift Integration, Recommended Immediate Remediation Steps, , Public Disclosure Via Salesloft’S Breach Page; Likely Private Notifications To Affected Customers (E.G., Bugcrowd, Cloudflare)., Customers Advised To Rotate Credentials, Review Salesforce Access Logs, And Monitor For Unauthorized Activity., , Customer Notifications Issued, Regulatory Disclosures In Progress, Legal Counsel Engaged For Litigation Preparedness, Guidance On Password/Token Rotation, Recommendations For Monitoring Suspicious Activity, Support For Affected Crm Data, , Customer Notifications Issued, Industry-Wide Alerts Recommended, Security Bulletins, Remediation Guidance, Compromised Data Notifications, , Mssps Urged To Adopt Proactive Third-Party Risk Strategies, Organizations Advised To Audit Third-Party Integrations And Token Security and .

Entry Point: Stolen OAuth tokens (Drift app integration with Salesforce)
High Value Targets: Aws Access Keys, Snowflake Tokens, Gcp Service Account Keys, Salesforce Object Data,
Data Sold on Dark Web: Aws Access Keys, Snowflake Tokens, Gcp Service Account Keys, Salesforce Object Data,

Entry Point: Salesloft GitHub Account
Reconnaissance Period: March 2024 – June 2024 (3 months)
Backdoors Established: ['Guest User Added to GitHub', 'Unauthorized Workflows Created']
High Value Targets: Oauth Tokens (Drift Customers), Aws Access Keys, Snowflake Tokens, Salesforce Instances,
Data Sold on Dark Web: Oauth Tokens (Drift Customers), Aws Access Keys, Snowflake Tokens, Salesforce Instances,

Entry Point: Compromised Salesloft GitHub Account (March–June 2025)
Reconnaissance Period: March 2025 – August 2025 (5+ months)
Backdoors Established: ['Persistent OAuth Token Access', 'Automated Data Extraction Scripts']
High Value Targets: Salesforce Instances Of Cybersecurity Firms, Crm Data, Support Case Histories,
Data Sold on Dark Web: Salesforce Instances Of Cybersecurity Firms, Crm Data, Support Case Histories,

Entry Point: Salesloft Internal GitHub Repository
Reconnaissance Period: March-June 2025 (3-4 Months)
Backdoors Established: ['Stolen OAuth Token for Drift Access']
High Value Targets: Drift Cloud Application, Connected Salesforce Instances, Openai Api Credentials,
Data Sold on Dark Web: Drift Cloud Application, Connected Salesforce Instances, Openai Api Credentials,

Entry Point: Social Engineering (Vishing) → Malicious Salesforce Integrations
Reconnaissance Period: Late 2024 (Initial Access) to August 2025 (Mass Exfiltration)
Backdoors Established: Yes (OAuth Tokens for Persistent Access)
High Value Targets: Salesforce Crm Data, Third-Party Integration Tokens, Aws Cloud Environments,
Data Sold on Dark Web: Salesforce Crm Data, Third-Party Integration Tokens, Aws Cloud Environments,

High Value Targets: Salesloft, Salesforce, 40+ Companies (E.G., Qantas, Gap, Disney),
Data Sold on Dark Web: Salesloft, Salesforce, 40+ Companies (E.G., Qantas, Gap, Disney),

Entry Point: Compromised Oauth Tokens (Drift-Salesforce Integration), Exposed Github Api Token (Public Repository), Orphaned Api Token (Okta Service Account),
Reconnaissance Period: [None, None, None]
Backdoors Established: ['Yes (via hijacked OAuth tokens)', 'Yes (via exposed API token)', 'Yes (via unrotated service token)']
High Value Targets: Salesforce Crm Data, Aws/Snowflake Credentials, Internal Source Code (270 Gb), Atlassian Suite (Jira, Confluence, Bitbucket),
Data Sold on Dark Web: Salesforce Crm Data, Aws/Snowflake Credentials, Internal Source Code (270 Gb), Atlassian Suite (Jira, Confluence, Bitbucket),

Entry Point: Salesloft compromise (token theft)
High Value Targets: Salesforce Drift Tokens, Connected Enterprise Systems,
Data Sold on Dark Web: Salesforce Drift Tokens, Connected Enterprise Systems,

Root Causes: Insecure Oauth Token Management In Drift-Salesforce Integration, Potential Lack Of Monitoring For Anomalous Token Usage,
Corrective Actions: Token Revocation, App Removal From Marketplace, Enhanced Customer Guidance On Credential Hygiene,

Root Causes: Inadequate Monitoring Of Github Account Activities (E.G., Guest User Additions, Repository Access)., Delayed Detection Of Reconnaissance (March–June 2024)., Over-Reliance On Oauth Tokens Without Sufficient Safeguards (E.G., Short-Lived Tokens, Anomaly Detection)., Lack Of Segmentation Between Salesloft’S Github/Aws And Customer Environments (E.G., Salesforce).,
Corrective Actions: Enhanced Logging And Alerting For Github Actions (E.G., User Additions, Workflow Changes)., Implementation Of Token Expiration Policies And Real-Time Revocation Capabilities., Third-Party Security Audits For Cloud And Integration Environments., Customer Notification Protocols For Supply Chain Incidents.,

Root Causes: Inadequate Protection Of Github Credentials Leading To Initial Compromise., Lack Of Mfa Enforcement For Oauth Tokens, Allowing Bypass Of Authentication Controls., Insufficient Monitoring Of Third-Party Integration Activity (E.G., Drift-Salesforce Oauth Flows)., Over-Permissioned Oauth Tokens With Excessive Data Access Scopes., Delayed Detection Due To Anti-Forensics Techniques (Log Deletion)., Gaps In Cross-Platform Visibility For Data Flows In Saas Ecosystems.,
Corrective Actions: Mandate **Mfa For All Oauth Token Usage** And Treat Tokens As High-Value Credentials., Implement **Real-Time Monitoring** For Anomalous Oauth/Api Activity With Automated Alerts., Enforce **Least-Privilege Access** For Third-Party Integrations, Regularly Auditing Permission Scopes., Develop **Dedicated Supply Chain Risk Management Programs** For Saas Ecosystems., Enhance **Log Retention And Anti-Tampering Controls** To Prevent Evidence Destruction., Establish **Cross-Vendor Incident Response Playbooks** For Coordinated Breach Handling., Integrate **Information Governance** With Cybersecurity To Classify And Protect Data In Shared Environments., Conduct **Regular Red-Team Exercises** Targeting Third-Party Integration Attack Surfaces.,

Root Causes: Insufficient Protection Of High-Privilege Credentials In Github Repositories, Lack Of Ip Restrictions On Oauth Tokens, Over-Permissive Api Access For Ai Integrations, Failure To Deactivate Former Customer (Spycloud) Credentials, Detection Gaps For Ai-Powered Data Exfiltration Patterns, Inadequate Segmentation Between Ai Systems And Core Business Data,
Corrective Actions: Mandatory Ip Allow-Listing For All Integration Tokens, Implementation Of Just-In-Time Access For Ai Systems, Enhanced Credential Rotation Policies With Automated Enforcement, Ai-Specific Anomaly Detection For Data Access Patterns, Supply Chain Security Reviews For All Ai Vendors, Integration Lifecycle Management Automation, Zero-Trust Architecture Adoption For Ai Ecosystems, Reduced Token Permissions To Least-Privilege For Ai Integrations,

Root Causes: Successful Vishing Attacks Due To Lack Of Employee Awareness., Storing Credentials In Github Repositories (Poor Hygiene)., Over-Permissive Oauth Tokens Enabling Lateral Movement., Inadequate Monitoring Of Third-Party Integration Activities.,
Corrective Actions: Mandatory Mfa For All Saas And Cloud Access., Automated Credential Scanning In Code Repositories., Reduced Oauth Token Permissions And Scope., Enhanced Behavioral Analytics For Api/Oauth Usage., Employee Training On Social Engineering Tactics.,

Root Causes: Exploitation Of Cybercriminal Forums For Data Leaks And Extortion., Lack Of Arrests Allows Threat Actors To Continue Operations Under New Infrastructure., Insufficient Protection Of Corporate Data Shared With Third-Party Vendors (E.G., Salesloft/Salesforce).,
Corrective Actions: Strengthen Vendor Security Assessments For Platforms Handling Sensitive Data., Improve International Coordination For Takedowns Of Cybercriminal Infrastructure., Develop Strategies To Mitigate Data Leaks Even After Initial Disruption Of Threat Actor Operations.,

Root Causes: Lack Of Visibility And Oversight For Non-Human Identities (Oauth Tokens) With Excessive Privileges., Public Exposure Of A Github Api Token Due To Misconfiguration Or Lack Of Secret Management., Incomplete Incident Response: Human Credentials Were Rotated, But Non-Human Credentials (Api Tokens) Were Overlooked, Leaving A Backdoor Open., Overprivileged Nhis: Integrations And Tokens Had Broader Access Than Necessary, Increasing The Blast Radius Of Compromises.,
Corrective Actions: Adopt A **Dynamic Saas Security Platform** To Automate Discovery, Monitoring, And Remediation Of Nhis., Implement **Least Privilege Enforcement** For All Nhis, Auditing And Restricting Access Scopes To The Minimum Required., Deploy **Real-Time Anomaly Detection** For Nhi Behavior, With Automated Responses To Suspicious Activity (E.G., Token Revocation)., Establish **Automated Credential Rotation** For Nhis, Ensuring Tokens And Keys Are Regularly Refreshed And Unused Credentials Are Disabled., Conduct **Comprehensive Nhi Inventories** Across All Saas Applications, Classifying Identities By Type And Risk Level., Integrate **Nhi Security Into Iam Strategies**, Treating Machine Identities With The Same Rigor As Human Accounts., Enforce **Compensating Controls** For Nhis (E.G., Ip Restrictions, Session Monitoring) Where Mfa Is Not Applicable., Educate Security And Devops Teams On The Risks Of Nhis And The Importance Of Token Hygiene (E.G., Avoiding Hardcoding, Public Exposure).,

Root Causes: Inadequate Token Security In Salesloft/Salesforce Integration, Lack Of Visibility Into Third-Party/Shadow It Integrations, Manual, Point-In-Time Vendor Risk Assessments, Failure To Monitor Extended Supply Chain Dependencies,
Corrective Actions: Deploy Ai-Driven Tprm Solutions For Continuous Monitoring., Implement Autonomous Vendor Risk Questionnaires With Real-Time Updates., Map And Secure All Attack Paths In The Supply Chain Ecosystem., Enhance Token Security And Third-Party Access Controls., Adopt Peer Benchmarking To Identify Vendor Compliance Gaps.,
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Google Threat Intelligence Group (Gtig), , Advisory To Monitor Salesforce Objects For Malicious Activity, , Google’S Mandiant (Incident Response Unit), , Cybersecurity Firms (E.G., Cloudflare, Palo Alto Networks), Legal Counsel, Forensic Investigators, , Real-Time Oauth Token Activity Monitoring, Anomalous Api Call Detection, , Likely (Not Specified), , Ai Behavior Baselining, Anomaly Detection For Data Access Patterns, , , , Riskprofiler (Ai-Powered Tprm Solutions), , Continuous Vendor Security Posture Monitoring, Ai-Driven Anomaly Detection, .
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Token Revocation, App Removal From Marketplace, Enhanced Customer Guidance On Credential Hygiene, , Enhanced Logging And Alerting For Github Actions (E.G., User Additions, Workflow Changes)., Implementation Of Token Expiration Policies And Real-Time Revocation Capabilities., Third-Party Security Audits For Cloud And Integration Environments., Customer Notification Protocols For Supply Chain Incidents., , Mandate **Mfa For All Oauth Token Usage** And Treat Tokens As High-Value Credentials., Implement **Real-Time Monitoring** For Anomalous Oauth/Api Activity With Automated Alerts., Enforce **Least-Privilege Access** For Third-Party Integrations, Regularly Auditing Permission Scopes., Develop **Dedicated Supply Chain Risk Management Programs** For Saas Ecosystems., Enhance **Log Retention And Anti-Tampering Controls** To Prevent Evidence Destruction., Establish **Cross-Vendor Incident Response Playbooks** For Coordinated Breach Handling., Integrate **Information Governance** With Cybersecurity To Classify And Protect Data In Shared Environments., Conduct **Regular Red-Team Exercises** Targeting Third-Party Integration Attack Surfaces., , Mandatory Ip Allow-Listing For All Integration Tokens, Implementation Of Just-In-Time Access For Ai Systems, Enhanced Credential Rotation Policies With Automated Enforcement, Ai-Specific Anomaly Detection For Data Access Patterns, Supply Chain Security Reviews For All Ai Vendors, Integration Lifecycle Management Automation, Zero-Trust Architecture Adoption For Ai Ecosystems, Reduced Token Permissions To Least-Privilege For Ai Integrations, , Mandatory Mfa For All Saas And Cloud Access., Automated Credential Scanning In Code Repositories., Reduced Oauth Token Permissions And Scope., Enhanced Behavioral Analytics For Api/Oauth Usage., Employee Training On Social Engineering Tactics., , Strengthen Vendor Security Assessments For Platforms Handling Sensitive Data., Improve International Coordination For Takedowns Of Cybercriminal Infrastructure., Develop Strategies To Mitigate Data Leaks Even After Initial Disruption Of Threat Actor Operations., , Adopt A **Dynamic Saas Security Platform** To Automate Discovery, Monitoring, And Remediation Of Nhis., Implement **Least Privilege Enforcement** For All Nhis, Auditing And Restricting Access Scopes To The Minimum Required., Deploy **Real-Time Anomaly Detection** For Nhi Behavior, With Automated Responses To Suspicious Activity (E.G., Token Revocation)., Establish **Automated Credential Rotation** For Nhis, Ensuring Tokens And Keys Are Regularly Refreshed And Unused Credentials Are Disabled., Conduct **Comprehensive Nhi Inventories** Across All Saas Applications, Classifying Identities By Type And Risk Level., Integrate **Nhi Security Into Iam Strategies**, Treating Machine Identities With The Same Rigor As Human Accounts., Enforce **Compensating Controls** For Nhis (E.G., Ip Restrictions, Session Monitoring) Where Mfa Is Not Applicable., Educate Security And Devops Teams On The Risks Of Nhis And The Importance Of Token Hygiene (E.G., Avoiding Hardcoding, Public Exposure)., , Deploy Ai-Driven Tprm Solutions For Continuous Monitoring., Implement Autonomous Vendor Risk Questionnaires With Real-Time Updates., Map And Secure All Attack Paths In The Supply Chain Ecosystem., Enhance Token Security And Third-Party Access Controls., Adopt Peer Benchmarking To Identify Vendor Compliance Gaps., .
Ransom Payment History: The company has Paid ransoms in the past.
Last Ransom Demanded: The amount of the last ransom demanded was Yes (Extortion via Tor Leak Site).
Last Attacking Group: The attacking group in the last incident were an UNC6395 (for Salesloft Drift incidents)ShinyHunters (UNC6240) (for separate Salesforce incidents), UNC6395 (per Google Threat Intelligence Group)ShinyHunters (alleged), UNC6395GRUB1 (Cloudflare designation), Scattered Lapsus$ Hunters (fusion of ShinyHunters, Scattered Spider, and Lapsus$), Scattered Lapsus$ Hunters and .
Most Recent Incident Detected: The most recent incident detected was on 2024-08-01T00:00:00Z.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2025-10-03.
Most Recent Incident Resolved: The most recent incident resolved was on 2024-08-26T00:00:00Z.
Highest Financial Loss: The highest financial loss from an incident was [None, None, None].
Most Significant Data Compromised: The most significant data compromised in an incident were Salesforce objects (cases, accounts, users, opportunities), AWS access keys, passwords, Snowflake-related access tokens, potential Google Cloud Platform service account keys, , Authentication Tokens (OAuth), AWS Access Keys, Passwords, Snowflake-Related Tokens, Support Ticket Data (via Salesforce), , Customer Relationship Management (CRM) Data, Support Case Information, Sensitive Credentials (API keys, passwords), Business Communications, , Customer Conversation Data, Contact Information, Authentication Tokens (Including OpenAI API Credentials), Salesforce Instance Data, , Customer Leads, Deal Details, Confidential Operational Information, OAuth Tokens, Third-Party Integration Data, , , Salesforce CRM data (including AWS keys and Snowflake tokens from support case attachments), 270 GB of internal source code and data, Access to Cloudflare's Atlassian suite (Jira, Confluence, Bitbucket), , authentication tokens (Salesforce Drift), potential customer data (via cascading breaches) and .
Most Significant System Affected: The most significant system affected in an incident were Salesforce databases (via Drift integration)Drift app and Salesloft GitHub AccountSalesloft AWS Cloud EnvironmentDrift’s AI/Chatbot PlatformCustomer Salesforce Instances (e.g., Bugcrowd, Cloudflare, Google, Proofpoint, Palo Alto Networks, Tenable) and Salesforce Instances (700+ organizations)Drift Chatbot IntegrationGitHub Account (initial compromise) and Salesloft GitHub RepositoriesDrift Cloud ApplicationConnected Salesforce InstancesOpenAI API Integrations and Salesforce EnvironmentsSalesloft (Sales Engagement Platform)Drift AI ChatbotGitHub RepositoriesAWS Cloud Environments and Salesforce CRM (via Drift integration)GitHub (New York Times' cloud code repository)Atlassian Suite (Jira, Confluence, Bitbucket) and SalesforceCloudflaremultiple unnamed enterprises.
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was google threat intelligence group (gtig), , google’s mandiant (incident response unit), , cybersecurity firms (e.g., cloudflare, palo alto networks), legal counsel, forensic investigators, , likely (not specified), , , riskprofiler (ai-powered tprm solutions), .
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident were revoked all active OAuth access and refresh tokensremoved Drift app from Salesforce AppExchange, Isolation of Compromised GitHub AccountRevocation of Stolen TokensRestoration of Salesforce Integration, OAuth Token RevocationDisabling Compromised IntegrationsIsolating Affected Systems, Token RevocationAccess RestrictionsIP Allow-Listing (Okta), domain seizure (breachforums.hn, Tor site)FBI/French authorities intervention and Token revocation (post-incident)Token revocation (post-discovery of compromise).
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Access to Cloudflare's Atlassian suite (Jira, Confluence, Bitbucket), Deal Details, passwords, authentication tokens (Salesforce Drift), Contact Information, Customer Conversation Data, Third-Party Integration Data, Business Communications, Salesforce objects (cases, accounts, users, opportunities), AWS access keys, Customer Leads, Passwords, 270 GB of internal source code and data, Authentication Tokens (Including OpenAI API Credentials), Sensitive Credentials (API keys, passwords), potential customer data (via cascading breaches), Customer Relationship Management (CRM) Data, Support Case Information, potential Google Cloud Platform service account keys, Confidential Operational Information, OAuth Tokens, AWS Access Keys, Salesforce CRM data (including AWS keys and Snowflake tokens from support case attachments), Support Ticket Data (via Salesforce), Snowflake-Related Tokens, Snowflake-related access tokens, Salesforce Instance Data and Authentication Tokens (OAuth).
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 0.
Highest Ransom Paid: The highest ransom paid in a ransomware incident was [None, None, None].
Most Significant Legal Action: The most significant legal action taken for a regulatory violation was Class-Action Lawsuits (e.g., against Salesforce), Regulatory Investigations (Expected), , Expected (Not Yet Filed), , domain seizures by FBI/French authorities, , None, None, None, .
Most Significant Lesson Learned: The most significant lesson learned from past incidents was Proactive threat visibility and autonomous remediation are key to mitigating third-party risks.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Integrate threat intelligence tools to map attack paths and prioritize containment., Implement **unified visibility** of all non-human identities (OAuth apps, API keys, service accounts, bots) across SaaS applications using automated discovery tools., Educate teams on the risks of NHIs and integrate NHI security into broader **identity and access management (IAM)** strategies., Automate vendor risk questionnaires with dynamic updates for real-time compliance., Revoke and rotate compromised API keys and credentials, Law enforcement should prioritize tracking Scattered Lapsus$ Hunters' new communication channels (e.g., Telegram)., Adopt zero-trust principles for AI system authentications, Automate **credential rotation and expiration** for all NHIs. Use platforms that detect stale tokens, rotate secrets regularly, and disable unused credentials., Adopt zero-trust principles for SaaS and cloud environments., Maintain a **real-time inventory** of third-party integrations, especially those connected via user consent (OAuth), and verify their legitimacy and security posture., Invest in **automated anomaly detection** for OAuth token usage and API activity., Enforce geographic restrictions on API access, Adopt agentic AI for contextual learning and adaptive risk scoring., Conduct thorough investigations for signs of lateral movement or further compromise, Store high-privilege credentials in encrypted vaults or HSMs, Adopt **zero-trust access controls** for all third-party integrations, treating them as untrusted by default., Rotate OAuth tokens and API keys automatically with short lifespans, Enforce MFA for all critical systems, including third-party integrations., Prepare incident response plans for data leaks originating from cybercriminal forums., Conduct **regular audits** of NHI permissions and usage context. Classify NHIs by type (e.g., integrations, AI assistants, RPA bots) to tailor risk controls appropriately., Enhance incident response coordination with customers in supply chain scenarios to mitigate downstream impacts., Replace manual Excel-based assessments with autonomous, real-time systems., Integrate **information governance** with cybersecurity to classify and protect data in SaaS environments., Educate employees on vishing and social engineering tactics., Implement IP allow-listing for all AI integration tokens, Use time-based access windows for sensitive integrations, Train employees on **secure data-sharing practices** via external platforms (e.g., chatbots, support tools)., Adopt zero-trust principles for third-party integrations (e.g., Salesforce, AWS)., Conduct **regular audits** of third-party integrations and their permission scopes., Audit integration lifecycles to deactivate unused or former vendor connections, Implement strict API/OAuth permission controls and regular audits., Conduct regular red-team exercises to test detection capabilities for reconnaissance and lateral movement., Enhance third-party risk management for vendors like Salesloft/Salesforce., Enable continuous monitoring of vendor security postures, including multi-tier suppliers., Monitor for unauthorized access or abuse of stolen secrets, Expand **third-party risk assessments** to include fourth/fifth-party SaaS dependencies., Conduct red-team exercises specifically targeting AI integration pathways, Benchmark vendor security against industry peers to identify gaps., Implement continuous monitoring for GitHub and cloud environments to detect anomalous activities (e.g., guest user additions, workflow changes)., Enhance OAuth token security and third-party app integrations, Enforce least-privilege access and regular token rotation for OAuth and API integrations., Disable **orphaned or ghost NHIs** (credentials not tied to active workflows or users), as these are prime targets for attackers., Apply **compensating controls** for NHIs where MFA is not feasible (e.g., IP restrictions, scoped access, session monitoring)., Establish **pre-negotiated breach response protocols** with vendors, including liability frameworks., Enhance **legal hold procedures** for multi-tenant cloud environments to ensure evidence integrity., Monitor for unusual AI data consumption patterns (spikes, off-hours, unusual sources), Monitor for anomalous OAuth token usage and lateral movement., Leverage **Dynamic SaaS Security Platforms** (e.g., Reco) to automate detection, response, and remediation for NHI-related risks, including token revocation and integration quarantine., Develop **cross-platform visibility tools** to track data flows across interconnected systems., Segment networks to limit blast radius from compromised integrations., Review Salesforce objects for sensitive data and secrets, Treat AI vendors as part of your critical supply chain with corresponding security reviews, Enforce **least privilege** for NHIs by auditing and restricting overly permissive access scopes. Ensure integrations and tokens can only access the data they explicitly require., Monitor dark web/Telegram channels for leaked data related to the breach., Monitor hidden dependencies (subsidiaries, partners) to prevent cascading disruptions., Implement AI-powered third-party risk management (TPRM) platforms (e.g., RiskProfiler)., Deploy **continuous anomaly monitoring** to detect deviations in NHI behavior (e.g., unusual access times, data volumes, or locations). Baseline normal activity and flag anomalies in real time., Segment networks processing sensitive data via AI applications, Sanitize development repositories to remove hardcoded credentials., Implement **strict OAuth token lifecycle management** (rotation, scoped permissions and real-time monitoring)..
Most Recent Source: The most recent source of information about an incident are TechCrunch, The Register, Google Threat Intelligence Group (Mandiant), HaystackID/ComplexDiscovery OÜ, Author: Gal Nakash (CPO and Cofounder, Reco), Bleeping Computer, DataBreaches.net, Cybersecurity Article (Title Not Provided), Incident Analysis Report (Hypothetical), Salesloft Advisory, BleepingComputer, TechRadar, Reco Blog: 'The Hidden Risk of Non-Human Identities in SaaS', Google Threat Intelligence Group (GTIG) Advisory, Salesloft Data Breach Page, RiskProfiler Guest Blog, IBM Cost of a Data Breach Report 2025 and CyberInsider.
Most Recent URL for Additional Resources: The most recent URL for additional resources on cybersecurity best practices is https://techcrunch.com, https://www.databreaches.net, https://www.bleepingcomputer.com, https://www.techradar.com .
Current Status of Most Recent Investigation: The current status of the most recent investigation is ongoing (Drift app remains off Salesforce AppExchange pending security assurance).
Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was Direct notifications to affected customers, Public advisories with IOCs, Public disclosure via Salesloft’s breach page; likely private notifications to affected customers (e.g., Bugcrowd, Cloudflare)., Customer Notifications Issued, Regulatory Disclosures in Progress, Legal Counsel Engaged for Litigation Preparedness, Customer Notifications Issued, Industry-Wide Alerts Recommended, MSSPs urged to adopt proactive third-party risk strategies, .
Most Recent Customer Advisory: The most recent customer advisory issued were an Urged to treat Salesforce data as compromised if using Drift integrationRecommended immediate remediation steps, Customers advised to rotate credentials, review Salesforce access logs, and monitor for unauthorized activity., Guidance on Password/Token RotationRecommendations for Monitoring Suspicious ActivitySupport for Affected CRM Data, Security BulletinsRemediation GuidanceCompromised Data Notifications, and Organizations advised to audit third-party integrations and token security.
Most Recent Entry Point: The most recent entry point used by an initial access broker were an Salesloft Internal GitHub Repository, Salesloft compromise (token theft), Stolen OAuth tokens (Drift app integration with Salesforce), Social Engineering (Vishing) → Malicious Salesforce Integrations, Salesloft GitHub Account and Compromised Salesloft GitHub Account (March–June 2025).
Most Recent Reconnaissance Period: The most recent reconnaissance period for an incident was March 2024 – June 2024 (3 months), March 2025 – August 2025 (5+ months), March-June 2025 (3-4 Months), Late 2024 (Initial Access) to August 2025 (Mass Exfiltration), .
Most Significant Root Cause: The most significant root cause identified in post-incident analysis was Insecure OAuth token management in Drift-Salesforce integrationPotential lack of monitoring for anomalous token usage, Inadequate monitoring of GitHub account activities (e.g., guest user additions, repository access).Delayed detection of reconnaissance (March–June 2024).Over-reliance on OAuth tokens without sufficient safeguards (e.g., short-lived tokens, anomaly detection).Lack of segmentation between Salesloft’s GitHub/AWS and customer environments (e.g., Salesforce)., Inadequate protection of GitHub credentials leading to initial compromise.Lack of MFA enforcement for OAuth tokens, allowing bypass of authentication controls.Insufficient monitoring of third-party integration activity (e.g., Drift-Salesforce OAuth flows).Over-permissioned OAuth tokens with excessive data access scopes.Delayed detection due to anti-forensics techniques (log deletion).Gaps in cross-platform visibility for data flows in SaaS ecosystems., Insufficient protection of high-privilege credentials in GitHub repositoriesLack of IP restrictions on OAuth tokensOver-permissive API access for AI integrationsFailure to deactivate former customer (SpyCloud) credentialsDetection gaps for AI-powered data exfiltration patternsInadequate segmentation between AI systems and core business data, Successful vishing attacks due to lack of employee awareness.Storing credentials in GitHub repositories (poor hygiene).Over-permissive OAuth tokens enabling lateral movement.Inadequate monitoring of third-party integration activities., Exploitation of cybercriminal forums for data leaks and extortion.Lack of arrests allows threat actors to continue operations under new infrastructure.Insufficient protection of corporate data shared with third-party vendors (e.g., Salesloft/Salesforce)., Lack of visibility and oversight for non-human identities (OAuth tokens) with excessive privileges.Public exposure of a GitHub API token due to misconfiguration or lack of secret management.Incomplete incident response: human credentials were rotated, but non-human credentials (API tokens) were overlooked, leaving a backdoor open.Overprivileged NHIs: integrations and tokens had broader access than necessary, increasing the blast radius of compromises., Inadequate token security in Salesloft/Salesforce integrationLack of visibility into third-party/shadow IT integrationsManual, point-in-time vendor risk assessmentsFailure to monitor extended supply chain dependencies.
Most Significant Corrective Action: The most significant corrective action taken based on post-incident analysis was Token revocationApp removal from marketplaceEnhanced customer guidance on credential hygiene, Enhanced logging and alerting for GitHub actions (e.g., user additions, workflow changes).Implementation of token expiration policies and real-time revocation capabilities.Third-party security audits for cloud and integration environments.Customer notification protocols for supply chain incidents., Mandate **MFA for all OAuth token usage** and treat tokens as high-value credentials.Implement **real-time monitoring** for anomalous OAuth/API activity with automated alerts.Enforce **least-privilege access** for third-party integrations, regularly auditing permission scopes.Develop **dedicated supply chain risk management programs** for SaaS ecosystems.Enhance **log retention and anti-tampering controls** to prevent evidence destruction.Establish **cross-vendor incident response playbooks** for coordinated breach handling.Integrate **information governance** with cybersecurity to classify and protect data in shared environments.Conduct **regular red-team exercises** targeting third-party integration attack surfaces., Mandatory IP allow-listing for all integration tokensImplementation of just-in-time access for AI systemsEnhanced credential rotation policies with automated enforcementAI-specific anomaly detection for data access patternsSupply chain security reviews for all AI vendorsIntegration lifecycle management automationZero-trust architecture adoption for AI ecosystemsReduced token permissions to least-privilege for AI integrations, Mandatory MFA for all SaaS and cloud access.Automated credential scanning in code repositories.Reduced OAuth token permissions and scope.Enhanced behavioral analytics for API/OAuth usage.Employee training on social engineering tactics., Strengthen vendor security assessments for platforms handling sensitive data.Improve international coordination for takedowns of cybercriminal infrastructure.Develop strategies to mitigate data leaks even after initial disruption of threat actor operations., Adopt a **Dynamic SaaS Security Platform** to automate discovery, monitoring, and remediation of NHIs.Implement **least privilege enforcement** for all NHIs, auditing and restricting access scopes to the minimum required.Deploy **real-time anomaly detection** for NHI behavior, with automated responses to suspicious activity (e.g., token revocation).Establish **automated credential rotation** for NHIs, ensuring tokens and keys are regularly refreshed and unused credentials are disabled.Conduct **comprehensive NHI inventories** across all SaaS applications, classifying identities by type and risk level.Integrate **NHI security into IAM strategies**, treating machine identities with the same rigor as human accounts.Enforce **compensating controls** for NHIs (e.g., IP restrictions, session monitoring) where MFA is not applicable.Educate security and DevOps teams on the risks of NHIs and the importance of token hygiene (e.g., avoiding hardcoding, public exposure)., Deploy AI-driven TPRM solutions for continuous monitoring.Implement autonomous vendor risk questionnaires with real-time updates.Map and secure all attack paths in the supply chain ecosystem.Enhance token security and third-party access controls.Adopt peer benchmarking to identify vendor compliance gaps..
.png)
Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versions 19.2.16, 20.3.14, and 21.0.1, there is a XSRF token leakage via protocol-relative URLs in angular HTTP clients. The vulnerability is a Credential Leak by App Logic that leads to the unauthorized disclosure of the Cross-Site Request Forgery (XSRF) token to an attacker-controlled domain. Angular's HttpClient has a built-in XSRF protection mechanism that works by checking if a request URL starts with a protocol (http:// or https://) to determine if it is cross-origin. If the URL starts with protocol-relative URL (//), it is incorrectly treated as a same-origin request, and the XSRF token is automatically added to the X-XSRF-TOKEN header. This issue has been patched in versions 19.2.16, 20.3.14, and 21.0.1. A workaround for this issue involves avoiding using protocol-relative URLs (URLs starting with //) in HttpClient requests. All backend communication URLs should be hardcoded as relative paths (starting with a single /) or fully qualified, trusted absolute URLs.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream OID-based security decisions. This issue has been patched in version 1.3.2.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, working with large buffers in Lua scripts can lead to a stack overflow. Users of Lua rules and output scripts may be affected when working with large buffers. This includes a rule passing a large buffer to a Lua script. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves disabling Lua rules and output scripts, or making sure limits, such as stream.depth.reassembly and HTTP response body limits (response-body-limit), are set to less than half the stack size.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. In versions from 8.0.0 to before 8.0.2, a NULL dereference can occur when the entropy keyword is used in conjunction with base64_data. This issue has been patched in version 8.0.2. A workaround involves disabling rules that use entropy in conjunction with base64_data.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.