Tekmono
  • News
  • Guides
  • Lists
  • Reviews
  • Deals
No Result
View All Result
Tekmono
No Result
View All Result
Home News
Google Uncovers Salesforce Data Breach Campaign

Google Uncovers Salesforce Data Breach Campaign

by Tekmono Editorial Team
28/08/2025
in News
Share on FacebookShare on Twitter

Google has revealed that a threat group, identified as UNC6395, has been conducting a series of data breaches targeting organizations’ Salesforce instances by compromising OAuth tokens associated with the Salesloft Drift third-party application.

The Google Threat Intelligence Group (GTIG) reported that UNC6395 initiated a “widespread data theft” campaign starting around August 8 and continuing through at least August 18. The threat actors exploited authentication tokens within the Salesloft Drift application, an AI-powered tool designed to automate sales processes like communication, analysis, and engagement, which integrates with Salesforce databases. According to the GTIG, UNC6395 “systematically exported large volumes of data from numerous corporate Salesforce instances.”

The primary objective was to harvest sensitive credentials, including Amazon Web Services (AWS) access keys (AKIA), passwords, and Snowflake-related access tokens. After extracting the data, “the actor then searched through the data to look for secrets that could be potentially used to compromise victim environments.” To conceal their activities, the threat actors deleted query jobs.

Related Reads

OpenAI Launches Customizable Skills for Codex Coding Agent

Amazon’s Alexa+ to Integrate with Four New Services

EA Investigated for AI-Generated Content in Battlefield 6

Apple to Start iPhone 18 Production in January

Although there is no indication that logs were directly impacted, GTIG advises organizations to “review relevant logs for evidence of data exposure.” The scope of the campaign is limited to Salesloft customers who integrate their solutions with Salesforce. GTIG clarified that there is no evidence suggesting that Google Cloud customers were directly affected, but those utilizing Salesloft Drift “should review their Salesforce objects for any Google Cloud Platform service account keys.”

GTIG emphasized that “Organizations using Drift integrated with Salesforce should consider their Salesforce data compromised and are urged to take immediate remediation steps.” Salesloft collaborated with Salesforce to address the situation by revoking all active access and refresh tokens associated with the Drift application. Salesforce has also removed the Drift application from the Salesforce AppExchange “until further notice and pending further investigation.” GTIG, Salesforce, and Salesloft have all notified affected organizations.

The GTIG report follows disclosures from multiple prominent companies, including Adidas, Pandora, Allianz, Tiffany & Co., Dior, Louis Vuitton, Workday, and Google, concerning breaches via a third-party platform, reportedly Salesforce, during July and August. ShinyHunters claimed responsibility for many of these attacks, and vishing attacks have been identified as the method of compromise. In June, Google reported that a financially motivated threat group, UNC6040 (allegedly associated with ShinyHunters), was impersonating IT support staff in vishing attacks to infiltrate organizations’ Salesforce environments. Earlier in August, Google revealed that UNC6040 breached one of its Salesforce instances using these tactics.

While the timeline of some of these Salesforce breaches aligns with GTIG’s findings, the methods of compromise differ. Google stated that the UNC6395 Salesloft Drift activity is distinct from the vishing attacks attributed to UNC6040. A GTIG spokesperson confirmed, “We’ve not seen any compelling evidence connecting them.”

GTIG provided recommendations for defenders, advising impacted organizations to search for sensitive information and secrets within Salesforce objects and take appropriate actions, such as revoking API keys, rotating credentials, and conducting further investigations to determine if the secrets were misused by UNC6395. Organizations should also investigate for compromise and scan for exposed secrets by searching for the IP addresses and User-Agent strings provided by GTIG in an Indicators of Compromise section in the Mandiant blog post. It is also recommended to implement “a broader search for any activity originating from Tor exit nodes.”

Additional mitigation steps include reviewing Salesforce Event Monitoring logs for unusual activity linked to the Drift connection user, authentication activity from the Drift Connected App, and UniqueQuery events that log executed SOQL queries. Google also suggests that organizations open a Salesforce support case to obtain specific queries used by the threat actor and search Salesforce objects for potential secrets.

Google further recommended hardening access controls by ensuring that applications have the minimum necessary permissions, enforcing IP restrictions on the connected app, and defining login IP ranges to allow access only from trusted networks. Organizations are advised to rotate credentials by immediately revoking and rotating any discovered keys or secrets, resetting passwords, and configuring session timeout values in Session Settings to limit the lifespan of a compromised session.

ShareTweet

You Might Be Interested

OpenAI Launches Customizable Skills for Codex Coding Agent
News

OpenAI Launches Customizable Skills for Codex Coding Agent

24/12/2025
Amazon’s Alexa+ to Integrate with Four New Services
News

Amazon’s Alexa+ to Integrate with Four New Services

24/12/2025
EA Investigated for AI-Generated Content in Battlefield 6
News

EA Investigated for AI-Generated Content in Battlefield 6

24/12/2025
Apple to Start iPhone 18 Production in January
News

Apple to Start iPhone 18 Production in January

24/12/2025
Please login to join discussion

Recent Posts

  • OpenAI Launches Customizable Skills for Codex Coding Agent
  • Amazon’s Alexa+ to Integrate with Four New Services
  • EA Investigated for AI-Generated Content in Battlefield 6
  • Apple to Start iPhone 18 Production in January
  • Connect Your Phone to Wi-Fi Easily

Recent Comments

No comments to show.
  • News
  • Guides
  • Lists
  • Reviews
  • Deals
Tekmono is a Linkmedya brand. © 2015.

No Result
View All Result
  • News
  • Guides
  • Lists
  • Reviews
  • Deals