Tekmono
  • News
  • Guides
  • Lists
  • Reviews
  • Deals
No Result
View All Result
Tekmono
No Result
View All Result
Home News
Google Uncovers Salesforce Data Breach Campaign

Google Uncovers Salesforce Data Breach Campaign

by Tekmono Editorial Team
28/08/2025
in News
Share on FacebookShare on Twitter

Google has revealed that a threat group, identified as UNC6395, has been conducting a series of data breaches targeting organizations’ Salesforce instances by compromising OAuth tokens associated with the Salesloft Drift third-party application.

The Google Threat Intelligence Group (GTIG) reported that UNC6395 initiated a “widespread data theft” campaign starting around August 8 and continuing through at least August 18. The threat actors exploited authentication tokens within the Salesloft Drift application, an AI-powered tool designed to automate sales processes like communication, analysis, and engagement, which integrates with Salesforce databases. According to the GTIG, UNC6395 “systematically exported large volumes of data from numerous corporate Salesforce instances.”

The primary objective was to harvest sensitive credentials, including Amazon Web Services (AWS) access keys (AKIA), passwords, and Snowflake-related access tokens. After extracting the data, “the actor then searched through the data to look for secrets that could be potentially used to compromise victim environments.” To conceal their activities, the threat actors deleted query jobs.

Related Reads

Apple Unveils iPhone 17e Starting at $599

Honor Launches Thinner Magic V6 Foldable Phone

Trump Orders Immediate Halt to Anthropic AI Use

Claude AI Suffers Partial Service Disruption on March 2

Although there is no indication that logs were directly impacted, GTIG advises organizations to “review relevant logs for evidence of data exposure.” The scope of the campaign is limited to Salesloft customers who integrate their solutions with Salesforce. GTIG clarified that there is no evidence suggesting that Google Cloud customers were directly affected, but those utilizing Salesloft Drift “should review their Salesforce objects for any Google Cloud Platform service account keys.”

GTIG emphasized that “Organizations using Drift integrated with Salesforce should consider their Salesforce data compromised and are urged to take immediate remediation steps.” Salesloft collaborated with Salesforce to address the situation by revoking all active access and refresh tokens associated with the Drift application. Salesforce has also removed the Drift application from the Salesforce AppExchange “until further notice and pending further investigation.” GTIG, Salesforce, and Salesloft have all notified affected organizations.

The GTIG report follows disclosures from multiple prominent companies, including Adidas, Pandora, Allianz, Tiffany & Co., Dior, Louis Vuitton, Workday, and Google, concerning breaches via a third-party platform, reportedly Salesforce, during July and August. ShinyHunters claimed responsibility for many of these attacks, and vishing attacks have been identified as the method of compromise. In June, Google reported that a financially motivated threat group, UNC6040 (allegedly associated with ShinyHunters), was impersonating IT support staff in vishing attacks to infiltrate organizations’ Salesforce environments. Earlier in August, Google revealed that UNC6040 breached one of its Salesforce instances using these tactics.

While the timeline of some of these Salesforce breaches aligns with GTIG’s findings, the methods of compromise differ. Google stated that the UNC6395 Salesloft Drift activity is distinct from the vishing attacks attributed to UNC6040. A GTIG spokesperson confirmed, “We’ve not seen any compelling evidence connecting them.”

GTIG provided recommendations for defenders, advising impacted organizations to search for sensitive information and secrets within Salesforce objects and take appropriate actions, such as revoking API keys, rotating credentials, and conducting further investigations to determine if the secrets were misused by UNC6395. Organizations should also investigate for compromise and scan for exposed secrets by searching for the IP addresses and User-Agent strings provided by GTIG in an Indicators of Compromise section in the Mandiant blog post. It is also recommended to implement “a broader search for any activity originating from Tor exit nodes.”

Additional mitigation steps include reviewing Salesforce Event Monitoring logs for unusual activity linked to the Drift connection user, authentication activity from the Drift Connected App, and UniqueQuery events that log executed SOQL queries. Google also suggests that organizations open a Salesforce support case to obtain specific queries used by the threat actor and search Salesforce objects for potential secrets.

Google further recommended hardening access controls by ensuring that applications have the minimum necessary permissions, enforcing IP restrictions on the connected app, and defining login IP ranges to allow access only from trusted networks. Organizations are advised to rotate credentials by immediately revoking and rotating any discovered keys or secrets, resetting passwords, and configuring session timeout values in Session Settings to limit the lifespan of a compromised session.

ShareTweet

You Might Be Interested

Apple Unveils iPhone 17e Starting at 9
News

Apple Unveils iPhone 17e Starting at $599

02/03/2026
Honor Launches Thinner Magic V6 Foldable Phone
News

Honor Launches Thinner Magic V6 Foldable Phone

02/03/2026
Trump Orders Immediate Halt to Anthropic AI Use
News

Trump Orders Immediate Halt to Anthropic AI Use

02/03/2026
Claude AI Suffers Partial Service Disruption on March 2
News

Claude AI Suffers Partial Service Disruption on March 2

02/03/2026
Please login to join discussion

Recent Posts

  • Apple Unveils iPhone 17e Starting at $599
  • Honor Launches Thinner Magic V6 Foldable Phone
  • Trump Orders Immediate Halt to Anthropic AI Use
  • Claude AI Suffers Partial Service Disruption on March 2
  • Claude Chatbot Overtakes ChatGPT in US App Store

Recent Comments

No comments to show.
  • News
  • Guides
  • Lists
  • Reviews
  • Deals
Tekmono is a Linkmedya brand. © 2015.

No Result
View All Result
  • News
  • Guides
  • Lists
  • Reviews
  • Deals