Between August 8 and August 18, 2025, threat actor UNC6395 launched a targeted data exfiltration campaign exploiting OAuth tokens associated with the Salesloft Drift third-party integration for Salesforce. The attacker systematically accessed sensitive corporate data across multiple organizations, with a focus on credential harvesting and environment compromise. The incident underscores the critical risks of unsecured third-party integrations and token-based authentication abuse.
Severity Level: High
Threat Actor Activity
UNC6395 exploited compromised OAuth tokens linked to the Salesloft Drift application. These tokens granted unauthorized access to Salesforce instances, allowing the attacker to:
- Authenticate as a connected app via Drift
- Issue SOQL queries against sensitive Salesforce objects (Accounts, Cases, Users, Opportunities)
- Exfiltrate large volumes of structured CRM data
- Search for embedded secrets and credentials, including:
- AWS access keys (AKIA)
- Snowflake credentials
- Hardcoded passwords or secrets
- Organization-specific login URLs (VPN, SSO, etc.)
The campaign expanded beyond Salesforce to include Google Workspace accounts integrated with Drift Email, although the affected scope was narrowly defined and specific to certain configurations.
Data Access & Exfiltration
GTIG observed the attacker executing the following SOQL queries:
- SELECT COUNT() FROM Account;
- SELECT COUNT() FROM Opportunity;
- SELECT COUNT() FROM User;
- SELECT COUNT() FROM Case;
— Example for user data extraction
SELECT Id, Username, Email, Department, Division, CreatedDate, LastLoginDate FROM User WHERE IsActive = true
The goal was to enumerate and extract:
- User account metadata
- Business opportunity records
- Customer case history
- Credentials hidden within object data
After data extraction, query logs were deleted, suggesting operational security awareness, although logs from Salesforce’s Event Monitoring were unaffected.
Affected Scope
- Customers using Salesloft Drift integrated with Salesforce were directly impacted
- Customers using Drift Email integration with Google Workspace may have had limited exposure
- No breach occurred within Salesforce’s core platform or Google Workspace infrastructure
Mitigation Measures Already Taken
- Salesloft revoked all OAuth tokens linked to Drift
- Salesforce removed Drift from AppExchange
- Google disabled Drift integration with Workspace and notified impacted admins
Recommendations
- It is recommended for organizations to review all third-party integrations connected to their Drift instance, revoke and rotate API keys, credentials and authentication tokens for those applications, and investigate all connected systems for signs of unauthorized access.
- Immediately revoke and rotate any discovered keys or secrets.
- Reset passwords for associated user accounts.
- For Salesforce integrations, configure session timeout values in Session Settings to limit the lifespan of a compromised session.
- Review Salesforce Event Monitoring logs for unusual activity associated with the Drift connection user.
- Review authentication activity from the Drift Connected App.
- Review UniqueQuery events that log executed SOQL queries.
- Open a Salesforce support case to obtain specific queries used by the threat actor.
- Search Salesforce objects for potential secrets, such as:
- AKIA for long-term AWS access key identifiers
- Snowflake or snowflakecomputing.com for Snowflake credentials
- password, secret,key to find potential references to credential material
- Strings related to organization-specific login URLs, such as VPN or SSO login pages
- Run tools like Trufflehog to find secrets and hardcoded credentials.
- Block the IOCs at their respective controls
https://www.virustotal.com/gui/collection/722fb67674b7707c0e6e2d5af5f21d8540f0ced97987d16fef725e464fa5b596/iocs
Source:
- https://cloud.google.com/blog/topics/threat-intelligence/data-theft-salesforce-instances-via-salesloft-drift?e=48754805
- https://trust.salesloft.com/?uid=Drift%2FSalesforce+Security+Notification
- https://status.salesforce.com/generalmessages/20000217
Enjoyed reading this Threat Intelligence Advisory? Stay updated with our latest exclusive content by following us on Twitter and LinkedIn
No related posts found.