Overview
- GTIG reports that attackers used stolen OAuth and refresh tokens from Salesloft’s Drift integration between August 8 and 18 to access and export data from hundreds of customer instances.
- Over 700 organizations are potentially impacted, with automated queries pulling data from objects such as Cases, Accounts, Users, and Opportunities.
- The campaign focused on harvesting secrets including AWS access keys, passwords, VPN details, and Snowflake tokens to enable downstream compromise.
- Salesloft and Salesforce revoked Drift access and refresh tokens on August 20, removed the app from AppExchange, required reauthentication, and notified affected customers.
- UNC6395 used Tor and cloud hosts and deleted query jobs to obscure activity, but GTIG released IPs and user-agent IOCs and urged Drift–Salesforce customers to assume compromise, search for secrets, and rotate credentials; Salesforce says a small number of customers were accessed via the app connection as attribution remains disputed after a ShinyHunters claim.