Overview
- Attackers used compromised OAuth and refresh tokens from Salesloft’s Drift integration to access and export data from Salesforce customer instances between August 8 and 18, 2025.
- GTIG says it is aware of over 700 potentially impacted organizations, while Salesforce describes the number of affected customer instances via the Drift connection as small.
- The campaign focused on harvesting high‑value secrets, including AWS access keys, passwords, VPN/SSO details, and Snowflake tokens, to enable downstream compromise.
- Operations were automated with Python tools using identifiable user‑agent strings, and the actor attempted to delete query jobs to hide activity, but relevant logs remained available for review.
- Salesloft and Salesforce revoked Drift tokens on August 20 and removed the app from AppExchange; customers using the integration must reauthenticate, review IOCs, and rotate exposed credentials, as ShinyHunters’ claim of responsibility remains uncorroborated by Google.