Particle.news

Download on the App Store

Zscaler and Palo Alto Networks Confirm Salesforce Data Exposure in Salesloft Drift Token Theft

Google warns the campaign also touched limited Workspace email through Drift Email tokens.

Overview

  • Both companies say attackers used stolen OAuth and refresh tokens tied to the Salesloft Drift app to access their Salesforce environments and extract contact and support‑case data.
  • Zscaler reports exposure of business contact details, licensing information, and plaintext content from certain support cases, with no impact to its products or infrastructure.
  • Palo Alto Networks says the theft involved contact and account information plus basic case text, not technical files or attachments, and confirms no effect on its products, systems, or services.
  • Google’s Threat Intelligence Group attributes the campaign to UNC6395 between August 8 and 18, notes mass exports from Account, Contact, Case, and Opportunity objects, and urges treating all Drift‑connected tokens as compromised.
  • Investigators cite automated tooling, Tor exit nodes, and a malicious AWS account in related indicators, while vendors have revoked tokens, disabled Drift integrations, and continue forensic reviews with attribution still unproven.