Salesloft Drift AI Breach Expands: Hundreds of Organizations Impacted, Including Google Workspace

Reviewed byNidhi Govil

10 Sources

Share

A widespread data theft campaign targeting Salesloft's Drift AI chat agent has expanded beyond Salesforce, affecting hundreds of organizations and compromising OAuth tokens across multiple platforms.

Salesloft Drift AI Breach Expands Beyond Salesforce

A widespread data theft campaign targeting Salesloft's Drift AI chat agent has expanded beyond its initial scope, affecting hundreds of organizations and compromising OAuth tokens across multiple platforms. Initially reported as impacting only Salesforce integrations, the breach has now been found to affect other services, including Google Workspace

1

.

Source: The Hacker News

Source: The Hacker News

Scope of the Breach

Google's Threat Intelligence Group (GTIG) has revealed that the breach, which began as early as August 8, 2025, is more extensive than initially thought. The attack, attributed to a threat actor group known as UNC6395, has potentially impacted over 700 organizations

5

. Companies confirmed to be affected include Cloudflare, Google Workspace, PagerDuty, Palo Alto Networks, SpyCloud, Tanium, and Zscaler.

Source: SiliconANGLE

Source: SiliconANGLE

Attack Methodology

The attackers exploited compromised OAuth and refresh tokens associated with the Salesloft Drift AI chat agent to gain unauthorized access to customer Salesforce instances and other integrated platforms. Once inside, they executed queries against various Salesforce objects, including Cases, Accounts, Users, and Opportunities tables

3

.

Data Theft and Potential Consequences

The primary objective of the attackers appears to be the theft of sensitive credentials, including:

  1. Amazon Web Services (AWS) access keys
  2. Passwords
  3. Snowflake-related access tokens

This stolen data could potentially be used for further breaches of cloud accounts and infrastructure, likely for future extortion attempts

3

.

Impact on Google Workspace

Google has confirmed that the compromise extended to its Workspace accounts. On August 9, the threat actors used stolen OAuth tokens for the "Drift Email" integration to access emails from a small number of Google Workspace accounts directly integrated with Drift

4

.

Response and Mitigation Efforts

In response to the breach:

  1. Salesloft has announced it will take Drift offline temporarily to review the application and enhance security measures

    5

    .
  2. Salesforce has disabled all Salesloft integrations with its platform as a precautionary measure

    5

    .
  3. Google has revoked the compromised tokens and disabled integration between Salesloft Drift Email and Google Workspace

    4

    .

Recommendations for Affected Organizations

Security experts and affected companies are advising the following actions:

  1. Treat all authentication tokens stored in or connected to the Drift platform as potentially compromised

    1

    .
  2. Review all third-party integrations connected to Drift instances

    1

    .
  3. Revoke and rotate credentials for all connected applications

    4

    .
  4. Investigate all connected systems for signs of unauthorized access

    4

    .
  5. Search for exposed secrets and reset any found credentials

    4

    .

Ongoing Investigation

Salesloft has engaged cybersecurity firms Mandiant and Coalition to assist with the incident response and investigation

5

. As the situation continues to evolve, affected organizations are urged to remain vigilant and take proactive measures to secure their systems and data.

TheOutpost.ai

Your Daily Dose of Curated AI News

Don’t drown in AI news. We cut through the noise - filtering, ranking and summarizing the most important AI news, breakthroughs and research daily. Spend less time searching for the latest in AI and get straight to action.

© 2025 Triveous Technologies Private Limited
Instagram logo
LinkedIn logo