Salesloft: March GitHub Repo Breach Led to Salesforce Data Theft Attacks
Threat actor UNC6395 accessed Salesloft's GitHub and AWS environments from March to June, stealing OAuth tokens used to compromise hundreds of organizations in August, Mandiant found.
10 Articles
10 Articles
Salesloft Drift security incident started with undetected GitHub access
Salesloft pinned the root cause of the Drift supply-chain attacks to a threat group gaining access to its GitHub account as far back as March, the company said in an update Saturday. During a 10-day period in mid-August, the threat group compromised and stole data from hundreds of organizations. The threat group, which Google tracks as UNC6395, spent time lurking in the Salesloft application environment, downloaded content from multiple reposi…

Salesloft breach exposed sensitive data of 700+ firms, including Cloudflare and Palo Alto Networks, after hackers exploited OAuth tokens via a prolonged GitHub intrusion.
GitHub Breach Exposed 700+ Companies in Months-Long Attack
Cybersecurity investigators say a massive supply-chain attack affecting over 700 companies began with a seemingly minor GitHub breach earlier this year. Salesloft first disclosed a security issue in the Drift application on Aug. 21, then shared more details about malicious OAuth token abuse five days later. According to an investigation by Mandiant, which is aiding Salesloft, the threat actors first gained access to its GitHub environment betwee…
A GitHub repository belonging to US marketing company Salesloft was hacked, exposing AWS environment credentials. Hackers used these credentials to obtain OAuth tokens, allowing them to access CRM data from companies like Cloudflare and Google. The incident affected at least 750 companies.
Coverage Details
Bias Distribution
- 100% of the sources are Center
Factuality
To view factuality data please Upgrade to Premium