
Hackers breached gross sales automation platform Salesloft to steal OAuth and refresh tokens from its Drift chat agent integration with Salesforce to pivot to buyer environments and exfiltrate knowledge.
The ShinyHunters extortion group claims duty for these further Salesforce assaults.
Salesloft’s SalesDrift is a third-party platform that connects the Drift AI chat agent with a Salesforce occasion, permitting organizations to sync conversations, leads, and help circumstances into their CRM.Â
In keeping with Salesloft, risk actors obtained Drift OAuth and refresh tokens used for its Salesforce integration, and used them to conduct a Salesforce knowledge theft marketing campaign between August 8 and August 18, 2025.
“Preliminary findings have proven that the actor’s major goal was to steal credentials, particularly specializing in delicate info like AWS entry keys, passwords, and Snowflake-related entry tokens,” reads a Salesloft advisory.
“We have now decided that this incident didn’t influence prospects who don’t use our Drift-Salesforce integration. Primarily based on our ongoing investigation, we don’t see proof of ongoing malicious exercise associated to this incident.”
In coordination with Salesforce, Salesloft revoked all lively entry and refresh tokens for the Drift software, requiring prospects to re-authenticate with their Salesforce cases.
To reauthenticate, admins ought to go to Settings > Integrations > Salesforce, disconnect the mixing, after which reconnect with legitimate Salesforce credentials.
Google’s Risk Intelligence staff (Mandiant) is monitoring the risk actor as UNC6395 and states that when they gained entry to a Salesforce occasion, they issued SOQL queries to extract case authentication tokens, passwords, and secrets and techniques from help circumstances, permitting them to breach additional platforms.
“GTIG noticed UNC6395 concentrating on delicate credentials equivalent to Amazon Internet Companies (AWS) entry keys (AKIA), passwords, and Snowflake-related entry tokens,” reviews Google.
“UNC6395 demonstrated operational safety consciousness by deleting question jobs, nevertheless logs weren’t impacted and organizations ought to nonetheless evaluate related logs for proof of knowledge publicity.”
To cover their infrastructure, the attackers used Tor, in addition to internet hosting suppliers equivalent to AWS and DigitalOcean. Consumer-Agent strings related to the info theft assaults embrace ‘python-requests/2.32.4’, ‘Python/3.11 aiohttp/3.12.15’, and for customized instruments utilizing ‘Salesforce-Multi-Org-Fetcher/1.0’ and ‘Salesforce-CLI/1.0’
Google has offered a listing of IP addresses and person brokers in its report to assist directors search Salesforce logs and decide in the event that they had been impacted by the assaults.
Admins of affected environments are suggested to rotate credentials after which search Salesforce objects for added secrets and techniques that will have been stolen. These embrace:
- AKIA for long-term AWS entry key identifiers
- Snowflake or snowflakecomputing.com for Snowflake credentials
- password, secret, key to seek out potential references to credential materials
- Strings associated to organization-specific login URLs, equivalent to VPN or SSO login pages
Whereas Google is monitoring this exercise beneath a brand new classifier, UNC6395, the ShinyHunters extortion group advised BleepingComputer they’re behind this exercise.
When contacted, a consultant for the group advised BleepingComputer, “No marvel issues all of a sudden stopped working yesterday.”
Ongoing Salesforce assaults
The theft of Salesloft tokens is an element of a bigger wave of Salesforce knowledge breaches linked to the ShinyHunters group, who additionally declare to overlap with risk actors categorised as Scattered Spider.
“Like we now have mentioned repeatedly already, ShinyHunters and Scattered Spider are one and the identical,” ShinyHunters advised BleepingComputer.
“They supply us with preliminary entry and we conduct the dump and exfiltration of the Salesforce CRM cases. Identical to we did with Snowflake.”
Because the starting of the 12 months, the risk actors have been conducting social engineering assaults to breach Salesforce cases and obtain knowledge.
Throughout these assaults, risk actors conduct voice phishing (vishing) to trick staff into linking a malicious OAuth app with their firm’s Salesforce cases.
As soon as linked, the risk actors used the connection to obtain and steal the databases, which had been then used to extort the corporate by means of electronic mail.
Since Google first reported the assaults in June, quite a few knowledge breaches have been tied to the social engineering assaults, together with Google itself, Cisco, Farmers Insurance coverage, Workday, Adidas, Qantas, Allianz Life, and the LVMH subsidiaries Louis Vuitton, Dior, and Tiffany & Co.
With these further assaults, the risk actors have expanded their techniques to not solely extort firms however to make use of stolen knowledge to additionally breach downstream prospects’ cloud companies and infrastructure.

