Palo Alto Networks has confirmed that it was affected by a supply chain attack, resulting in the theft of customer data from its Salesforce instances.
The breach originated from a compromised third-party application, Salesloft’s Drift, and did not affect any of Palo Alto Networks’ own products or services, which the company says remain secure.
The cybersecurity firm announced that as soon as it became aware of the incident, it disconnected the vendor from its Salesforce environment and launched a full investigation led by its Unit 42 security team.
The exposed data primarily consists of business contact information, internal sales account details, and basic customer case data. Palo Alto Networks stated it is in the process of contacting a “limited number of customers” whose potentially more sensitive data may have been exposed, Palo Alto Networks said.
The widespread data theft campaign took place between August 8 and August 18, 2025. A threat actor, which Google’s Threat Intelligence Group tracks as UNC6395, leveraged compromised OAuth authentication tokens associated with the Salesloft Drift integration to gain unauthorized access and exfiltrate large volumes of data from corporate Salesforce environments.
The supply chain attack originating from the compromised Salesloft Drift application has impacted other major technology companies, including cybersecurity firm Zscaler and Google.
According to a threat brief from Unit 42, the attackers performed mass exfiltration from Salesforce objects, including Account, Contact, Case, and Opportunity records.
The primary motive appears to be credential harvesting; after stealing the data, the hackers actively scanned it for secrets like passwords and access keys for other cloud services, such as Amazon Web Services (AWS) and Snowflake, to facilitate further attacks.
Investigators noted that the actor used automated Python tools for the data theft and attempted to cover their tracks by deleting query logs.
The incident has triggered a wide industry response. On August 20, Salesloft began notifying affected customers and, in collaboration with Salesforce, revoked all active access tokens for the Drift application to sever the connection.
Salesforce also temporarily removed the Drift app from its AppExchange marketplace. Subsequent analysis from Google revealed the breach’s scope was broader than initially believed, potentially compromising all authentication tokens connected to the Drift platform, not just those integrated with Salesforce.
Palo Alto Networks’ Unit 42 has urged all organizations using the Salesloft Drift integration to act with urgency. Recommendations include conducting a thorough review of Salesforce logs for suspicious activity, particularly for a user agent string associated with the attacker’s tools (Python/3.11 aiohttp/3.12.15
), and immediately rotating any credentials or secrets that may have been stored in the compromised data.
The security team also warned affected organizations to be vigilant against follow-up social engineering attempts and to reinforce security with Zero Trust principles.
In August 2025, a widespread data theft campaign abused compromised OAuth tokens associated with Salesloft’s Drift application, a popular AI-powered chatbot and customer engagement tool. A threat actor, tracked by Google as UNC6395, leveraged these tokens to gain unauthorized access to the Salesforce environments of hundreds of organizations between August 8 and August 18.
The primary motive was credential harvesting. Attackers performed mass exfiltration of data from Salesforce objects—including customer accounts, contacts, and sales opportunities—and then scanned the stolen information for valuable secrets like AWS access keys, passwords, and Snowflake tokens to facilitate deeper network intrusions.
Confirmed victims of this supply chain attack include:
In response, Salesloft and Salesforce collaborated to revoke all active Drift integration tokens and temporarily removed the app from the Salesforce AppExchange to contain the threat.
Running parallel to the Salesloft incident is a broader, ongoing campaign attributed to a group known as “ShinyHunters” (or UNC6040). Since mid-2025, this group has successfully breached numerous major corporations by using sophisticated voice phishing, or “vishing,” tactics.
In these attacks, threat actors impersonate IT support staff in phone calls to trick employees into granting them access to the company’s Salesforce instance, often by having the employee authorize a malicious Salesforce “Connected App”.
This social engineering campaign has claimed a long list of victims, including :
Find this Story Interesting! Follow us on Google News, LinkedIn, and X to Get More Instant Updates.
A sophisticated cybercriminal campaign has emerged targeting Indonesian and Vietnamese Android users with banking trojans…
A critical stored cross-site scripting vulnerability has emerged in the popular DotNetNuke (DNN) Platform, threatening…
Phishing campaigns are getting harder to spot, sometimes hiding in files you’d never suspect. ANY.RUN’s…
Cisco has disclosed a zero-day vulnerability, CVE-2025-20352, in its widely used IOS and IOS XE…
Three sophisticated malware families have emerged as significant threats to telecommunications and manufacturing sectors across…
In recent months, a sophisticated threat actor leveraging North Korean IT worker employment fraud has…