Close Menu
  • Home
  • Cyber security
    • Mobile security
    • Computer Security
    • Malware
  • Cyber news
    • Data breaches
  • Top10
  • Cyber Insurance
  • Cyber law & Compliance
  • About us
X (Twitter) Instagram Threads LinkedIn WhatsApp
Trending
  • Top 16 Most Exploited CVEs of 2025 – Critical Vulnerabilities Analysis
  • A Step-by-Step Checklist to Prepare Your Business for Cyber Insurance (2026 Guide)
  • Kali Linux 2025.4 Released: New Tools, Wayland & Wifipumpkin3
  • India Rolls Back Sanchar Saathi Cybersecurity App: What It Means for Your Digital Safety
  • Is Your Business Really Protected? A Deep Dive Into Cyber Liability Coverage
  • 5 Web Security Threats 2025 That Transformed Online Protection Forever
  • What Cyber Insurance Doesn’t Cover & How to Fix the Gaps
  • 5 Simple Hacks to Secure Your Personal Computer
Monday, December 15
Cyber infosCyber infos
X (Twitter) Instagram LinkedIn WhatsApp
  • Home
  • Cyber security
    • Mobile security
    • Computer Security
    • Malware
  • Cyber news
    • Data breaches
  • Top10
  • Cyber Insurance
  • Cyber law & Compliance
  • About us
Cyber infosCyber infos
Data breaches

Palo Alto Networks Hit by Salesforce Breach Through Drift Integration

Cyber infosBy Cyber infosSeptember 2, 2025No Comments4 Mins Read
Facebook Twitter Pinterest LinkedIn Email WhatsApp Copy Link
Follow Us
X (Twitter) Instagram LinkedIn WhatsApp Telegram Threads
Share
Facebook Twitter Pinterest Threads Copy Link

In a troubling new twist in the world of supply chain cyberattacks, cybersecurity giant Palo Alto Networks has confirmed that attackers breached its internal Salesforce environment by exploiting a third-party integration — specifically, a compromised link between Salesloft and its Drift application.

The breach, which took place earlier in August, allowed threat actors to siphon off business contact details, sales account data, and internal case records. While the company insists that no core products or services were affected, the incident has raised fresh concerns over the security of interconnected SaaS platforms.

“We immediately disconnected the vendor and launched a full investigation,” Palo Alto Networks said in a statement. “Our products remain secure and fully operational.”

Table of Contents hide
1 What We Know So Far
2 Not Just Palo Alto
3 Sound Familiar?
4 What Should You Do?
5 Still More Questions Than Answers
6 Final Thoughts

What We Know So Far

Between August 8 and August 18, attackers were able to compromise OAuth credentials linked to the Drift application — a tool often used to help sales teams manage communications.

With those tokens in hand, the attackers gained access to several Salesforce environments, including Palo Alto’s. From there, they pulled data from commonly used Salesforce objects like Accounts, Contacts, Cases, and Opportunities.

To cover their tracks, the intruders reportedly deleted query logs that could have revealed what they accessed and when — a clear sign that this wasn’t a simple smash-and-grab operation, but a calculated move in a larger campaign.

Not Just Palo Alto

This attack doesn’t appear to be isolated. According to Palo Alto’s Unit 42 threat intelligence team, this is part of a broader pattern targeting Salesforce users through third-party tools like Drift.

Salesloft, the company behind Drift, has since confirmed the issue and revoked all related access tokens — essentially forcing a logout for affected users. It also says all impacted customers have been notified.

Sound Familiar?

Unfortunately, this isn’t the first time OAuth token abuse has played a central role in a high-profile breach.

  • HubSpot (2022): Attackers exploited employee credentials to steal data from crypto firms.
  • Mailchimp (2023): Compromised access was used for targeted phishing attacks.
  • Snowflake-related breaches (2025): OAuth abuse became a key technique for moving laterally across cloud systems.

These cases all highlight the same problem: the more we connect our systems, the more doors we leave open — and sometimes, it only takes one unlocked window.

Palo Alto Networks Hit by Salesforce Breach Through Drift Integration

What Should You Do?

If your organization uses Salesforce, Salesloft, or the Drift app, now’s the time to take a closer look under the hood. Palo Alto Networks and other experts are urging companies to act quickly and review their logs and credentials.

Here’s what security teams should focus on:

  • Audit Logs Thoroughly: Review Salesforce login histories, API logs, and query records going back to early August. Look for unusual IP addresses or strange user agents like: Python/3.11 aiohttp/3.12.15
  • Change Credentials Immediately: Rotate all Salesforce API keys, OAuth tokens, and app secrets. Use tools like TruffleHog or GitLeaks to identify exposed secrets.
  • Monitor Identity & Network Traffic: Watch for suspicious login attempts or abnormal network patterns in your proxy or IdP logs.
  • Harden Permissions: Apply least-privilege access, enforce MFA, and implement Zero Trust policies across all integrations.

“Just because it’s a trusted app doesn’t mean it’s safe forever,” said Shira Cohen, a cybersecurity advisor with two decades of experience. “You need to treat integrations like they’re external — because, in effect, they are.”

Still More Questions Than Answers

While Palo Alto is actively investigating and working with Salesforce and Salesloft to assess the full scope, several key questions remain:

  • Who’s behind the breach? No group has been publicly identified.
  • Could other companies using Drift also be affected?
  • Were attackers specifically targeting Palo Alto — or casting a wider net?

Palo Alto says its Unit 42 team is continuing to monitor the threat and will release more information as it becomes available. Salesforce is also supporting affected clients and providing security guidance.

Final Thoughts

The breach is a reminder that even the most security-conscious organizations can fall victim — not because of a failed firewall, but because of a weak link in the third-party chain.

If you’re using SaaS tools and haven’t recently reviewed your integrations, now is the time. As your systems become more connected, your attack surface grows — and attackers know it.

“Don’t wait for an incident to start doing the basics,” Cohen warned. “Once someone’s in, it’s too late to wish you’d enabled logging or rotated that token last month.”

Stay tuned for updates — and if you’re a customer of any of the affected platforms, check your support portals for official communication.

Follow on X (Twitter) Follow on Instagram Follow on LinkedIn Follow on WhatsApp Follow on Threads
Share. Facebook Twitter Pinterest Threads Telegram Email LinkedIn WhatsApp Copy Link
Previous ArticleGoogle Urges 2.5B Gmail Users to Reset Passwords After Salesforce Data Breach
Next Article Tenable Data Breach: What Happened, Risks and Key Lessons for Businesses
Cyber infos
  • Website

Related Posts

Capita Data Breach: £14 Million Fine Exposes 6.6 Million Users’ Personal Information

October 17, 2025
Read More

Discord Data Breach 2025: 1.5 TB Data Leak Exposes Millions of ID Photos

October 9, 2025
Read More

Tenable Data Breach: What Happened, Risks and Key Lessons for Businesses

September 8, 2025
Read More
Add A Comment
Leave A Reply Cancel Reply

Cyber news

India Rolls Back Sanchar Saathi Cybersecurity App: What It Means for Your Digital Safety

December 7, 2025

Android Users Warned: New Sturnus Malware Can Read Your Chats & Empty Your Bank

November 24, 2025

Android Photo Frames Malware: A Hidden Threat to Your Home Network

November 15, 2025

Google Maps Review Extortion: New Feature Lets Businesses Report Fake Reviews and Scams

November 9, 2025

Top 10

Top 10 Best Autonomous Endpoint Management Tools in 2025

November 14, 2025

mobile security

How to Prevent SIM Swap Attacks and Protect Your Mobile Number

February 23, 2025

How to Recover Lost Data from a Compromised Smartphone – Complete Guide

February 22, 2025

Are AI-Generated Passwords More Secure than Human-Created Ones?

February 13, 2025

Selling Your Phone? Follow This Guide to Ensure Your Data is 100% Gone!

February 9, 2025
Archives
Cyber Insurance

A Step-by-Step Checklist to Prepare Your Business for Cyber Insurance (2026 Guide)

December 14, 2025

Is Your Business Really Protected? A Deep Dive Into Cyber Liability Coverage

December 6, 2025

What Cyber Insurance Doesn’t Cover & How to Fix the Gaps

December 1, 2025

Top Cyber Risks Today and How Cyber Insurance Protects You in 2025

November 28, 2025

What Every Business Owner Must Know Before Buying Cyber Insurance in 2025

November 26, 2025
Recents

Top 16 Most Exploited CVEs of 2025 – Critical Vulnerabilities Analysis

December 15, 2025

A Step-by-Step Checklist to Prepare Your Business for Cyber Insurance (2026 Guide)

December 14, 2025

Kali Linux 2025.4 Released: New Tools, Wayland & Wifipumpkin3

December 13, 2025

India Rolls Back Sanchar Saathi Cybersecurity App: What It Means for Your Digital Safety

December 7, 2025

Is Your Business Really Protected? A Deep Dive Into Cyber Liability Coverage

December 6, 2025
Pages
  • About us
  • Contact us
  • Disclaimer
  • Privacy policy
  • Sitemaps
  • Terms and conditions
About us

We delivers trusted cybersecurity updates, expert analysis, and online safety tips. We help individuals and businesses understand cyber threats and protect their digital world with accurate, easy-to-read information.

X (Twitter) Instagram Pinterest LinkedIn WhatsApp Threads
  • Contact us
  • Sitemaps
© 2025 Cyberinfos - All Rights are Reserved

Type above and press Enter to search. Press Esc to cancel.