Close Menu
  • Home
  • Cybercrime and Ransomware
  • Emerging Tech
  • Threat Intelligence
  • Expert Insights
  • Careers and Learning
  • Compliance

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

Unlocking Hidden Power: Why Boards Should Care About Their ‘Boring’ Systems

February 5, 2026

Critical n8n Flaw CVE-2026-25049: Command Execution Risk via Malicious Workflows

February 5, 2026

DragonForce Ransomware Strikes: Critical Business Data at Risk

February 5, 2026
Facebook X (Twitter) Instagram
The CISO Brief
  • Home
  • Cybercrime and Ransomware
  • Emerging Tech
  • Threat Intelligence
  • Expert Insights
  • Careers and Learning
  • Compliance
Home » Salesforce Customers Hit by Widespread Attack via Third-Party AI Agent
Cybercrime and Ransomware

Salesforce Customers Hit by Widespread Attack via Third-Party AI Agent

Staff WriterBy Staff WriterAugust 26, 2025No Comments4 Mins Read0 Views
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest WhatsApp Email

Fast Facts

  1. Google Threat Intelligence Group warns of a widespread data theft campaign by UNC6395, compromising over 700 organizations through a 10-day attack targeting Salesforce customers.
  2. Attackers used stolen OAuth tokens from Salesloft Drift to automate large-scale data exfiltration, mainly seeking credentials for AWS, Snowflake, and VPNs.
  3. The breach was contained after Salesloft and Salesforce revoked access on August 20, with impacted customers advised to search for and remediate compromised data.
  4. The attack demonstrated a high level of operational discipline and scale, exploiting OAuth token vulnerabilities and cloud integrations, with suspect origins still unknown.

Underlying Problem

A threat group called UNC6395 conducted a widespread data theft campaign over ten days in August, targeting hundreds of Salesforce customers who used the Salesloft Drift integration. The attackers exploited stolen OAuth tokens from Salesloft to access and exfiltrate sensitive data, including credentials for AWS, Snowflake, and VPNs, by automating the process with a Python tool and systematically searching for valuable secrets across compromised systems. This attack leveraged the interconnected nature of cloud services and third-party apps, highlighting a critical security blind spot in most organizations’ use of OAuth tokens and cloud-to-cloud integrations. The campaign’s extensive scope and disciplined methodology—covering over 700 organizations—surprised cybersecurity experts, who noted that the attackers appeared to operate with high professionalism in their query, extraction, and cover-up efforts.

The incident was first revealed after Salesloft notified affected customers and collaborated with Salesforce to revoke compromised tokens, halting the attacks by August 20. Salesforce clarified that only a small number of customers were impacted, emphasizing that the breach stemmed from a compromise of the app’s connection rather than any vulnerability in Salesforce itself. Google Threat Intelligence Group, reporting the incident, stated that the attackers’ motives remain unclear, and their precise origin is still unknown. They advised affected organizations to investigate their Salesforce instances, revoke API keys, rotate credentials, and remain vigilant for signs of data compromise. The overall tone suggests a highly organized and opportunistic attack targeting cloud service integrations, aimed at stealing sensitive credentials and possibly accessing further systems.

Critical Concerns

A recent high-profile cyber threat involves a widespread data theft campaign orchestrated by the threat group UNC6395, which targeted hundreds of Salesforce customers over a ten-day period in August by exploiting stolen OAuth tokens from the third-party AI sales tool, Salesloft Drift. Using automated Python tools, the attackers systematically accessed and exfiltrated vast volumes of sensitive data, including credentials for AWS, Snowflake, and VPNs, by leveraging a single compromised token to gain access across interconnected cloud services. While Salesforce and Salesloft swiftly revoked the compromised tokens, the attack exposed significant vulnerabilities in cloud-to-cloud integrations and OAuth token security, highlighting the persistent risks they pose to enterprise data integrity. This campaign’s highly disciplined and structured approach underscores how sophisticated threat actors are methodically exploiting misconfigured or weakly protected third-party app integrations, emphasizing the pressing need for organizations to implement rigorous credential management, continuous monitoring, and layered security controls to mitigate similar operational and data exfiltration risks in the future.

Possible Actions

Timely remediation is crucial in addressing the widespread impact of the recent attack spree linked to a third-party AI agent on hundreds of Salesforce customers. Swift action can minimize damage, restore trust, and prevent further exploitation, ensuring business continuity and safeguarding sensitive information.

Mitigation Strategies:

  • Immediate Isolation
    Disconnect affected systems from the network to contain the spread of malicious activity.

  • Threat Assessment
    Conduct a thorough investigation to identify the attack vector, scope, and affected assets.

  • Update & Patch
    Apply critical security patches and updates to vulnerable components, especially those linked to the third-party AI agent.

  • Access Review
    Reassess and revoke any unauthorized or suspicious user permissions and API access credentials.

  • Notification & Communication
    Inform affected customers and stakeholders about the breach, including recommended precautions.

Remediation Actions:

  • System Restore
    Roll back impacted systems to clean states using backups taken prior to the attack.

  • Enhanced Monitoring
    Implement advanced security monitoring tools to detect unusual activity moving forward.

  • Vendor Coordination
    Collaborate with the third-party AI provider to understand vulnerabilities and prevent recurrence.

  • Long-term Security Measures
    Develop updated security protocols, conduct regular vulnerability assessments, and enhance overall security posture.

Explore More Security Insights

Explore career growth and education via Careers & Learning, or dive into Compliance essentials.

Access world-class cyber research and guidance from IEEE.

Disclaimer: The information provided may not always be accurate or up to date. Please do your own research, as the cybersecurity landscape evolves rapidly. Intended for secondary references purposes only.

Cyberattacks-V1

AI ai chatbots amazon web services (aws) CISO Update compromise cybercrime Cybersecurity google threat intelligence group Mandiant MX1 oauth passwords Salesforce snowflake virtual private network (vpn)
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleMassive Data Breach Affects 1M Farmers Insurance Customers
Next Article Data Heist: Hackers Target Salesforce Instances
Avatar photo
Staff Writer
  • Website

John Marcelli is a staff writer for the CISO Brief, with a passion for exploring and writing about the ever-evolving world of technology. From emerging trends to in-depth reviews of the latest gadgets, John stays at the forefront of innovation, delivering engaging content that informs and inspires readers. When he's not writing, he enjoys experimenting with new tech tools and diving into the digital landscape.

Related Posts

Unlocking Hidden Power: Why Boards Should Care About Their ‘Boring’ Systems

February 5, 2026

DragonForce Ransomware Strikes: Critical Business Data at Risk

February 5, 2026

Cyber Criminals Hijack NGINX Servers to Steer Web Traffic to Malicious Sites

February 5, 2026

Comments are closed.

Latest Posts

Unlocking Hidden Power: Why Boards Should Care About Their ‘Boring’ Systems

February 5, 2026

DragonForce Ransomware Strikes: Critical Business Data at Risk

February 5, 2026

Cyber Criminals Hijack NGINX Servers to Steer Web Traffic to Malicious Sites

February 5, 2026

CISA Alerts: VMware ESXi Zero-Day Under Ransomware Attack

February 5, 2026
Don't Miss

Unlocking Hidden Power: Why Boards Should Care About Their ‘Boring’ Systems

By Staff WriterFebruary 5, 2026

Quick Takeaways ERP systems like SAP are now recognized as critical assets, with vulnerabilities causing…

DragonForce Ransomware Strikes: Critical Business Data at Risk

February 5, 2026

Cyber Criminals Hijack NGINX Servers to Steer Web Traffic to Malicious Sites

February 5, 2026

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Recent Posts

  • Unlocking Hidden Power: Why Boards Should Care About Their ‘Boring’ Systems
  • Critical n8n Flaw CVE-2026-25049: Command Execution Risk via Malicious Workflows
  • DragonForce Ransomware Strikes: Critical Business Data at Risk
  • Cyber Criminals Hijack NGINX Servers to Steer Web Traffic to Malicious Sites
  • Italy Foils Russian Cyberattack on Olympic Websites
About Us
About Us

Welcome to The CISO Brief, your trusted source for the latest news, expert insights, and developments in the cybersecurity world.

In today’s rapidly evolving digital landscape, staying informed about cyber threats, innovations, and industry trends is critical for professionals and organizations alike. At The CISO Brief, we are committed to providing timely, accurate, and insightful content that helps security leaders navigate the complexities of cybersecurity.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Unlocking Hidden Power: Why Boards Should Care About Their ‘Boring’ Systems

February 5, 2026

Critical n8n Flaw CVE-2026-25049: Command Execution Risk via Malicious Workflows

February 5, 2026

DragonForce Ransomware Strikes: Critical Business Data at Risk

February 5, 2026
Most Popular

Nokia Alerts Telecoms to Rising Stealth Attacks, DDoS Surge, and Cryptography Pressures

October 8, 20259 Views

Cyberattack Cripples 34 Devices in Telecoms Using LinkedIn Lures & MINIBIKE Malware

September 19, 20259 Views

Tonic Security Secures $7 Million to Transform Cyber Risk Reduction

July 28, 20259 Views

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025

Categories

  • Compliance
  • Cyber Updates
  • Cybercrime and Ransomware
  • Editor's pick
  • Emerging Tech
  • Events
  • Featured
  • Insights
  • Threat Intelligence
  • Uncategorized
© 2026 thecisobrief. Designed by thecisobrief.
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions

Type above and press Enter to search. Press Esc to cancel.