No Result
View All Result
  • Login
Sunday, September 14, 2025
FeeOnlyNews.com
  • Home
  • Business
  • Financial Planning
  • Personal Finance
  • Investing
  • Money
  • Economy
  • Markets
  • Stocks
  • Trading
  • Home
  • Business
  • Financial Planning
  • Personal Finance
  • Investing
  • Money
  • Economy
  • Markets
  • Stocks
  • Trading
No Result
View All Result
FeeOnlyNews.com
No Result
View All Result
Home Market Analysis

The Abyss Of The Salesloft-Salesforce Breach May Reach The Challenger Deep

by FeeOnlyNews.com
2 days ago
in Market Analysis
Reading Time: 3 mins read
A A
0
The Abyss Of The Salesloft-Salesforce Breach May Reach The Challenger Deep
Share on FacebookShare on TwitterShare on LInkedIn


News has been trickling out since August 20 about a security issue in Salesloft’s Drift product, a marketing and sales chatbot that integrates with CRM systems to capture and track sales opportunities. The issue started in March, when threat actors accessed Salesloft’s GitHub account and did reconnaissance, which helped them access Drift’s AWS environment and obtain OAuth tokens. From there, they accessed Drift customers’ Salesforce instances from August 8–18.

Salesforce has suffered repeated attacks this year where advanced persistent threats (APTs) compromised customer databases by targeting individual companies. This attack is much broader in terms of both scope and number of companies affected, as Drift is a popular tool used by over 700 companies. Its customers include several notable cybersecurity vendors such as Black Duck, Cloudflare, Okta, OneTrust, Palo Alto Networks, Proofpoint, and Zscaler.

What Data Was Compromised?

By design, Drift is meant to improve sales engagement with prospects and customers. Its integration with CRM systems lets Drift track leads, update CRM records, and trigger follow-up actions. Because of the Salesforce integration, the threat actors were able to access:

Sensitive information about client environments such as IP addresses, account information, and access tokens. These are stored in clear text within support case notes to make supporting that customer easier when a case is passed to multiple analysts, but for a hacker, this gives them critical access details to the client’s infrastructure.
Standard information about accounts such as client contact data, sales pipeline, support history, and business strategy. This information seems generic, but for social engineering campaigns, these are the details that threat actors need to make their engagement more believable.

Actions To Take Now To Reduce The Threat To Your Business

While Salesloft has reset the authentication tokens and temporarily disabled Drift, impacted businesses need to take further steps to protect themselves and their employees. After working with their third-party risk management program to define the scope of the breach, companies should take the following actions:

Revoke and rotate all API keys, credentials, and authentication tokens associated with the integration. Additionally, if your investigation of your Salesforce data uncovers any hardcoded secrets or exposed API keys/credentials, they must be rotated immediately. Establish a regular rotation schedule for all API keys and other secrets used in third-party integrations to reduce the window of exposure.
Tune tech and train teams for the social engineering onslaught. Various human-element breach types and tactics will spring up in the coming weeks and months based on the data that was extracted, requiring specific tech and process controls. Your email, messaging, and collaboration security solution and your employees should be tuned to spot the traditional signs of social engineering: authority, novelty, and urgency. Employees should be encouraged — and publicly praised — to pause in the face of these signs and seek additional verification before providing information or completing transactions.
Institute least privileged access controls on your data used by third parties. The guidance we’ve provided on SaaS security applies equally to app developers and customers to limit access to data to only what is needed for that function to execute. In this campaign, companies that restricted inbound access from approved IP addresses did not have their Salesforce data extracted, even though they were targeted. Utilize SaaS security posture management solutions to uncover the risks in your SaaS deployments and improve threat monitoring of your configurations within these apps to limit your exposure based on identified risks.
Secure your software supply chain. Start with an inventory of all software used in the development and delivery process; this includes open-source software tools and components. Ensure that dev environments, pipelines, and source-code management systems utilize Zero Trust principles, have phishing-resistant multifactor authentication enforced, enable branch protection, monitor for security misconfigurations, automate application security testing, and utilize a secrets management solution to avoid any credentials, tokens, or environment variables being passed in plaintext.
Define your incident escalation matrix. Delineate severity levels and assess materiality in the context of the regulatory requirements to which your organization is beholden. Socialize this matrix with all internal and external stakeholders, and work with outside counsel and your incident response service provider to develop executive and board tabletop exercises involving complex, cascading nth-party breach and breach notification scenarios.

Stay Tuned

Details continue to emerge from Salesloft as well as businesses directly impacted by the breach. Because we still don’t know how many companies were victims of data theft or the exact attack details, the total impact remains unclear. The security and risk team at Forrester will provide updates to help clients as new details come to light.



Source link

Tags: AbyssbreachChallengerDeepreachSalesloftSalesforce
ShareTweetShare
Previous Post

Microsoft: Startet jetzt der Angriff auf das Rekordhoch?

Next Post

Important takeaways from Adobe’s (ADBE) Q3 2025 earnings report

Related Posts

School Is In Session And Attackers Are Grading Your Software Supply Chain Security

School Is In Session And Attackers Are Grading Your Software Supply Chain Security

by FeeOnlyNews.com
September 12, 2025
0

Software supply chain attacks continue to be a top external attack vector for attackers to breach enterprises, government agencies, and...

Rewind And Fast-Forward TV Advertising

Rewind And Fast-Forward TV Advertising

by FeeOnlyNews.com
September 12, 2025
0

TV’s stakeholders — consumers, advertisers, and publishers — are out of sync. Consumers love streaming TV but say they don’t...

Answer Engines Outpace Antitrust Law

Answer Engines Outpace Antitrust Law

by FeeOnlyNews.com
September 12, 2025
0

To remedy Google’s monopoly in search, Judge Amit Mehta ruled that Google merely has to share limited search data with...

Digital Analytics Solutions, Q3 2025

Digital Analytics Solutions, Q3 2025

by FeeOnlyNews.com
September 12, 2025
0

Digital analytics is no longer just about tracking clicks and page views — it’s about unlocking the full story behind...

From Hype To Scalable Impact

From Hype To Scalable Impact

by FeeOnlyNews.com
September 12, 2025
0

Artificial intelligence has moved from the margins to the mainstream. But as the buzz around generative and agentic AI intensifies,...

Adaptive Mobile Banking: Forrester’s 2025 European Insights

Adaptive Mobile Banking: Forrester’s 2025 European Insights

by FeeOnlyNews.com
September 12, 2025
0

Mobile banking continues to evolve. As banks race to deploy conversational experiences, mobile apps are becoming the primary stage for...

Next Post
Important takeaways from Adobe’s (ADBE) Q3 2025 earnings report

Important takeaways from Adobe’s (ADBE) Q3 2025 earnings report

44% of People With This Debilitating Disease Don’t Know They Have It

44% of People With This Debilitating Disease Don’t Know They Have It

  • Trending
  • Comments
  • Latest
1 Stock to Buy, 1 Stock to Sell This Week: Walmart, Target

1 Stock to Buy, 1 Stock to Sell This Week: Walmart, Target

August 17, 2025
Of Property Rights, Civil Society, and Shampoo

Of Property Rights, Civil Society, and Shampoo

September 1, 2025
Engine Capital takes a stake in Avantor. Activist sees several ways to create value

Engine Capital takes a stake in Avantor. Activist sees several ways to create value

August 16, 2025
James Galbraith: Crash in Top Economist Hiring Contradicts Elite-Favoring “Skill Biased Technical Change” Theory

James Galbraith: Crash in Top Economist Hiring Contradicts Elite-Favoring “Skill Biased Technical Change” Theory

September 2, 2025
Vanguard reaches .5M SEC settlement

Vanguard reaches $19.5M SEC settlement

August 29, 2025
RBC wealth revenue rises despite recruiting costs

RBC wealth revenue rises despite recruiting costs

August 27, 2025
North Korean hackers used ChatGPT to help forge deepfake ID

North Korean hackers used ChatGPT to help forge deepfake ID

0
Evaluating We Have Never Been Woke, Part 1: Elite Overproduction

Evaluating We Have Never Been Woke, Part 1: Elite Overproduction

0
Native Markets Takes Home The Prize, Secures USDH Ticker After Heated Race

Native Markets Takes Home The Prize, Secures USDH Ticker After Heated Race

0
9 Claim Mistakes That Get Perfectly Valid Losses Denied

9 Claim Mistakes That Get Perfectly Valid Losses Denied

0
Phoenix to finance four Enav urban renewal projects

Phoenix to finance four Enav urban renewal projects

0
This crypto investor correctly predicted bitcoin would hit 0K in 2025. He now expects it to double in the next year.

This crypto investor correctly predicted bitcoin would hit $120K in 2025. He now expects it to double in the next year.

0
Native Markets Takes Home The Prize, Secures USDH Ticker After Heated Race

Native Markets Takes Home The Prize, Secures USDH Ticker After Heated Race

September 14, 2025
North Korean hackers used ChatGPT to help forge deepfake ID

North Korean hackers used ChatGPT to help forge deepfake ID

September 14, 2025
This crypto investor correctly predicted bitcoin would hit 0K in 2025. He now expects it to double in the next year.

This crypto investor correctly predicted bitcoin would hit $120K in 2025. He now expects it to double in the next year.

September 14, 2025
Nepal’s New PM Sushila Karki vows to heed Gen Z protesters after deadly unrest

Nepal’s New PM Sushila Karki vows to heed Gen Z protesters after deadly unrest

September 14, 2025
Phoenix to finance four Enav urban renewal projects

Phoenix to finance four Enav urban renewal projects

September 14, 2025
Utah governor blasts ‘conflict entrepreneurs’ after Charlie Kirk assassination

Utah governor blasts ‘conflict entrepreneurs’ after Charlie Kirk assassination

September 14, 2025
FeeOnlyNews.com

Get the latest news and follow the coverage of Business & Financial News, Stock Market Updates, Analysis, and more from the trusted sources.

CATEGORIES

  • Business
  • Cryptocurrency
  • Economy
  • Financial Planning
  • Investing
  • Market Analysis
  • Markets
  • Money
  • Personal Finance
  • Startups
  • Stock Market
  • Trading

LATEST UPDATES

  • Native Markets Takes Home The Prize, Secures USDH Ticker After Heated Race
  • North Korean hackers used ChatGPT to help forge deepfake ID
  • This crypto investor correctly predicted bitcoin would hit $120K in 2025. He now expects it to double in the next year.
  • Our Great Privacy Policy
  • Terms of Use, Legal Notices & Disclaimers
  • About Us
  • Contact Us

Copyright © 2022-2024 All Rights Reserved
See articles for original source and related links to external sites.

Welcome Back!

Sign In with Facebook
Sign In with Google
Sign In with Linked In
OR

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Home
  • Business
  • Financial Planning
  • Personal Finance
  • Investing
  • Money
  • Economy
  • Markets
  • Stocks
  • Trading

Copyright © 2022-2024 All Rights Reserved
See articles for original source and related links to external sites.