chat
expand_more

When Integrations Become Exploits: What the Salesloft Drift Breach Reveals

The Salesloft Drift breach exploited OAuth to compromise Salesforce data across 700+ orgs, exposing SaaS integration and posture management risks.

Callie Baron, Piotr Wojtyla

September 5, 2025

/

6 min read

Placeholder

In late August, researchers uncovered one of the most impactful SaaS compromises of the year: a campaign that weaponized trusted integrations to infiltrate hundreds of Salesforce environments. While the headlines have focused on stolen customer data from major organizations like Zscaler, Palo Alto Networks, and Cloudflare, the full picture is even more alarming.

This breach highlights how today’s cloud-first businesses face risks that extend well beyond phishing emails or perimeter defenses. By compromising OAuth tokens issued to Salesloft’s Drift integration, threat actors not only accessed sensitive Salesforce records but also leveraged those tokens to infiltrate connected email accounts.

It’s a clear reminder that email compromise in 2025 doesn’t always start with a phish, and that defending against it requires a broader approach to cloud email security.

How the Attack Was Executed

According to Google’s Threat Intelligence Group (GTIG), the campaign—tracked as UNC6395—ran between August 8 and 18, 2025. Attackers abused OAuth tokens tied to the Salesloft Drift app to query Salesforce objects across hundreds of customer organizations. Their queries were targeted and deliberate: Accounts, Users, Opportunities, and especially Cases, where they sought secrets like AWS access keys, Snowflake tokens, VPN credentials, and passwords.

The attackers attempted to cover their tracks by deleting query jobs but could not erase the audit logs, leaving investigators a trail of their activity. By August 20, Salesforce and Salesloft revoked all active Drift tokens, removed the app from the AppExchange, and notified impacted customers.

The attack didn’t stop there. A few days later, GTIG revealed that threat actors also compromised Drift Email tokens. Using these, the attackers accessed a limited set of Google Workspace accounts and exfiltrated email data. Additional investigation showed attempts to use stolen Salesforce credentials to access Amazon S3 cloud storage.

This wasn’t a smash-and-grab. The campaign was disciplined, systematic, and designed to maximize its blast radius across the SaaS ecosystem.

The Scope of the Breach

Initial reports suggested “hundreds” of Salesforce instances were affected. By early September, the true scale became clearer: over 700 companies were impacted, including some of the world’s most prominent cybersecurity vendors.

  • Confirmed targets include Zscaler, Palo Alto Networks, Tanium, SpyCloud, PagerDuty, Cloudflare, Tenable, and Rubrik.

  • Cloudflare later disclosed that 104 API tokens were stolen from their Salesforce Case system, containing customer-submitted support information.

  • WideField researchers observed suspicious log activity suggesting attackers had infiltrated data from both Salesforce environments and Gmail accounts.

While most organizations reported that their core infrastructure remained intact, the theft of secrets and customer data poses serious downstream risk. Exfiltrated API keys, tokens, and credentials can enable attackers to move laterally into other systems. Stolen customer data—especially support tickets—can be weaponized for spear phishing, impersonation attacks, and social engineering.

What Makes This Attack Different

Most email compromises start with an inbound phish; this breach is different. Attackers gained access without sending a single phishing email.

Instead, attackers exploited the trust placed in OAuth connections—tokens that organizations willingly granted to integrate apps with their SaaS platforms. Once those tokens were compromised, attackers could move laterally into both Salesforce and email without triggering traditional defenses. No suspicious attachment, no malicious URL, and no user clicking “allow access.” The trust decision had already been made, sometimes years earlier.

This attack underscores a key reality: in the cloud email era, compromise can happen even when the inbox is never touched.

Email Security Beyond the Gateway

For decades, secure email gateways (SEGs) have focused on inspecting inbound mail for spam, phishing, or malware. That approach is necessary but increasingly insufficient. Attacks like the Salesloft Drift breach reveal an entirely different risk surface:

  • OAuth Abuse: Tokens granted to third-party apps can provide attackers with persistent, trusted access.

  • Account Takeover (ATO): Once email accounts are accessible, attackers can monitor communications, redirect invoices, and impersonate employees.

  • Supply Chain Risk: Compromise of a single integration can cascade across hundreds of organizations, as we saw here.

A SEG cannot monitor API tokens; it cannot detect unusual login patterns within Salesforce. And it certainly cannot connect the dots between suspicious OAuth activity and a sudden spike in email data access.

This is why organizations need a cloud-native email security platform that goes beyond the gateway, with visibility into application permissions, account activity, and identity-based anomalies.

Account Takeover: OAuth as the New Attack Vector

Account takeover remains one of the most damaging outcomes of an email breach. Once an attacker controls a legitimate account, they can:

The Drift breach is also a reminder that account takeover no longer requires credential phishing. By inheriting OAuth tokens from a trusted app, attackers gained access without ever stealing a password. Long-lived tokens also acted like master keys, granting persistent access until explicitly revoked. Because this activity appeared as legitimate Drift traffic, it blended into normal API usage, making detection even more challenging.

Defending against ATO requires continuous monitoring of identity and access patterns, not just filtering inbound mail. Abnormal’s behavioral AI detects when accounts act outside their normal patterns, regardless of how access was obtained.

Managing the Risks of SaaS Integrations

Another key lesson is the importance of security posture management (SPM) for SaaS platforms. Many organizations grant broad OAuth permissions to integrations without regularly reviewing them. Over time, unused or overly permissive connections become forgotten backdoors—exactly what UNC6395 exploited.

The Drift incident revealed how many organizations had unknowingly granted broad, persistent permissions to third-party integrations like Drift. Few had visibility into where OAuth tokens were stored, how long they lived, or whether Drift’s own security posture had been adequately assessed. These blind spots allowed attackers to move freely once tokens were compromised.

SPM enables organizations to:

  • Discover all connected apps across SaaS platforms like Microsoft 365, Google Workspace, and Salesforce

  • Assess the risk of each integration based on its permissions and activity

  • Alert on unusual API usage or anomalous access patterns

  • Enforce least-privilege principles by revoking unused or unnecessary tokens

In the Drift case, organizations with mature SaaS posture management would have been better positioned to detect unusual queries or revoke unnecessary tokens before attackers could capitalize.

Implications for the Broader SaaS Ecosystem

The Salesloft Drift breach illustrates several sobering truths:

SaaS Supply Chains Are an Expanding Attack Surface

Just as SolarWinds highlighted software supply chain risk, this incident shows how SaaS integrations can be exploited at scale. A compromise in one app can ripple across hundreds of customers.

Trust Can Be Weaponized

OAuth and API tokens are designed for convenience and interoperability. But when stolen, they become stealthy persistence mechanisms that evade traditional defenses.

Email Compromise Is Evolving

Attackers no longer need to send phishing messages to breach inboxes. The era of cloud email compromise through identity and integration abuse is here.

Traditional Tools Fall Short

Gateways can’t see OAuth, and log analysis alone is insufficient without enrichment from threat intel. Organizations need platforms that connect email, identity, and app activity in one lens.

Convergence of Risks

The Drift breach shows how email compromise, account takeover, and SaaS misconfiguration are converging—all driven by OAuth abuse. Defenders can no longer treat these as isolated problems. Unified visibility across email, identity, and integrations is essential.

How Abnormal Can Help

Abnormal is uniquely positioned to defend against the new realities of SaaS and email compromise:

Behavioral AI for Email Security

Detects anomalous activity within accounts, spotting ATO and other threats, even when no phishing email is involved.

Account Takeover Protection

Monitors login activity, geographic anomalies, and behavioral deviations to flag compromised accounts quickly.

Security Posture Management

Provides visibility into all connected apps and OAuth permissions, helping organizations identify risky integrations and revoke unnecessary tokens.

Holistic View Across SaaS

By combining identity insights, email telemetry, and integration monitoring, Abnormal stops the kinds of stealthy attacks that traditional defenses miss.

Defending Against the Next Drift-Style Breach

Ultimately, this breach is a wake-up call. The attackers didn’t need to trick employees into clicking links or opening attachments. They simply exploited the interconnected reality of modern SaaS. Defending against that requires tools built for the cloud era.

The Salesloft Drift breach may be remembered as one of the largest known OAuth-driven SaaS compromises to date. As organizations embrace more integrations, attackers will increasingly exploit the trust relationships that bind our apps together.

The lesson is clear: email compromise can happen even when no email is involved. Defending against it requires visibility into accounts, apps, and access patterns—capabilities that extend far beyond the legacy gateway.

By combining behavioral AI with account takeover protection and SaaS posture management, Abnormal provides the defense organizations need to thrive securely in a cloud-first world.

See for yourself how Abnormal continuously finds and fixes critical misconfigurations across your cloud email environment. Schedule a demo.

Schedule a Demo

Related Posts

Blog Thumbnail
When Integrations Become Exploits: What the Salesloft Drift Breach Reveals

September 5, 2025

See Abnormal in Action

Get a Demo

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

Discover How It All Works

See How Abnormal AI Protects Humans