Technology News

Critical Salesloft Data Breach Exposes Major Tech Firms Through Stolen GitHub Credentials

Salesloft data breach security incident showing compromised cloud infrastructure and stolen authentication tokens

A massive cybersecurity incident has rocked the tech industry as Salesloft confirms a sophisticated data breach originating from a March GitHub account compromise that exposed authentication tokens for numerous enterprise customers.

Salesloft Data Breach Timeline and Impact

Salesloft’s investigation reveals hackers maintained unauthorized access from March through June 2024. During this period, threat actors performed extensive reconnaissance activities. Consequently, they downloaded content from multiple repositories and established malicious workflows. The Salesloft data breach specifically targeted OAuth tokens, which are critical authentication mechanisms.

How the GitHub Compromise Led to Widespread Access

The attackers initially breached Salesloft’s GitHub account in March. Subsequently, they gained access to the AWS cloud environment of Drift, Salesloft’s AI-powered marketing platform. This access enabled theft of OAuth tokens that integrate with platforms like Salesforce. Therefore, the Salesloft data breach created a supply chain vulnerability affecting multiple organizations.

Major Companies Affected by the Breach

Several prominent technology companies suffered impacts from this incident. Confirmed victims include:
• Google and Cloudflare
• Palo Alto Networks and Proofpoint
• Bugcrowd and Tenable
Many additional organizations likely remain unidentified. The Salesloft data breach demonstrates how supply chain attacks can have far-reaching consequences.

Security Response and Containment Measures

Salesloft engaged Google’s Mandiant incident response unit for investigation. The company declared the incident “contained” after implementing security enhancements. However, the six-month detection timeline raises serious questions about security monitoring capabilities. Meanwhile, the Salesloft data breach highlights the importance of rapid threat detection.

OAuth Token Security Implications

OAuth tokens enable seamless integration between different platforms and services. When compromised, these tokens provide extensive access to connected systems. The Salesloft data breach specifically exploited these authentication mechanisms. Consequently, organizations must reassess their token management practices.

Attribution and Hacker Methodology

Google’s Threat Intelligence Group attributes the attack to UNC6395, believed to be ShinyHunters. This prolific hacking group typically engages in data extortion schemes. The Salesloft data breach followed their established pattern of targeting cloud credentials and sensitive data. Attackers focused particularly on AWS keys and Snowflake access tokens.

FAQs About the Salesloft Data Breach

What caused the Salesloft data breach?

The breach originated from a compromised GitHub account in March 2024, which allowed hackers to steal authentication tokens and access customer systems.

Which companies were affected?

Major tech companies including Google, Cloudflare, Palo Alto Networks, Proofpoint, Bugcrowd, and Tenable confirmed impacts, with potentially more victims unidentified.

How long did the breach go undetected?

Hackers maintained access from March until June 2024, with Salesloft taking approximately six months to detect the full scope of the intrusion.

What data was stolen?

Attackers primarily targeted OAuth tokens, AWS access keys, passwords, and Snowflake-related access tokens from support tickets and integrated systems.

Has the breach been contained?

Salesloft reports the incident is now contained, with restored Salesforce integration and enhanced security measures implemented.

Who is responsible for the attack?

Google’s Threat Intelligence Group attributes the attack to UNC6395, which cybersecurity researchers believe is the ShinyHunters hacking group.

Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

StockPII Footer

Copyright © 2025 Stockpil. Managed by Shade Agency.

To Top