
Salesloft has reported a serious security incident linked to a breach of its GitHub account that occurred earlier this year in March. This breach enabled hackers to acquire authentication tokens, which were subsequently used in a widespread attack affecting numerous major tech clients. According to an investigation conducted by Mandiant, the incident response team at Google, the hackers accessed Salesloft's GitHub account and conducted reconnaissance activities that spanned from March to June. During this period, they were able to download information from various repositories, add unauthorized guest users, and manipulate workflows. This timeline raises significant concerns regarding Salesloft's security measures, particularly questioning why it took the company nearly six months to identify the breach. Despite the prolonged exposure, Salesloft has stated that the situation is now “contained.” Following the breach, hackers gained access to the Amazon Web Services cloud environment of Drift, Salesloft’s AI and chatbot-driven marketing platform, allowing them to steal OAuth tokens belonging to Drift's customers. OAuth is a protocol that permits users to authorize applications to communicate with each other. By exploiting these tokens, the attackers were able to breach the accounts of several prominent Salesloft clients, including Bugcrowd, Cloudflare, Google, Proofpoint, Palo Alto Networks, and Tenable, among others. The full extent of affected customers remains unclear. Google’s Threat Intelligence Group disclosed this supply chain breach in late August, linking it to a hacking collective identified as UNC6395. Cybersecurity outlets like DataBreaches.net and Bleeping Computer have reported that the perpetrators are believed to be ShinyHunters, a notorious hacking group that has previously targeted various organizations. These hackers are thought to be attempting to extort their victims by making direct contact. By utilizing the stolen Salesloft tokens, they accessed Salesforce accounts, where they extracted sensitive information from support tickets. According to Salesloft, the main goal of the attackers was to obtain credentials, particularly targeting sensitive data, including AWS access keys, passwords, and Snowflake access tokens. As of Sunday, Salesloft has confirmed that its integration with Salesforce has been successfully restored.
After several years of relying on either an analog watch or a basic fitness tracker, I found myself hesitant to embrace ...
TechCrunch | Dec 28, 2025, 16:40OpenAI is actively recruiting for a Head of Preparedness to join its San Francisco team, offering an impressive salary o...
Business Today | Dec 28, 2025, 02:35
As the year draws to a close, many exciting smartphones have emerged in the under ₹25,000 price segment. While several d...
Mint | Dec 28, 2025, 17:40
In 2025, India's startup ecosystem saw a significant influx of nearly $11 billion in funding, yet the landscape is chang...
TechCrunch | Dec 28, 2025, 01:20
For those who have been longing for a fresh start with their Gmail address, there’s promising news on the horizon. Googl...
TechCrunch | Dec 28, 2025, 21:45