In the heat of summer 2025, the cyber landscape delivered another chilling reminder: your organization’s cybersecurity is only as strong as the vendors you trust. But this time, it wasn’t just about vulnerability exploitation. It was a coordinated blast-zone campaign, a SaaS-to-SaaS supply chain breach that turned trusted integrations into launchpads for mass data theft.
At the center of the storm: the compromise of Drift's OAuth tokens via Salesloft, leading to widespread abuse across hundreds of Salesforce tenants and even some Google Workspace environments. The downstream impact? Sensitive data exfiltrated, AWS keys and Snowflake tokens stolen, and second-order risks for tech and security companies that were supposed to know better.
This wasn’t just a technical incident. It was a trust crisis, and a wake-up call for every organization depending on third-party apps, integrations, and cloud platforms to deliver business value.
Let’s break down what happened, why it matters, and what strategic, practical steps your organization can take to reduce exposure, without drowning in complexity or compliance theater.
Between August 8–18, attackers identified as UNC6395 by Google’s Mandiant team stole OAuth/refresh tokens used by Drift from Salesloft’s infrastructure. These tokens weren’t just static credentials, they were permission slips allowing programmatic access to connected apps across hundreds of Salesforce organizations.
By using these tokens, the attackers didn't need to breach individual companies. They simply impersonated the apps that companies already trusted. Once inside Salesforce, they ran SOQL queries to extract secrets, AWS keys, Okta passwords, Snowflake credentials, often stored in support tickets, attachments, or custom objects.
This is the cyber equivalent of hijacking a courier van that every company has already buzzed through the gate.
The problem wasn’t limited to one victim or even one vendor. This was a cascade failure in the SaaS ecosystem.
This was not a failure of software. It was a failure of trust boundaries and token hygiene.
Let’s pause the tech for a second and talk strategy. At the heart of every cybersecurity decision should be a clear understanding of what you’re trying to protect, why it matters, and what makes your organization thrive.
What’s the real damage in a breach like this?
From this incident, the key IT assets that were targeted or exposed included:
If your business:
…then you're in the medium to high risk band, especially if you serve sensitive sectors (healthcare, finance, tech) or work with regulated data.
Start by revoking and rotating all Drift/Salesloft OAuth integrations and any connected apps in Salesforce or Workspace. Then:
This isn’t just cleanup, it’s preventive surgery to stop abuse before it cascades.
August 2025 also delivered a wave of exploited zero-days. The key ones to fix immediately:
Don't let vulnerability fatigue paralyze you. Patch where it counts, based on what your business uses and what threat actors are targeting right now.
Let’s be honest, your CRM should not be storing your API keys, AWS credentials, or Snowflake tokens.
If you touch consumer data and there's overlap with impacted parties (e.g., TransUnion), now is the time to:
The Practical Cyber framework teaches us that cybersecurity starts not with technology, but with business impact. What enables your revenue? Who holds the keys? How do failures ripple outward?
This incident reminds us that SaaS tools, while business accelerators, are not immune to misuse. OAuth tokens aren’t magic. Connected apps can become compromised vectors. And when everyone integrates with everyone, trust must be earned and constantly validated.
August exposed how fragile SaaS trust chains can be. As we enter September, business and security leaders need to move from reactive cleanup to proactive control, especially around third-party integrations, token management, and data exposure in CRMs and support tools.
Focus on what matters: review your connected apps, rotate credentials, patch exploited systems, and stop storing secrets in the wrong places. The next breach won’t wait for your Q4 strategy. Preparedness is now a baseline expectation, not a differentiator.