Major Supply Chain Attack: Palo Alto Networks and Zscaler Hit by Salesloft Drift Breach

Major Supply Chain Attack: Palo Alto Networks and Zscaler Hit by Salesloft Drift Breach

Two cybersecurity giants fall victim to sophisticated OAuth token theft campaign targeting hundreds of organizations worldwide

September 2, 2025 — In a stunning turn of events that has sent shockwaves through the cybersecurity industry, both Palo Alto Networks and Zscaler have confirmed they were victims of a massive supply chain attack that compromised customer data through stolen OAuth tokens from Salesloft's Drift integration with Salesforce.

Salesloft Drift Supply Chain Incident: Key Details and Zscaler’s
Zscaler swiftly mitigates a security incident impacting Salesloft Drift, and ensuring robust protection against potential vulnerabilities.

Executive Summary

Between August 8-18, 2025, threat actors orchestrated one of the year's most significant supply chain attacks by compromising Salesloft Drift's OAuth tokens to gain unauthorized access to hundreds of Salesforce environments. The campaign, tracked by Google's Threat Intelligence Group as UNC6395 and attributed to the ShinyHunters extortion group, has impacted over 700 organizations globally, including two of the world's leading cybersecurity companies.

Key Impact Numbers:

  • 700+ organizations affected worldwide
  • Hundreds of Salesforce instances compromised
  • Multiple cybersecurity vendors breached, including industry leaders
  • 10-day attack window during which threat actors operated undetected
Threat Brief: Salesloft Drift Integration Used To Compromise Salesforce Instances
This Threat Brief discusses observations on a campaign leveraging Salesloft Drift integration to exfiltrate data via compromised OAuth credentials.

The Attack Vector: OAuth Token Theft

The sophistication of this supply chain attack lies in its exploitation of legitimate third-party integrations. Salesloft Drift, an AI-powered chat agent that integrates with Salesforce for sales workflow automation, became the unwitting gateway for mass data exfiltration.

How the Attack Worked

  1. Initial Compromise: Threat actors breached Salesloft's systems and stole OAuth and refresh tokens associated with the Drift application's Salesforce integrations
  2. Token Abuse: Using these stolen tokens, attackers could impersonate the legitimate Drift application and access connected Salesforce environments without triggering traditional authentication alerts
  3. Mass Data Exfiltration: The attackers systematically queried Salesforce databases, extracting sensitive information from Account, Contact, Case, and Opportunity objects
  4. Credential Harvesting: Post-exfiltration, the threat actors actively scanned stolen data for additional credentials, including AWS access keys, Snowflake tokens, passwords, and other cloud secrets
The Gmail Security Crisis: 2.5 Billion Users at Risk After ShinyHunters Breach
Bottom Line: Google has confirmed that hackers breached its Salesforce database in June 2025, exposing business contact information for 2.5 billion Gmail users. While passwords weren’t stolen, cybercriminals are now using this data to launch sophisticated voice phishing campaigns targeting user accounts. Gmail users must immediately enable two-factor authentication

Palo Alto Networks: A Cybersecurity Giant Falls

Palo Alto Networks' disclosure on September 2, 2025, confirmed the company was among hundreds affected by the supply chain attack. The breach exposed customer support case data and business contact information, though the company emphasized that its core products and services remained secure.

What Was Compromised at Palo Alto Networks:

  • Business contact information and account details
  • Internal sales records
  • Basic support case data (contact info and text comments)
  • No technical support files or attachments were accessed

"We quickly contained the incident and disabled the application from our Salesforce environment," Palo Alto Networks stated. "Our Unit 42 investigation confirms that this situation did not affect any Palo Alto Networks products, systems, or services."

The company's Unit 42 threat intelligence team provided crucial insights into the attack methodology, revealing that threat actors used automated Python tools with specific user-agent strings:

  • python-requests/2.32.4
  • Python/3.11 aiohttp/3.12.15
  • Salesforce-Multi-Org-Fetcher/1.0
  • Salesforce-CLI/1.0

Zscaler: Cloud Security Leader Breached

Zscaler's disclosure followed shortly after, confirming that threat actors gained "limited access" to its Salesforce environment through the compromised Drift credentials. The cloud security company emphasized that its core infrastructure and security services were not impacted.

Zscaler's Compromised Data:

  • Customer names and business email addresses
  • Phone numbers and job titles
  • Company locations and regional details
  • Zscaler product licensing information
  • Content from certain support cases

"Although the incident's scope remains limited and no evidence of misuse has been found, we recommend that customers maintain heightened vigilance," Zscaler advised in its security advisory.

ShinyHunters: The Evolution of a Cybercrime Empire - From Pokémon-Inspired Hackers to Global Threat
Bottom Line: ShinyHunters emerged in 2020 as a data theft collective that has stolen information from over 1 billion users across hundreds of companies. From their early days selling databases for profit to their current sophisticated voice phishing campaigns targeting Salesforce instances, they’ve evolved from opportunistic hackers into one of

Technical Analysis: Advanced Threat Actor Techniques

Google's Threat Intelligence Group and Mandiant researchers have provided detailed analysis of the UNC6395 threat actor's sophisticated operational techniques:

Automated Data Extraction

The attackers leveraged Python's asynchronous capabilities with libraries like aiohttp to perform high-volume, rapid data exfiltration through Salesforce's Bulk API. This approach minimized their time on target while maximizing data collection.

Anti-Forensics Measures

  • Query Deletion: Attackers systematically deleted query jobs to hide evidence of their activities
  • Tor Usage: Infrastructure was obfuscated using Tor exit nodes and cloud hosting providers (AWS, DigitalOcean)
  • Log Evasion: While query jobs were deleted, audit logs remained intact for forensic analysis

Targeted Credential Harvesting

The threat actors specifically searched for high-value credentials using automated scanning for:

  • AWS access keys (AKIA identifiers)
  • Snowflake tokens and credentials
  • Generic keywords: "password," "secret," "key"
  • VPN and SSO login strings
  • Organization-specific authentication URLs
The Targeted Employees and Security Stakes: A New Era of Cyber Warfare
TL;DR: Cybercriminals have escalated beyond data theft to directly targeting cybersecurity professionals, demanding their termination and threatening their safety—marking a dangerous new phase where human capital becomes a weapon in cyber warfare. The Gmail Security Crisis: 2.5 Billion Users at Risk After ShinyHunters BreachBottom Line: Google has

Industry-Wide Impact and Response

The supply chain attack's scope extends far beyond cybersecurity companies. The campaign has affected organizations across multiple sectors, with technology and software companies representing the majority of victims.

Coordinated Response Efforts

  • Salesloft immediately revoked all active OAuth and refresh tokens for Drift applications
  • Salesforce removed the Drift application from its AppExchange marketplace
  • Google disabled Drift integrations for affected Workspace accounts
  • Mandiant was engaged to conduct forensic investigation

Previous Salesforce Attack Campaign

This supply chain attack represents an evolution in tactics from the ongoing Salesforce breach campaign that has plagued organizations throughout 2025. Previous attacks by the ShinyHunters group relied on social engineering and voice phishing (vishing) to trick employees into authorizing malicious OAuth applications.

Notable victims of the broader Salesforce campaign include:

  • Google
  • Cisco
  • Farmers Insurance
  • Workday
  • Adidas
  • Qantas
  • Allianz Life
  • LVMH subsidiaries (Louis Vuitton, Dior, Tiffany & Co.)
Allianz Life Data Breach Exposes Majority of 1.4 Million Customers in Latest Insurance Industry Cyberattack
Bottom Line Up Front: Allianz Life Insurance Company of North America confirmed that hackers accessed personal data from the majority of its 1.4 million customers through a sophisticated social engineering attack on a third-party cloud system. The breach, discovered on July 17, 2025, appears to be linked to the

Implications for the Cybersecurity Industry

The successful targeting of two major cybersecurity vendors raises critical questions about supply chain security and third-party risk management across the industry.

Trust and Reputation Impact

Having cybersecurity leaders fall victim to supply chain attacks creates a paradox of confidence in an industry built on protecting others. Both companies have been transparent about the incidents, but the reputational implications are significant.

Aviation Under Siege: The 2025 Airline and Airport Cyberattack Crisis
The aviation industry is facing an unprecedented wave of cyberattacks in 2025, with major airlines and airports worldwide falling victim to sophisticated hacking operations that have compromised millions of passengers’ personal data and disrupted critical infrastructure systems. In-Depth Technical Document on the CrowdStrike BSOD Incident@cisomarketplace CrowdStrike vs Microsoft: Impact

Supply Chain Security Lessons

  1. Third-party Integration Risks: Even legitimate, widely-used integrations can become attack vectors
  2. OAuth Token Security: The persistent nature of OAuth tokens makes them high-value targets for threat actors
  3. Monitoring Gaps: The 10-day attack window suggests detection capabilities need enhancement
  4. Credential Management: Support case systems often contain sensitive credentials that require better protection

Mitigation and Response Recommendations

Immediate Actions for Organizations

  1. Audit Third-party Integrations: Review all SaaS application connections and OAuth permissions
  2. Rotate Credentials: Proactively rotate any credentials that may have been exposed in support cases
  3. Monitor for Social Engineering: Increase vigilance against phishing attempts using exposed contact information
  4. Review Access Logs: Examine Salesforce and identity provider logs for suspicious activity

Long-term Security Improvements

  1. Zero Trust Implementation: Apply conditional access policies and least-privilege principles
  2. Automated Credential Scanning: Deploy tools like Trufflehog and Gitleaks to identify exposed secrets
  3. Enhanced Monitoring: Implement robust logging and detection for unusual API activity
  4. Supply Chain Risk Assessment: Conduct thorough security evaluations of third-party integrations

The Broader Threat Landscape

This supply chain attack exemplifies the evolving threat landscape where cybercriminals increasingly target legitimate business tools and integrations. The ShinyHunters group's evolution from direct social engineering to supply chain exploitation demonstrates the adaptability and sophistication of modern threat actors.

ShinyHunters Group Evolution

The threat actors behind this campaign have claimed to be associated with both ShinyHunters and Scattered Spider, suggesting potential collaboration between major cybercriminal groups. Their evolution from the Snowflake data theft campaign to Salesforce attacks shows a pattern of targeting cloud infrastructure and SaaS platforms.

Looking Forward: Industry Response and Prevention

The cybersecurity industry must collectively address the supply chain vulnerabilities exposed by this attack. Key areas for improvement include:

Enhanced OAuth Security

  • Implementing stricter token rotation policies
  • Developing better monitoring for OAuth token usage
  • Creating industry standards for third-party integration security

Supply Chain Security Frameworks

  • Establishing comprehensive vendor risk assessment processes
  • Developing real-time monitoring capabilities for third-party integrations
  • Creating incident response playbooks specific to supply chain attacks

Information Sharing and Collaboration

The rapid disclosure and information sharing between affected companies, security researchers, and platform providers demonstrates the importance of collaborative defense against supply chain attacks.

Conclusion

The Salesloft Drift supply chain attack represents a watershed moment for cybersecurity, demonstrating that even industry leaders are vulnerable to sophisticated supply chain compromises. The targeting of Palo Alto Networks and Zscaler sends a clear message that no organization is immune to these evolving threats.

The incident underscores the critical importance of:

  • Comprehensive third-party risk management
  • Robust monitoring of OAuth token usage
  • Proactive credential rotation and management
  • Enhanced detection capabilities for supply chain attacks

As the investigation continues and more organizations potentially come forward, the full scope of this supply chain attack may reveal even broader implications for enterprise security and the SaaS ecosystem as a whole.

The cybersecurity industry's response to this incident will likely shape supply chain security practices for years to come, making it a defining moment in the evolution of enterprise security defenses.


This developing story will be updated as more information becomes available about the ongoing investigation and potential additional victims.

Read more

The SharePoint Hack That Changed Global Cybersecurity: Inside Microsoft's MAPP Crisis

The SharePoint Hack That Changed Global Cybersecurity: Inside Microsoft's MAPP Crisis

A comprehensive investigation into the 2025 breach that compromised 400+ organizations and forced Microsoft to restructure its vulnerability sharing program Introduction In July 2025, the cybersecurity world witnessed a watershed moment when Chinese state-sponsored attackers exploited critical, unpatched vulnerabilities in Microsoft SharePoint. The breach, which followed shortly after Microsoft shared

By Breached Company