In 2025, the cybersecurity community faced a watershedmoment in SaaS supply chain security. A sequence of coordinated and overlappingbreaches against Salesforce environments demonstrated just how fragile trust incloud integrations has become.
The first major incident emerged in June 2025, when Google confirmed a breachof its corporate Salesforce instance via a sophisticated vishing-extortioncampaign attributed to threat groups UNC6040 and UNC6240, affiliates of theShinyHunters collective (“The Com”). Attackers convinced employees to authorizemalicious OAuth apps, then used custom Python scripts to bulk export Salesforcedata while hiding their activity behind VPN and Tor infrastructure. Though nopasswords were stolen, business contact data of thousands of SMB customers wascompromised, raising compliance and trust concerns.
Only months later, in August 2025, the breach escalated to global scale throughthe Salesloft Drift supply chain compromise. The threat actor UNC6395(designated GRUB1 by Cloudflare) obtained OAuth tokens associated with Drift’sSalesforce integration and used them as skeleton keys to bypass MFA,exfiltrating data from over 700 organizations worldwide. Confirmed victimsinclude Cloudflare, Zscaler, Palo Alto Networks, Tenable, JFrog, Proofpoint,Rubrik, and Google Workspace accounts linked via Drift Email. The attackerswere not content with customer contact data alone—they systematically searchedSalesforce cases for secrets such as AWS keys, Snowflake tokens, and API keys,highlighting how SaaS misconfigurations can create massive credential exposure.
Cloudflare’s disclosure provided an unprecedented forensic timeline of thecampaign: attackers enumerated objects, fingerprinted workflows, measured APIlimits, performed dry-run queries, and finally executed a three-minute Bulk APIexfiltration of case text fields before deleting their jobs to cover tracks.Unit 42 and Google’s GTIG corroborated these findings, observing systematicexfiltration, credential hunting, and widespread abuse of Tor exit nodes.
Together, these incidents reveal a fundamental paradigm shift in cyberattacks:Exploiting identity and trust relationships instead of infrastructurevulnerabilities; using OAuth tokens as skeleton keys that bypass MFA andperimeter defenses; leveraging social engineering (vishing) as the first-stageintrusion vector; and exposing the risks of AI-driven SaaS integrations, wherechatbots like Drift query and store enterprise data across multiple platforms.
The SaaS ecosystem has become the backbone of enterpriseoperations, with Salesforce, Google Workspace, Slack, and countless otherplatforms powering mission-critical workflows. These tools are deeplyinterconnected, relying on OAuth-based integrations to automate data flows.While convenient, this architecture introduces a new attack surface: eachintegration is a potential supply chain backdoor.
In 2025, this risk moved from theory to reality. The Google Salesforce breachhighlighted how attackers exploit the human element—using vishing calls totrick employees into authorizing rogue OAuth apps. The Salesloft Drift breachwent further, showing how compromise of a single SaaS integration could cascadeinto hundreds of enterprises simultaneously. Cloudflare’s case study revealedjust how surgical and disciplined these adversaries were, executing queries incarefully sequenced phases, exfiltrating secrets in minutes, and erasingevidence.
The implications are profound. Identity, not infrastructure, is the newperimeter. OAuth tokens, not passwords, are the new skeleton keys. AI SaaSagents, not just humans, are now attack pivots. Organizations that continue totreat SaaS applications as trusted black boxes will face systemic risk. Thispaper unpacks the full details of these campaigns.
1. Google Salesforce Breach (June2025 – UNC6040/UNC6240, ShinyHunters “The Com”)
2. Salesloft Drift Breach (August2025 – UNC6395/GRUB1)
3. Cloudflare Case Study(UNC6395/GRUB1)
Cloudflare’s incidentreconstruction shows the phased tradecraft of UNC6395:
Date | Event | Actor / Campaign | Notes |
Mar–Jun 2025 | Salesloft GitHub compromised | UNC6395 | Pivot to Drift AWS |
Jun 2025 | Google Salesforce breached | UNC6040/UNC6240 | Vishing + OAuth abuse |
Aug 8–18 | Mass Salesforce exploitation via Drift tokens | UNC6395 | Bulk API exfiltration |
Aug 9 | Recon with Trufflehog | UNC6395 | Cloudflare |
Aug 12–14 | Salesforce object enumeration | UNC6395 | Cloudflare |
Aug 16 | Dry-run case count | UNC6395 | Cloudflare |
Aug 17 | Full exfiltration + job deletion | UNC6395 | Cloudflare |
Aug 20 | Drift tokens revoked globally | Vendor response | |
Aug 23 | Notification to Cloudflare | Salesforce/Salesloft | |
Sep 2 | Cloudflare customer notifications | Cloudflare | 104 API tokens rotated |
Company | Sector | Data Compromised / Impact |
Cloudflare | Cybersecurity / Cloud | Customer contact info, Salesforce support case text fields. 104 API tokens found in case notes (rotated). Some support cases may have contained logs, credentials, or passwords. |
Zscaler | Cybersecurity | Customer business contact details (names, emails, job titles), product licensing information. No infrastructure impact. |
Palo Alto Networks | Cybersecurity | Salesforce CRM data: customer contacts, basic support case data. Customers who shared secrets in cases may have exposed credentials. |
Tenable | Cybersecurity | Portions of customer Salesforce support data including case subject lines, descriptions, and contact info. |
Qualys | Cybersecurity | Limited Salesforce CRM data. No product/service impact. |
Proofpoint | Cybersecurity | Certain Salesforce tenant information accessed. No compromise of software or infrastructure. |
Rubrik | Cybersecurity | Confirmed Salesforce case exposure; specific data not detailed. |
BeyondTrust | Cybersecurity | Limited Salesforce CRM exposure including business contact information. |
Bugcrowd | Cybersecurity | Salesforce CRM data accessed; no vulnerability data or internal systems affected. |
CyberArk | Cybersecurity | Salesforce CRM data including business contacts, account metadata, summary fields. No sensitive case data accessed. |
JFrog | Technology / DevOps | Salesforce support case data, including contact info. Some plain-text secrets were exposed in case descriptions. |
PagerDuty | SaaS / IT Ops | Salesforce support data, including names, email addresses, and phone numbers. |
Tanium | Cybersecurity | Limited Salesforce CRM data: business contacts, emails, phone numbers, location details. |
SpyCloud | Cybersecurity | Salesforce CRM data (standard fields). Consumer data not believed compromised. |
Google (Workspace via Drift Email integration) | Technology | A very small number of Google Workspace accounts accessed. Email data exposed via Drift Email OAuth integration. No core Google/Alphabet infrastructure affected. |
Okta | Identity / Cybersecurity | Attack attempt observed but blocked. Strengthened inbound IP controls prevented compromise. |
Attackers executed highlyspecific SOQL queries:
Counting Objects
Enumerating Users
Exfiltrating Case Data
This shows their intent to map, fingerprint, andthen harvest credentials buried in free-text fields.
Indicator Value | Type | Description |
Salesforce-Multi-Org-Fetcher/1.0 | User-Agent | Malicious tooling string |
Salesforce-CLI/1.0 | User-Agent | Salesforce Command Line interface abused |
python-requests/2.32.4 | User-Agent | Custom Python scripts |
Python/3.11 aiohttp/3.12.15 | User-Agent | Parallel API call exfiltration |
208.68.36.90 | IP | DigitalOcean infrastructure |
44.215.108.109 | IP | AWS infrastructure |
154.41.95.2 | IP | Tor exit node |
176.65.149.100 | IP | Tor exit node |
179.43.159.198 | IP | Tor exit node |
185.130.47.58 | IP | Tor exit node |
185.207.107.130 | IP | Tor exit node |
185.220.101.133 | IP | Tor exit node |
185.220.101.143 | IP | Tor exit node |
185.220.101.164 | IP | Tor exit node |
185.220.101.167 | IP | Tor exit node |
185.220.101.169 | IP | Tor exit node |
185.220.101.180 | IP | Tor exit node |
185.220.101.185 | IP | Tor exit node |
185.220.101.33 | IP | Tor exit node |
192.42.116.179 | IP | Tor exit node |
192.42.116.20 | IP | Tor exit node |
194.15.36.117 | IP | Tor exit node |
195.47.238.178 | IP | Tor exit node |
195.47.238.83 | IP | Tor exit node |
All organizations leveragingDrift integrations with third-party platforms (including but not limited toSalesforce) should operate under the assumption that their data may becompromised. Immediate remediation steps are strongly advised.
1. Investigate for Compromise andIdentify Exposed Secrets
2. Revoke and Rotate Credentials
3. Harden Access Controls
4. Stay Updated
Additional instructions andevolving advisories are available on the Salesloft Trust Center andthrough Salesforce’s official security advisories. Organizations shouldcontinue to monitor updates and adjust their defenses accordingly.