Attackers stole OAuth tokens from Salesloft Drift, hitting Salesforce & Gmail. WideField recommends revoking all Drift app connections & tightening 3rd-party integration controls.
Salesloft acquired Drift in February 2024. Salesloft provides many products, some branded under Salesloft, others still under the Drift brand.
The Drift product line provides a chatbot interface into a variety of sales and marketing platforms like CRM systems for customer records, marketing automation tools for nurturing, calendars for scheduling, and sales platforms for follow-up. Some products were acquired such as Siftrock in September 2018 which became Drift Email, referenced later in this blog.
The Salesloft-branded product line helps sales teams keep track of their deals, follow up with customers, and know what to do next to close more sales.
Clari announced acquisition plans for Salesloft in August 2025.
This background is provided for context for the different products involved in the security incident in this blog. Salesloft will primarily be used to refer to the company and Salesloft Drift or Drift will be used to refer to the Drift product line.
On a technical level, the Drift products connect as OAuth applications to target resource environments such as Salesforce, Gmail, Microsoft. Drift products would normally be referred to as connected apps or 3rd-party apps, and often be implemented as OAuth client apps using OAuth 2.0 for authorization and connectivity.
Normally, Drift and 3rd-party applications have a run-time access architecture like this:
The access paths are granted by users or possibly by administrators (for the whole organization/tenant) via OAuth flows and granting user permissions to the Drift product(s) to access user data in the target app environment.
The granting process involves standard OAuth flows, with the user directed to the trusted resource provider for authentication including MFA e.g. Salesforce. After user authentication/authorization, the Drift application will receive OAuth refresh and access tokens from Salesforce that can be used for API access to user data and resources in Salesforce. The permissions of the OAuth tokens are specified as part of the authorization request by the Drift application and presented to the user during their authorization step.
The Drift application integration with Salesforce had a security incident in August 2025. Here is the relevant information and timelines.
The prior Salesloft Drift security notices imply the following occurred:
The threat actor used various proxy IPs (many Tor, some not). The IP list is the part of the IOCs included in the security notices published by Salesloft/GTIG. Any traffic from Tor exit node IPs have clear high risk; they are also shared among the Tor network and can include activity from multiple threat actors over the same time period resulting in possible misattribution.
Once access to Salesforce was gained, discovery was done on Salesforce objects. Based on subsequent activity analyzed by GTIG, it appears the threat actor found additional secrets stored insecurely by some of the organizations within their Salesforce instance. This resulted in further access to other environments in those organizations like AWS, Snowflake and VPN/SSO. The TTP in terms of Salesforce queries used to count objects, retrieve user data, and case data can be searched for when investigating incidents or threat hunting. These queries are described in the GTIG blog.
WideField observed suspicious log event activity across multiple WideField customers being monitored by the WideField Security Platform. All of the source IPs found in customer logs were on the malicious IP list identified by GTIG.
The Gmail related log activity strongly indicates that there was broader compromise by the threat actor due to these indicators:
WideField SIRT has concluded that there is strong evidence of additional threat actor activity related to the Salesloft Drift compromise but beyond Drift-Salesforce customers. Salesloft Drift Email-Google customers have also had OAuth session tokens compromised.
WideField recommends immediate and broader remediation efforts as described below.
WideField recommends that every customer using any Salesloft Drift products more broadly revoke access and investigate fully potential compromised identities and sessions.
Immediately revoke all connected app connections for all users related to any Salesloft Drift products in use, not just Drift-Salesforce.
Here is a summary of Drift Products and example target applications that are integrated:
* Note: each integration’s documentation should be read to provide visibility into the permissions requested in order to assess full impact if compromised. For example, the Salesloft Drift integration with Microsoft allows admin level grants to connect all user’s calendars, which impacts incident investigation and remediation efforts.
Reauthorizing of the app connections (e.g. Drift access) typically will revoke existing connections (and tokens) but this must be verified through vendor documentation and testing.
Any accounts associated with Salesloft Drift OAuth application access in the timeframes of the incident should be assumed to be compromised and IR procedures followed and credentials rotated at a minimum.
Additionally, any users who were active in Drift products in the time period of August 8-18 should have their activities reviewed for any suspicious or abnormal behavior. The GTIG report should be reviewed for the types of suspicious post-compromise activity observed in compromised customers and these should be guides for log queries.
Customers should review their Salesforce instances for accidental secrets storage. If found, move the secrets to a secure vault, delete them from Salesforce, and then perform an investigation specifically for suspicious activity in the applications and accounts related to those secrets.
For risk management purposes, customers should start to:
If any compromise was detected, these risk management activities should be prioritized immediately, because they relate to reducing the identity attack surface of connected applications, which is at the very core of the Salesloft Drift security incidents.
The WideField Security Platform provides several features for detecting and responding to both the original Drift compromise and Drift Email compromise:
The storage of secrets (presumably unencrypted) in Salesforce by some of the compromised organizations was unrelated to the incident but shows that other insecure practices can magnify the impact of breaches. Secrets storage best practices are well-known
The interconnected risk is high with identity supply chains such as federated trust or in this case of 3rd-party application vendors who by nature of the OAuth protocol have cached, virtually permanent access tokens due to the refresh token model. Similar risks unfolded with the Okta HAR file security incident where cached tokens were stored as part of HAR files within Okta support. We also saw this in the BeyondTrust-Treasury remote access breaches with API keys stored on the vendor side that gave access to Treasury desktops.
Better logging by default would help the detection and response for many cloud/SaaS breaches that abuse identities. Logging too often is designed by application developers, and useful only to the same developers. Security Ops needs better information geared around sessions and activities and compromise indicators. OAuth activity is notoriously lacking in logs. Workspace logs do not identify OAuth tokens which makes it difficult to trace specific session abuse. Salesforce activity logs are not available by default, but are an add-on as part of an expensive Salesforce Shield license. There are Salesforce customers who do not have adequate logging enabled due to the expense. The vendors need to focus on useful log telemetry, geared towards Security Operations, available by default.
Threat actors share much more than the organizations who are attacked or the vendors involved. The positives are that GTIG communication and coordination looks promising to share information to fully assess the incident. However, victim organizations and the vendors often have limited or no technical disclosures. The information such as the initial breach or access path to the data center would be extremely valuable for others to know in order to both address in their own data centers and also to fully assess the potential impact (how many apps and OAuth tokens were exposed and need to be contained).
The communications channels to reach appropriate SIRT teams at organizations can be a challenge in the best of times. In at least one case, a WideField customer’s marketing department received a security incident notice because the vendor had a marketing product and likely only had a marketing contact. The security team was not notified until weeks after the incident.