BigTech CompaniesCybersecurityNewswireTechnology

Salesloft Links Drift Data Theft to March GitHub Hack

▼ Summary

– Salesloft’s GitHub account was breached in March, allowing hackers to steal authentication tokens used to target its tech customers.
– The hackers conducted reconnaissance from March to June, downloading content from repositories and adding unauthorized users.
– The breach led to the theft of OAuth tokens from Drift’s AWS environment, compromising customers like Google and Cloudflare.
– Salesloft took six months to detect the intrusion, raising concerns about its security posture, though the incident is now contained.
– The hacking group UNC6395, also known as ShinyHunters, is believed responsible and focused on stealing credentials like AWS keys and passwords.

A significant data breach at Salesloft has been traced back to a March intrusion into the company’s GitHub account, which enabled attackers to steal authentication tokens and subsequently target several major technology clients. According to an investigation by Google’s Mandiant incident response team, the threat actors maintained access to Salesloft’s GitHub for several months, conducting reconnaissance and extracting content from multiple repositories. This extended access period has raised serious concerns about the company’s security monitoring and response capabilities.

The attackers leveraged their unauthorized access to infiltrate the Amazon Web Services environment supporting Salesloft’s AI-powered marketing platform, Drift. There, they exfiltrated OAuth tokens belonging to Drift’s customers. These tokens, which facilitate secure connections between applications, were then exploited to breach organizations including Bugcrowd, Cloudflare, Google, Proofpoint, Palo Alto Networks, and Tenable. Many additional affected companies may still be unidentified.

Google’s Threat Intelligence Group publicly attributed the supply chain attack in late August to a group it identifies as UNC6390. Independent cybersecurity outlets have suggested the involvement of ShinyHunters, a well-known hacking collective with a history of data theft and extortion. The group is believed to have contacted victims privately in an attempt to monetize the stolen information.

Salesloft confirmed that the attackers primarily sought credentials, including AWS access keys, passwords, and Snowflake-related tokens. By using the compromised OAuth tokens, the threat actors gained entry into Salesforce instances, where they harvested sensitive data from support tickets. The company has stated that the incident is now contained and that its integration with Salesforce has been fully restored. However, the nearly six-month gap between initial compromise and detection remains a focal point for critics evaluating the response.

(Source: TechCrunch)

Topics

github breach 95% authentication tokens 90% mass hack 88% customer breaches 87% data theft 86% reconnaissance activities 85% hacking group 83% security posture 82% aws access 80% supply chain 79%

The Wiz

Wiz Consults, home of the Internet is led by "the twins", Wajdi & Karim, experienced professionals who are passionate about helping businesses succeed in the digital world. With over 20 years of experience in the industry, they specialize in digital publishing and marketing, and have a proven track record of delivering results for their clients.