Salesforce Integration Hack Steals Data from Palo Alto, Zscaler

A sophisticated supply-chain attack exploited Salesloft Drift's integration with Salesforce, compromising OAuth tokens and stealing customer data from companies like Palo Alto Networks and Zscaler. No core systems were affected, but the breach exposed vulnerabilities in third-party tools. Affected firms revoked tokens and enhanced monitoring, highlighting the need for stricter SaaS security.
Salesforce Integration Hack Steals Data from Palo Alto, Zscaler
Written by John Smart

In the fast-evolving world of cybersecurity, a recent supply-chain attack has sent shockwaves through the tech industry, exposing vulnerabilities in third-party integrations that many companies rely on for customer relationship management. Palo Alto Networks and Zscaler, two giants in the network security space, have confirmed they are among the victims of a sophisticated campaign that exploited a breach in Salesloft Drift, a popular application integrated with Salesforce. According to reports, hackers gained unauthorized access to Salesforce data by compromising OAuth tokens through this third-party tool, leading to the theft of sensitive customer information.

The incident, first detailed in a CRN article published on September 2, 2025, highlights how attackers targeted Salesloft Drift to siphon data from connected Salesforce instances. Palo Alto Networks disclosed that the breach affected their Salesforce environment, resulting in the exposure of customer support cases and related details. Zscaler similarly acknowledged the compromise, noting that customer contact information was accessed, though both companies emphasized that no core systems or sensitive operational data were impacted.

The Mechanics of the Attack and Its Supply-Chain Roots

Investigations reveal that the attackers, potentially linked to the threat group UNC6395 as mentioned in a SOCRadar report from earlier today, used stolen OAuth credentials to infiltrate Salesforce setups. This method allowed them to bypass traditional security measures, exfiltrating data without triggering immediate alarms. Google, in a warning issued via The Hacker News on August 29, 2025, expanded the scope beyond Salesforce, indicating that the breach could affect other integrations tied to Drift.

The campaign’s sophistication lies in its focus on third-party apps, which often serve as weak links in enterprise ecosystems. As detailed in a Unit 42 threat brief from Palo Alto Networks’ own research arm, published just hours ago, hackers leveraged the Salesloft Drift integration to harvest credentials, enabling widespread data theft. This isn’t an isolated event; similar tactics have been observed in past supply-chain attacks, but the scale here—impacting multiple high-profile firms—underscores the growing risks of interconnected SaaS tools.

Broader Impacts on Affected Companies and Customer Trust

Beyond Palo Alto and Zscaler, the breach has ensnared other players like PagerDuty, Tanium, and SpyCloud, as reported in a Help Net Security update on September 2, 2025. For Palo Alto Networks, a leader in firewall and cloud security, the irony is palpable: a company dedicated to protecting against such threats found itself compromised through a CRM dependency. Zscaler, known for its zero-trust architecture, assured stakeholders via public statements that the incident was contained to a non-production environment, but the exposure of customer details could erode trust.

Industry insiders point to this as a wake-up call for better vetting of third-party vendors. A Hackread piece from today notes that the attackers exploited the app to steal tokens, potentially leading to further reconnaissance or phishing campaigns. Posts on X (formerly Twitter) from cybersecurity accounts, such as those echoing sentiments from Cyber Security News on September 2, 2025, reflect growing concern over SaaS supply chains, with users speculating on the attackers’ motives, possibly tied to data resale on dark web markets.

Responses, Mitigation Strategies, and Future Implications

In response, affected companies have moved swiftly. Palo Alto Networks, as per their disclosure in Security Affairs today, has revoked compromised tokens and enhanced monitoring. Zscaler, detailed in the same sources, is notifying impacted customers and collaborating with Salesforce on forensics. Salesforce itself has not confirmed a direct breach but is advising users to audit integrations, aligning with Google’s broader alert.

This event amplifies calls for stricter OAuth controls and zero-trust principles in third-party ecosystems. Experts, including those cited in a Infosecurity Magazine article from 13 hours ago, warn that without proactive measures, such attacks could proliferate. For industry leaders, the lesson is clear: even robust defenses falter when supply chains are overlooked, potentially reshaping how enterprises approach SaaS security in the years ahead.

The fallout continues, with ongoing investigations likely to reveal more victims. As Krebs on Security noted in a piece from 18 hours ago, companies are racing to invalidate stolen credentials, but the incident exposes the fragility of interconnected tech stacks. In an era of escalating cyber threats, this breach serves as a stark reminder that no entity is immune, pushing for collaborative defenses across the sector.

Subscribe for Updates

CybersecurityUpdate Newsletter

The CybersecurityUpdate Email Newsletter is your essential source for the latest in cybersecurity news, threat intelligence, and risk management strategies. Perfect for IT security professionals and business leaders focused on protecting their organizations.

By signing up for our newsletter you agree to receive content related to ientry.com / webpronews.com and our affiliate partners. For additional information refer to our terms of service.

Notice an error?

Help us improve our content by reporting any issues you find.

Get the WebProNews newsletter delivered to your inbox

Get the free daily newsletter read by decision makers

Subscribe
Advertise with Us

Ready to get started?

Get our media kit

Advertise with Us