
UNC6395 campaign aims to exfiltrate Salesforce data via compromised OAuth tokens
A sophisticated data exfiltration campaign targeting companies’ Salesforce instances was conducted, resulting in the exposure of sensitive information from several organizations. This occurred through compromised OAuth tokens associated with the third-party Salesloft Drift application. The threat actor, identified as UNC6395, collected credentials and sensitive data between August 8 and August 18, 2025. This demonstrated significant knowledge of operational security procedures, as SOQL queries were run against multiple Salesforce objects. UNC6395 ran systematic Salesforce Object Query Language (SOQL) queries to enumerate and extract data from critical Salesforce objects, including cases, accounts, users, and opportunities. The report comes from Google Threat Intelligence Group that










