Red Hot Cyber
Cybersecurity, Cybercrime News and Vulnerability Analysis
Cyber Offensive Fundamentals 970x120 V0.1
Zscaler Suffers Data Breach: Supply Chain Attack Via Salesloft Drift

Zscaler Suffers Data Breach: Supply Chain Attack Via Salesloft Drift

2 September 2025 10:35

A large-scale cyberattack has targeted security firm Zscaler, which has officially confirmed it was the victim of a supply chain breach. This attack exposed customer contact data due to compromised Salesforce credentials linked to the Salesloft Drift marketing platform. The incident, made public on August 31, 2025, was the result of a larger campaign targeting Salesloft Drift OAuth tokens, involving over 700 organizations globally.

The breach is due to a broader supply chain attack on Salesloft Drift, in which threat actors stole OAuth and refresh tokens. These tokens granted unauthorized access to Salesforce customer instances, allowing the exfiltration of sensitive information. In its advisory, Zscaler confirmed that its Salesforce instance was among those affected.

“As part of this campaign, unauthorized individuals gained access to the Salesloft Drift credentials of its customers, including Zscaler,” the company said. “Following a detailed analysis, we determined that these credentials allowed limited access to certain Salesforce data.”

The information exposed is as follows:

  • customer names
  • Company Email Addresses
  • Job Titles
  • Phone Numbers
  • Regional/Local Details
  • Product License and Commercial Details
  • Content from Selected Support Cases customers

Zscaler has stated that the data breach affected only its Salesforce system, thus ruling out any impact on Zscaler’s products, infrastructure, or services. While no cases of abuse have emerged to date, the company has recommended its customers remain vigilant for potential phishing or social engineering attempts that could exploit the leaked information.

Zscaler has implemented a series of mitigation measures to contain the incident: all Salesloft Drift integrations with Salesforce have been revoked, API tokens have been rotated to prevent future abuse, and, to reduce the risk of social engineering, advanced customer authentication has been introduced during support calls. The company also confirmed that the investigation into the incident remains ongoing to fully identify the extent of the compromise and ensure the full security of the integrations.

Google Threat Intelligence has attributed the Drift compromise to the UNC6395 group, responsible for stealing Salesforce support cases to collect credentials, AWS access keys, Snowflake tokens, and other sensitive data. According to researchers, the attackers demonstrated advanced operational security tactics, such as deleting query processes to hide their activities, although the logs remained available for forensic analysis. The campaign, however, wasn’t limited to the Drift–Salesforce integration: hackers also compromised Drift Email, gaining access to CRM and marketing automation data and leveraging stolen OAuth tokens to infiltrate Google Workspace accounts and read company emails.

Follow us on Google News to receive daily updates on cybersecurity. Contact us if you would like to report news, insights or content for publication.

Cropped RHC 3d Transp2 1766828557 300x300
The Red Hot Cyber Editorial Team provides daily updates on bugs, data breaches, and global threats. Every piece of content is validated by our community of experts, including Pietro Melillo, Massimiliano Brolli, Sandro Sana, Olivia Terragni, and Stefano Gazzella. Through synergy with our industry-leading partners—such as Accenture, CrowdStrike, Trend Micro, and Fortinet—we transform technical complexity into collective awareness. We ensure information accuracy by analyzing primary sources and maintaining a rigorous technical peer-review process.