OAuth’s Blind Spot: Lessons from the Salesloft Drift Compromise
- Patrick Duggan
- Sep 2, 2025
- 2 min read
Updated: Sep 4, 2025
In August 2025, a threat actor quietly exploited OAuth credentials tied to the Drift-Salesloft integration, siphoning sensitive Salesforce data from multiple organizations. The attack was swift, surgical, and disturbingly familiar.
We’ve seen this playbook before.
Back in our UNC6395 analysis, we dissected how OAuth misuse and asynchronous Python tooling enabled high-throughput data exfiltration from cloud platforms. The Drift-Salesforce incident confirms that this isn’t an isolated tactic—it’s a repeatable pattern. And if your SaaS ecosystem relies on third-party integrations, it’s a pattern you need to defend against.
Anatomy of the Attack
Initial Access: OAuth tokens tied to Drift were compromised, granting access to Salesforce instances without triggering MFA.
Data Exfiltration: Using aiohttp and Salesforce Bulk API, attackers extracted Account, Contact, Case, and Opportunity records at scale.
Anti-Forensics: SOQL queries were deleted post-exfiltration, obscuring audit trails and complicating incident response.
Credential Harvesting: Exfiltrated data was scanned for embedded secrets—likely to fuel lateral movement across cloud apps.
This wasn’t just a breach. It was a blueprint.
What Defenders Should Do—Now
If you use Drift, Salesforce, or any OAuth-connected SaaS platform, treat this as a proactive exercise.
Modular Response Checklist
1. Audit OAuth Integrations
Review Drift Connected App activity in Salesforce.
Check for unusual login patterns and API usage.
2. Hunt for Indicators
Look for the user agent Python/3.11 aiohttp/3.12.15 in Event Monitoring logs.
Flag logins from Tor exit nodes (with caution—high false positive rate).
3. Scan for Secrets
Use Trufflehog or GitLeaks to scan exfiltrated data and code repos.
Rotate any exposed credentials immediately.
4. Harden Access Controls
Enforce least privilege and conditional access.
Treat OAuth tokens as privileged credentials—monitor and rotate them like passwords.
5. Train for Social Engineering
Assume attackers will weaponize exfiltrated contact data.
Reinforce verification protocols across teams.
Strategic Takeaway
OAuth is powerful—but porous. The Drift compromise shows how easily trust can be weaponized when integrations aren’t monitored with the same rigor as core infrastructure. As defenders, we need to treat third-party apps as first-class security citizens.
This isn’t just about Salesforce or Drift. It’s about the architectural blind spots that emerge when convenience outpaces control.




Comments