Salesloft says Drift customer data thefts linked to March GitHub account hack

<span class="caption">Hand working at laptop computer illustrating cyber crime | Image Credits:Andrew Brookes</span>
Hand working at laptop computer illustrating cyber crime | Image Credits:Andrew Brookes

Salesloft said a breach of its GitHub account in March allowed hackers to steal authentication tokens that were later used in a mass-hack targeting several of its big tech customers.

Citing an investigation by Google’s incident response unit Mandiant, Salesloft said on its data breach page that the as-yet-unnamed hackers accessed Salesloft’s GitHub account and performed reconnaissance activities from March until June, which allowed them to download “content from multiple repositories, add a guest user and establish workflows.”

The timeline raises fresh questions about the company’s security posture, including why it took Salesloft some six months to detect the intrusion.

Salesloft said that the incident is now “contained.”

Do you have more information about these data breaches? From a non-work device, you can contact Lorenzo Franceschi-Bicchierai securely on Signal at +1 917 257 1382, or via Telegram and Keybase @lorenzofb, or email. You also can contact TechCrunch via SecureDrop.

After the hackers broke into its GitHub account, the company said the hackers accessed the Amazon Web Services cloud environment of Salesloft’s AI and chatbot-powered marketing platform Drift, which allowed them to steal OAuth tokens for Drift’s customers. OAuth is a standard that allows users to authorize one app or service to connect to another. By relying on OAuth, Drift can integrate with platforms like Salesforce and others to interact with website visitors.

In stealing these tokens, the threat actors breached several Salesloft’s customers, such as Bugcrowd, Cloudflare, Google, Proofpoint, Palo Alto Networks, and Tenable, among others, many of which are likely still unknown.

Google’s Threat Intelligence Group revealed the supply chain breach late in August, attributing it to a hacking group it calls UNC6395.

Cybersecurity publications DataBreaches.net and Bleeping Computer previously reported that the hackers behind the breach are the prolific hacking group known as ShinyHunters. The hackers are believed to be trying to extort victims by contacting them privately.

By accessing Salesloft tokens, the hackers then access Salesforce instances, where they stole sensitive data contained in support tickets. “The actor’s primary objective was to steal credentials, specifically focusing on sensitive information like AWS access keys, passwords, and Snowflake-related access tokens,” Salesloft said on August 26.

Salesloft said on Sunday that its integration with Salesforce is now restored.

Source link

Advertisement

spot_img

Short Sellers Pile Pressure...

Short sellers have made their biggest bets in...

Eric Trump Touts Crypto...

Eric Trump, co-founder and chief...

Anglo, Teck forge $53...

(Reuters) -London-listed Anglo American and...

Short Sellers Pile Pressure on Kering’s Incoming CEO

Short sellers have made their biggest bets in more than a decade against Kering, data reviewed by Reuters shows, adding to the pressure...

Eric Trump Touts Crypto As ‘Greatest Hedge To Real Estate’ As His Bitcoin Mining Company Makes An Impressive Wall Street Debut

Eric Trump, co-founder and chief strategy officer at American Bitcoin Corp. (NASDAQ:ABTC), deemed cryptocurrency as the “greatest hedge” to real estate...

Anglo, Teck forge $53 billion mining giant in bet on surging copper demand

(Reuters) -London-listed Anglo American and Canada's Teck Resources will merge in a $53 billion deal, the companies said on Tuesday,...

Axi Select Adds MT5 for Traders with Up to $1 Million in Funding

“Dynamic & Spot-On” – Yulia Tereshchenko on Finance Magnates “Dynamic...

Trump policies dominate Virginia 11th District congressional race

NEWYou can now listen to Fox News articles! FAIRFAX, VA – He's not on the ballot, but President Donald Trump is smack...