Zscaler data breach exposes customer info after Salesloft Drift compromise
网络安全公司Zscaler警告称其遭遇数据泄露,攻击者通过入侵其Salesforce实例窃取了客户信息和支持案例内容。此次事件与Salesloft Drift供应链攻击有关,攻击者利用被盗的OAuth和刷新令牌进入客户 Salesforce 环境并窃取敏感数据。泄露信息包括客户姓名、业务邮箱、职位、电话号码、地区详情、Zscaler产品许可及商业信息等。Zscaler强调此次事件仅影响其 Salesforce 实例,并未波及其产品和服务。公司已撤销所有 Salesloft Drift 集成,并加强客户身份验证协议以防范社会工程攻击。Google 威胁情报指出此次攻击由 UNC6395 组织实施,该组织通过窃取支持案例中的认证令牌和密码进行活动,并利用 OAuth 令牌访问 Google Workspace 邮箱账户阅读邮件。此外,Salesloft 供应链攻击还影响到 Drift Email 系统,目前 Google 和 Salesforce 已暂停相关集成以配合调查。 总结:Zscaler因Salesforce被入侵导致数据泄露,涉及客户信息和支持案例内容。攻击者利用Salesloft Drift漏洞获取令牌进入系统。泄露信息包括个人信息和商业数据。Zscaler已采取措施应对,并警告客户防范钓鱼攻击。(约100字) 2025-9-1 17:0:22 Author: www.bleepingcomputer.com(查看原文) 阅读量:12 收藏

Zscaler logo

Cybersecurity company Zscaler warns it suffered a data breach after threat actors gained access to its Salesforce instance and stole customer information, including the contents of support cases.

This warning follows the compromise of Salesloft Drift, an AI chat agent that integrates with Salesforce, in which attackers stole OAuth and refresh tokens, enabling them to gain access to customer Salesforce environments and exfiltrate sensitive data.

In an advisory, Zscaler says that its Salesforce instance was impacted by this supply-chain attack, exposing customers' information.

"As part of this campaign, unauthorized actors gained access to Salesloft Drift credentials of its customers including Zscaler," reads Zscaler's advisory.

"Following a detailed review as part of our ongoing investigation, we have determined that these credentials have allowed limited access to some Zscaler's Salesforce information."

The exposed information includes the following:

  • Names
  • Business email addresses
  • Job titles
  • Phone numbers
  • Regional/location details
  • Zscaler product licensing and commercial information
  • Content from certain support cases

The company stresses that the data breach only impacts its Salesforce instance and no Zscaler products, services, or infrastructure.

While Zscaler states that it has detected no misuse of this information, it recommends that customers remain vigilant against potential phishing and social engineering attacks that could exploit this information.

The company also says it has revoked all Salesloft Drift integrations to its Salesforce instance, rotated other API tokens, and is conducting an investigation into the incident.

Zscaler has also strengthened its customer authentication protocol when responding to customer support calls to guard against social engineering attacks.

Google Threat Intelligence warned last week that a threat actor, tracked as UNC6395, is behind the attacks, stealing support cases to harvest authentication tokens, passwords, and secrets shared by customers when requesting support.

"GTIG observed UNC6395 targeting sensitive credentials such as Amazon Web Services (AWS) access keys (AKIA), passwords, and Snowflake-related access tokens," reports Google.

"UNC6395 demonstrated operational security awareness by deleting query jobs, however logs were not impacted and organizations should still review relevant logs for evidence of data exposure."

It was later revealed that the Salesloft supply-chain attack not only impacted Drift Salesforce integration, but also Drift Email, which is used to manage email replies and organize CRM and marketing automation databases.

Google warned last week that attackers also used stolen OAuth tokens to access Google Workspace email accounts and read emails as part of this breach.

Google and Salesforce have temporarily disabled their Drift integrations pending the completion of an investigation.

Some researchers have told BleepingComputer that they believe the Salesloft Drift compromise overlaps with the recent Salesforce data theft attacks by the ShinyHunters extortion group.

Since the beginning of the year, the threat actors have been conducting social engineering attacks to breach Salesforce instances and download data.

During these attacks, threat actors conduct voice phishing (vishing) to trick employees into linking a malicious OAuth app with their company's Salesforce instances.

Once linked, the threat actors used the connection to download and steal the databases, which were then used to extort the company through email.

Since Google first reported the attacks in June, numerous data breaches have been tied to the social engineering attacks, including Google itselfCiscoFarmers InsuranceWorkdayAdidasQantasAllianz Life, and the LVMH subsidiaries Louis VuittonDior, and Tiffany & Co.


文章来源: https://www.bleepingcomputer.com/news/security/zscaler-data-breach-exposes-customer-info-after-salesloft-drift-compromise/
如有侵权请联系:admin#unsafe.sh