Silent Breach, Massive Impact→ Inside the Salesforce–Salesloft Drift Supply-Chain Hack

You can lock every door in your house… 
But what if the delivery guy leaves the gate open? 

This simple analogy captures how supply chain attacks work. 
Attackers don’t target you directly—they exploit vulnerabilities in your vendors, suppliers, and third-party tools to gain entry. 

Why It’s a Critical Concern Today

In August 2025, attackers exploited compromised OAuth tokens from third-party platforms Salesloft and Drift. This allowed unauthorized access to Salesforce and Google Workspace environments across hundreds of companies, including major cybersecurity firms. 

  • Salesforce–Salesloft Drift AI Chatbot Supply-Chain Incident (Aug 2025):
    Attackers abused OAuth tokens from the Salesloft Drift app to access Salesforce data at hundreds of firms (e.g., Cloudflare, Palo Alto Networks, Zscaler). Data pulled from Salesforce case objects and contact records raised phishing and secret-harvesting risk. Actions seen in public post-mortems: revoke Drift integrations, rotate tokens/keys, audit OAuth scopes, and monitor anomalous Salesforce queries. 
  • The SolarWinds breach in 2020 was a wake-up call, showing how a trusted vendor could quietly compromise thousands, and the risk hasn’t gone away. 
  • Palo Alto Networks confirmed the breach was limited to their CRM (Customer Relationship Management) system, exposing business contact details, internal sales records, and support case data. Their core infrastructure remained secure. 
  • Zscaler faced a similar incident, with attackers accessing customer contact data, licensing information, and support metadata. 
  • Security researchers at Google and Mandiant traced the campaign to threat group UNC6395, estimating over 700 organizations were impacted. 

Though core systems weren’t breached, the consequences included sensitive data exposure, customer notifications, and extensive investigations, highlighting the far-reaching impact of supply chain vulnerabilities. 

Global Accountability: Regulatory Expectations

Regulators worldwide hold organizations accountable for the security of their third-party relationships. 

  • United Kingdom (ICO): UK GDPR makes data controllers responsible for breaches involving external processors 
  • European Union (GDPR & NIS2): Requires proactive vendor risk management and breach reporting within 72 hours.
  • India (DPDP Act): Mandates data protection standards across third-party processors 
  • United States (SEC, CISA): Emphasizes board-level oversight and incident disclosures related to vendor cybersecurity risks

Across jurisdictions, third-party governance is a must-have for compliance. 

Understanding the Risk Landscape

Supply chain attacks have become a preferred tactic for cybercriminals. 

Key risk factors include: 

  • Excessive access permissions enabling undetected data theft 
  • Weak vendor security practices introducing vulnerabilities 
  • Lack of continuous monitoring delaying breach detection 

Many organizations only discover the full scope of integration risks after an incident. 

Strengthening Third-Party Security

Modern GRC (Governance, Risk, and Compliance) requires more than static assessments. Effective third-party security involves: 

  • Zero Trust: Continuously validate and restrict vendor access 
  • Continuous Monitoring: Replace one-time audits with ongoing oversight 
  • Operational Validation: Show active controls, not just certifications 
  • Incident Playbooks: Prepare for supplier-related breach responses 

How ServQual SUSAN Can Help

SUSAN simplifies third-party risk management by: 

  • Identifying vulnerabilities before exploitation 
  • Automating compliance checks across global standards 
  • Providing vendor security insights 
  • Enabling real-time monitoring and audit-ready reporting 
  • OAuth hardening (least-privilege scopes, rotation, IP allowlisting)
  • Vendor tiering + continuous assessment (SUSAN TVRM)
  • SBOM/code-signing checks for software suppliers
  • SIEM alerts for Salesforce API anomalies
  • Incident runbook + phishing comms

Don’t Let Third-Party Be Your Weak Link

Start with SUSAN today and strengthen your ecosystem.

Key Takeaways

You’re not just defending your business 
You’re protecting an entire network of partners, suppliers, and integrations 

Supply chain risk is often invisible but persistent 
Third-party security is essential to resilience 
And with SUSAN, you stay ahead of the threat 

Picture of Dara Sturgeon

Dara Sturgeon

Security Success Manager | ServQual

FAQS

We serve B2B SaaS companies, financial institutions, healthcare providers, manufacturing firms, and legal consultancies.

Yes, we have a UK-based team providing 24/7 incident response and support.

Absolutely. We specialize in regulatory compliance and offer full support from gap assessment to certification readiness.

Unlike large vendors, we provide agile, personalized cybersecurity services backed by global expertise and UK-specific support.

 

What do you think?

What to read next