Demo Request
Take a personalized product tour with a member of our team to see how we can help make your existing security teams and tools more effective within minutes.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Home
Blog

The Salesloft-Drift Breach: Analyzing the Biggest SaaS Breach of 2025

Gal Nakash
Updated
September 3, 2025
September 4, 2025
6 min read
Ready to Close the SaaS Security Gap?
Chat with us

Supply chain attacks that exploit unmonitored SaaS-to-SaaS integrations affect ten times more companies than traditional credential-based breaches. Organizations using Salesloft–Drift integrations should immediately review their SaaS environment for potential compromise and implement comprehensive SaaS security controls.

Reco's security researchers are analyzing the largest SaaS breach campaign of the year, impacting over 700 companies and counting. The team has discovered that both Salesforce and Gmail instances were compromised through the UNC6395 attack on Salesloft-Drift integrations. This represents a fundamental shift in how attackers are exploiting the SaaS Security Gap—the growing gap between what organizations can protect and what's outpacing their security.

Most victims are technology and software firms themselves, meaning any one of them could trigger a cascading supply-chain breach. This represents unprecedented risk for any company using SaaS integrations that bypass traditional security controls by default.

Reco uncovers critical security gaps that enabled the attack

On August 26th, 2025, Mandiant reported Salesforce breaches via the Salesloft–Drift integration, attributing the activity to UNC6395. Reco's research reveals that this attack succeeded because of fundamental gaps in how organizations secure their SaaS ecosystems—gaps that Dynamic SaaS Security is specifically designed to close.

There is additional evidence that this campaign was carried out by the combined forces of ShinyHunters and Scattered Spider, demonstrating the sophistication of threat actors now targeting SaaS supply chains.

Attack timeline and techniques

Attackers initially compromised the third-party sales tools Salesloft Drift, then leveraged OAuth tokens and SaaS-to-SaaS integrations to pivot into Salesforce and Google Workspace instances of numerous downstream companies. The breach demonstrates five critical attack vectors that traditional security cannot address:

  • OAuth Token Exploitation: Attackers bypassed traditional authentication by abusing OAuth tokens, which provided persistent access without user interaction or MFA prompts.
  • SaaS-to-SaaS Lateral Movement: Once inside Salesloft Drift, attackers exploited SaaS integrations to move laterally into connected applications across hundreds of organizations.
  • Supply Chain Amplification: Instead of targeting individual organizations, attackers compromised one vendor to instantly access hundreds of customer environments—a 10x force multiplier compared to traditional attacks.
  • Secrets Harvesting: Attackers specifically hunted for credentials, API keys, and secrets embedded in SaaS environments, using these to unlock additional systems.
  • Integration Blind Spots: Most security tools lack visibility into SaaS-to-SaaS connections, making this attack vector invisible to traditional security measures.

Why traditional SaaS security failed

This attack succeeded because current security measures are static and cannot keep up with SaaS sprawl. They were designed for the early days of SaaS when organizations had Salesforce and a handful of other apps. The result is the SaaS Security Gap—the growing gap between what organizations can protect and what's outpacing their security.

Traditional security approaches failed to:

  • Provide visibility into SaaS-to-SaaS connections
  • Monitor OAuth token usage patterns across applications
  • Detect cross-application threat patterns
  • Identify secrets and credentials embedded in SaaS environments
  • Respond to threats spanning multiple SaaS applications

How Reco's Dynamic SaaS Security Would Have Stopped Each Attack Vector

Discovery: Instant SaaS-to-SaaS Visibility

The Gap: Most organizations lack visibility into their complete SaaS ecosystem, especially third-party integrations and OAuth tokens.

How Reco Stops It: Our Discovery module instantly tracks all SaaS-to-SaaS connections, including Shadow SaaS, AI Agents, and third-party integrations. We would have immediately identified the Salesloft-Drift connection to Salesforce and Gmail, providing complete visibility into the potential attack surface.

With Reco's comprehensive app discovery covering 200+ applications, security teams would have had full context about which systems were at risk through the compromised integration.

Identity & Access Governance: OAuth Token Monitoring

The Gap: Traditional IAM solutions trust OAuth tokens by design, missing anomalous behavior from compromised tokens.

How Reco Stops It: Our Identity & Access Governance module continuously monitors OAuth token usage patterns across your entire SaaS ecosystem. We would have detected the unusual access patterns from the compromised Salesloft OAuth tokens, triggering immediate alerts about suspicious cross-application activity.

Our AI-powered Identity Agents provide 360-degree context that connects all user accounts across applications, enabling us to spot when OAuth tokens are being used in ways that don't match normal user behavior patterns.

SSPM+: Configuration Drift Detection

The Gap: Organizations struggle to maintain secure configurations across hundreds of integrated applications.

How Reco Stops It: Our SSPM+ module keeps security postures airtight within business context. We would have continuously monitored the Salesloft-Drift integration configurations, detecting any unauthorized changes or excessive permissions that could indicate compromise.

With support for 20+ compliance frameworks and automated remediation workflows, security teams would have been alerted to configuration drifts that made the attack possible.

Identity Threat Detection & Response: Cross-SaaS Policy Violations

The Gap: Most security tools can't detect threats that span multiple SaaS applications.

How Reco Stops It: Our ITDR module uses unique cross-SaaS policies to detect anomalies across all connected applications. The unusual data access patterns and secrets harvesting activities would have triggered our behavioral detection rules, providing instant alerts with full context about the attack chain.

Our 400+ out-of-the-box detection controls include specific rules for OAuth token abuse and unusual integration behavior that would have caught this attack in its early stages.

Staying Safe in the Future: Reco Recommended Actions

1. Check whether your organization has instances of Salesloft and Drift. If you identify this as so during discovery, verify whether they are connected to Salesforce, Google, or other core apps.

Reco discovers known and unknown SaaS-to-SaaS connections including Salesloft and Drift.

2. Verify whether your organization has been breached. Revoke tokens to these applications immediately. 

3. Consult your event log for indicators of compromise activity from Salesloft or Drift. Understand impacted users and their permission level. 

Reco visuals connected integrations, and breaks down the permission level and the risk level.

4. Implement continuous monitoring of OAuth tokens and third-party integrations. Regular auditing isn't enough when tokens can be compromised at any time.

Reco has a dedicated policy for this attack pattern that can be enabled for continuous monitoring.

5. Deploy detection rules that can spot threats spanning multiple SaaS applications. Traditional security tools that operate in silos will miss these supply chain attacks.

Reco alerts if the policy has been violated due to a breach. The alert story automates the response plan by providing an overview, risk factors, next best actions, and key investigation questions.

6. Actively scan for and remove secrets, API keys, and credentials from SaaS environments. These embedded secrets become stepping stones for attackers.

The Bottom Line

The Salesloft-Drift breach wasn't just a single vendor compromise, it was a demonstration of how interconnected SaaS ecosystems can amplify attacks beyond anything we've seen before. Supply chain attacks that exploit unmonitored SaaS-to-SaaS integrations affect ten times more companies than traditional credential-based breaches.

That's where Dynamic SaaS Security comes in.

Reco's Dynamic SaaS Security Platform would have provided the visibility, governance, and real-time threat detection needed to stop this attack at multiple points:

  • Discovery of the risky SaaS-to-SaaS connection
  • Identity governance monitoring OAuth token usage
  • Posture management detecting configuration weaknesses
  • Threat detection spotting unusual access patterns

The SaaS Security Gap is real, and it's growing every day. But with the right approach—one that evolves with your SaaS environment rather than falling behind it—attacks like this become preventable.

No items found.

Gal Nakash

ABOUT THE AUTHOR

Gal is the Cofounder & CPO of Reco. Gal is a former Lieutenant Colonel in the Israeli Prime Minister's Office. He is a tech enthusiast, with a background of Security Researcher and Hacker. Gal has led teams in multiple cybersecurity areas with an expertise in the human element.

Technical Review by:
Gal Nakash
Technical Review by:
Gal Nakash

Gal is the Cofounder & CPO of Reco. Gal is a former Lieutenant Colonel in the Israeli Prime Minister's Office. He is a tech enthusiast, with a background of Security Researcher and Hacker. Gal has led teams in multiple cybersecurity areas with an expertise in the human element.

Ready to Close the SaaS Security Gap?
Chat with us
Table of Contents
Get the Latest SaaS Security Insights
Subscribe to receive updates on the latest cyber security attacks and trends in SaaS Security.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Ready for SaaS Security
that can keep up?

Request a demo