Attackers exploited Salesloft’s GitHub compromise to steal Drift OAuth tokens, accessing Salesforce in 700+ organizations like Cloudflare and Zscaler without malware. They poisoned unstructured CX data ingested by AI engines, triggering workflows to payroll and CRM. Security blind spots include DLP missing sentiment data and persistent zombie API tokens.
Key Points
- 1.Salesloft/Drift breach hit 700+ orgs via stolen OAuth tokens
- 2.No malware; attackers scanned stolen data for AWS keys and passwords
- 3.DLP misses unstructured CX data like salary complaints in API calls
- 4.Zombie OAuth tokens from ended campaigns enable lateral movement
- 5.CX platforms miscategorized as low-risk despite AI integrations to HRIS/CRM
Impact Analysis
Enterprises face elevated risks from AI CX platforms connecting to sensitive systems, with 81% of intrusions using legit access. This breach underscores need for input integrity checks as CX processes billions of interactions yearly.
Technical Details
Compromised GitHub yielded Drift chatbot tokens for Salesforce access across orgs. Attackers poisoned survey/social data evading DLP patterns, exploiting AI auto-workflows. Qualtrics processes 3.5B interactions annually, doubled since 2023.
