Back to the blog
September 4, 2025

The Salesloft Drift breach is bigger than Salesforce: What it says about SaaS security

The Salesforce breach exposed serious SaaS supply chain risks. Learn how OAuth integrations create blind spots and what to do about them.

The recent disclosure that attackers had infiltrated Salesforce environments through stolen OAuth tokens from the Salesloft Drift app was shocking—but not surprising.

‍

This wasn’t just about one app, one token, or even one vendor. It was a preview of the future of attacks against the SaaS supply chain. The incident underscored how fragile and over-trusted today’s web of SaaS and AI integrations has become, and why organizations need to rethink how they secure it.

‍

The SaaS supply chain: Invisible, sprawling, and risky by default

Modern SaaS isn’t just Salesforce, Google Workspace, or Slack. It’s the hundreds of apps—sanctioned or not—that connect to them in minutes via OAuth grants, API keys, or service accounts.

‍

Every one of these connections creates a non-human identity with its own set of permissions. In practice, this means a sales plugin, AI assistant, or reporting tool may hold the keys to your most sensitive business data.

‍

The result is a dense, dynamic mesh of integrations that powers productivity—but also creates hidden pathways attackers can exploit. Compromise one trusted integration, and adversaries can ride straight into core business systems. That’s exactly what happened in the Salesforce breach, and it will happen again.

‍

Why SaaS is now the crown jewel target

Customer data, source code, credentials, financial records—today, most corporate crown jewels live inside SaaS platforms. But compared to network or endpoint monitoring, SaaS security lags far behind.

‍

Ask most security teams:

  • Which apps are connected to Salesforce right now?
  • What data can they access?
  • Who granted that access, and why?
  • Are unused OAuth tokens still active?

Too often, the answers are unknown. Those blind spots are precisely where attackers are focusing their efforts.

‍

Attackers have found the weakest link

UNC6395 didn’t need a zero-day exploit or custom malware. They simply abused stolen OAuth tokens—one of the most common building blocks of SaaS and AI connectivity.

‍

The lesson isn’t just about Salesforce. It’s that SaaS ecosystems everywhere are over-trusted, under-managed, and rarely audited. Attackers know this. And they’re exploiting it faster than defenders are closing the gap.

‍

Four steps to secure your SaaS supply chain

Organizations don’t have to wait for the next Drift-style campaign to act. Adopting these key practices can significantly reduce SaaS supply chain risk:

‍

🔍 Asset discovery & visibility

Continuously inventory ALL SaaS and AI apps in use across the workforce—not just sanctioned ones. Visibility into every app and integration is the foundation of SaaS security.

‍

📊 Supply chain risk awareness

Map how apps connect to critical systems like Salesforce, what data they access, and which vendors they rely on. Understanding these dependencies helps you prioritize the riskiest connections.

‍

🛡️ Integration security posture management

Regularly review OAuth grants, API keys, and service accounts. Limit overly broad permissions, revoke unused access, and enforce least privilege for app-to-app integrations.

‍

⚡ Automated monitoring & response

Because SaaS ecosystems are dynamic, organizations need continuous monitoring with automated detection (and remediation) of risky changes, such as new OAuth grants or vendor breaches.

‍

It’s time to secure the SaaS supply chain

The Salesforce breach wasn’t an isolated incident—it was a warning. SaaS supply chains are now prime targets because they work for attackers.

‍

It’s time for security teams to treat SaaS and AI integrations with the same rigor as endpoints and infrastructure. With Nudge Security, you can finally defend this critical layer of your environment and stay ahead of the next Drift-style attack.

‍

👉 See how Nudge Security can protect your SaaS supply chain

Related posts

Report

Debunking the "stupid user" myth in security

Exploring the influence of employees’ perception
and emotions on security behaviors