• AI Search
  • Cryptocurrency
  • Earnings
  • Enterprise
  • About TechBooky
  • Submit Article
  • Advertise Here
  • Contact Us
TechBooky
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
TechBooky
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
Home Security

Palo Alto Networks Data Leak Exposes Customer Details

Akinola Ajibola by Akinola Ajibola
September 3, 2025
in Security
Share on FacebookShare on Twitter

Data breaches resulting from a recent supply chain attack to Salesloft Drift are being reported by Palo Alto Networks, Zscaler, and Cloudflare.

Palo Alto Networks says it had experienced a data breach in which customer information and support case records were exposed, following unauthorized access to its Salesforce environment. The intrusion was facilitated by attackers who leveraged compromised OAuth tokens originating from the Salesloft Drift breach.

Claims by the company is that there was a supply-chain assault that was made public last week and this had affected hundreds of businesses, with threat to actors using the stolen authentication credentials to steal information.

Customers of Palo Alto Networks informed the media about the hack in the past weekend, voicing their worry that private data, including passwords and IT details, disclosed in support cases, were been compromised.

Palo Alto Networks later told the media that there was no products, systems, or services that were affected and that the incident was exclusive to its Salesforce CRM.

The business told the media that Palo Alto Networks confirms that it was one of hundreds of customers impacted by the widespread supply chain attack targeting the Salesloft Drift application that exposed Salesforce data.

“The situation was quickly contained, and the application was removed from its Salesforce system. It was also confirmed by its Unit 42 investigation that no Palo Alto Networks systems, services, or products which were affected by this circumstance.

“In addition to internal sales account records and basic case data, the attacker mainly extracted business contact and other related account information. They are now in contact with the affected consumers immediately.

Palo Alto Networks further informed the media that there were no technical support files or attachments in the exfiltrated support case data, instead of just contact information and text comments. 

The effort was first identified as UNC6395 by Google’s Threat Intelligence team, focusing on support cases to find private information that might be used to steal data by leveraging into other cloud services, including passwords, authentication tokens, and cloud secrets.

In a danger brief which was sent, Palo Alto Networks warned, “Our observations indicate that the threat actor performed mass exfiltration of sensitive data from various Salesforce objects, including Account, Contact, Case, and Opportunity records.”

“The actor seems to be looking for the obtained data for credentials after exfiltration, most likely with the goal of enabling additional assaults or extending their access. The team noticed that, most likely as an anti-forensics tactic, the threat actor erased queries to conceal evidence of the jobs they executed.

With these credentials, there will be more cloud platforms which might be compromised, allowing data to be stolen for extortion attacks purpose.

Also according to Google and Palo Alto Networks, the threat actors stole data by the use of automated techniques, and user-agent strings type which suggested that they utilised proprietary Python programs:

During these assaults, the threat actors mass-exfiltrated information from the Salesforce objects are Account, Contact, Case, and Opportunity.

The threat actors hid their origin using Tor and erased logs for purposes of avoiding detection.

After the incident, Palo Alto Networks claims to have changed the credentials and revoked the related tokens.

Customers of Salesloft Drift are advised by the company to handle the situation with “immediate urgency” and take the following steps:

Step 1: Examining network logs, identity providers, and Salesforce for any compromise.

Step 2: Examining the every Drift integration for any questionable links.

Step 3: Rotating and revoking credentials, secrets, and authentication keys.

Step 4: Checking the code repositories for embedded authentication keys or tokens using automated tools such as Trufflehog and Gitleaks.

Step 5: In the event that data exfiltration was verified, credentials should be checked.

Though drift integrations have now been stopped by Palto Alto Networks, Salesforce, and Google while at the other hand OAuth token theft inquiry is ongoing.

Google and Zscaler are among the other businesses affected by the supply chain hack.

Members connected to the ShinyHunters extortion organisation have been attacking Salesforce with data theft since the beginning of the year.

Threat actors have used voice phishing, or vishing, attempts previously to fool staff members into connecting a malicious OAuth application to their organization’s Salesforce instances.

Once connected, the threat actors downloaded and stole the databases, which they then utilised to send extortion emails to the company.

But thanks to the Salesloft hack, the threat actors were able to use the OAuth tokens they had stolen to steal data.

Numerous data breaches have been linked previously to the social engineering assaults since Google first revealed them in June. These include Google, Cisco, Farmers Insurance, Workday, Adidas, Qantas, Allianz Life, and the LVMH subsidiaries Louis Vuitton, Dior, and Tiffany & Co.

Google also claims there is not enough proof that the Salesloft supply chain assaults are connected, despite several researchers telling the media that they think the same threat actors are involved.

Austin Larsen, Principal Threat Analyst at Google Threat Intelligence Group, told the media, “At this time, we haven’t seen any compelling evidence connecting them.”

The “Salesforce instance, which we use for customer support and internal customer case management, and some of the data it contains,” was accessed by an external party, this is in relation to a blog post by Cloudflare.

According to the report, “the majority of this data consists of customer contact details and basic support case information, but certain customer support interactions may disclose details about a customer’s configuration and may contain sensitive information like access tokens.” “We strongly advise you to rotate any credentials that you may have shared with us through this channel, as Salesforce support case data contains the contents of support tickets with Cloudflare. Any information that a customer may have shared with Cloudflare in our support system, including logs, tokens, or passwords, should be considered compromised.”

For Cloudflare, the incidence was not a unique one. For next attacks, the threat actor planned to gather customer data and login passwords.

The statement has read that they had suspected the threat actor will use this information to launch targeted attacks against customers across the affected organisations, given that this Drift compromise affected hundreds of organisations.

According to Michal, Cloudflare’s revelation of the Salesloft/Drift issue is a particularly “good” illustration of accountability and openness in cybersecurity reporting.

Michal further said that their blog “openly accepts responsibility for the risks posed by third-party integrations which is external to them and, in addition to providing clear technical detail.” “Cloudflare showed maturity and leadership in incident response by pledging to fortify their SaaS environments and toolchain security moving forward, setting a high bar for how organisations should communicate, remediate, and reinforce trust in the wake of supply chain compromises.”

Related Posts:

  • Palo Alto Networks Earnings: A Strong Surge in…
  • GettyImages-12479043991-e671daff501d46c2a9d46fbe8ae0d18c
    Palo Alto Stock Drops 8% on $25B CyberArk Deal
  • vercel-2249343327_f343ad
    Vercel Admits To Customer Data Been Stolen Before…
  • vercel-header-lg
    Vercel Confirms Breach After Hackers Claim to Sell…
  • smoobu_guides_booking-scaled
    Booking.com Confirms Data Breach, South African…
  • crunchyroll
    Crunchyroll Hit By Data Breach Following Hacker's Claim
  • Advantest_rushes_to_boost_AI_chip_tester_Bloomberg_20260128185756_Bloomberg
    Chip Tester Advantest Struck By Ransomware
  • GettyImages-1231356109
    Google Customer Data Stolen in Salesforce Database Hack

Discover more from TechBooky

Subscribe to get the latest posts sent to your email.

Tags: data breachpalo alto
Akinola Ajibola

Akinola Ajibola

BROWSE BY CATEGORIES

Receive top tech news directly in your inbox

subscription from
Loading

Freshly Squeezed

  • IBM Rolls out ‘Bob’, an AI Development Partner Built around Multi-model Routing and Human Checkpoints April 29, 2026
  • iOS 27 Reportedly Adds New Apple Intelligence Photo Editing Tools April 29, 2026
  • Jack Dorsey-backed Divine brings Vine’s Six‑second Loops Back to Life April 29, 2026
  • Elon Musk Takes The Stand In High-Stakes OpenAI Trial Against Sam Altman April 28, 2026
  • Ethiopia’s Dodai Secures $13 Million to Scale Battery-Swapping EV Network April 28, 2026
  • OpenAI Revenue Growth Misses Expectations as Costs Surge, Report Says April 28, 2026
  • EU Pressures Google To Open Android’s AI To Rivals, Google Calls It “Unwarranted” April 28, 2026
  • Airtel Money links with Absa Bank Kenya to court SME payments April 28, 2026
  • China Blocks Meta’s $2B Manus Deal After Months Of Review April 27, 2026
  • Nigeria Lifts $32.8M Meta Fine For Privacy Breach, Raising Questions About Enforcement Trust April 27, 2026
  • Microsoft and OpenAI Restructure Partnership, End Revenue Sharing and Exclusivity April 27, 2026
  • Microsoft & Meta Reveal Large Layoffs Despite Massive AI Investment April 24, 2026

Browse Archives

April 2026
MTWTFSS
 12345
6789101112
13141516171819
20212223242526
27282930 
« Mar    

Quick Links

  • About TechBooky
  • Advertise Here
  • Contact us
  • Submit Article
  • Privacy Policy
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • Artificial Intelligence
  • Gadgets
  • Metaverse
  • Tips
  • AI Search
  • About TechBooky
  • Advertise Here
  • Submit Article
  • Contact us

© 2025 Designed By TechBooky Elite

Discover more from TechBooky

Subscribe now to keep reading and get access to the full archive.

Continue reading

Chat with TechBooky AI
💬
TechBooky AI ✕
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.