https://nearlyright.com/feed 09月30日
黑客通过Salesforce集成点入侵700多家公司
index_new5.html
../../../zaker_core/zaker_tpl_static/wap/tpl_guoji1.html

 

2025年8月8日至18日,中国黑客组织UNC6395通过攻击Salesloft Drift平台的OAuth令牌,入侵了700多家公司,直接访问了它们的Salesforce数据库,窃取了包含亚马逊云服务访问密钥、Snowflake凭证、VPN密码和客户数据等敏感信息。该攻击暴露了现代企业级软件集成中存在的安全漏洞,表明企业安全系统在处理合法访问时存在盲点。

🔍 UNC6395利用Salesloft Drift平台的OAuth令牌,通过单个集成点入侵了700多家公司,直接访问了它们的Salesforce数据库,窃取了包括亚马逊云服务访问密钥、Snowflake凭证、VPN密码和客户数据等敏感信息。

🔑 攻击者利用OAuth令牌作为‘永不失效’的访问凭证,绕过了多因素认证和安全警报,在10天内系统性地窃取了目标公司的数据,而企业安全监控系统未能检测到异常。

🌐 Salesloft Drift平台与Salesforce的集成使其成为攻击者的跳板,进一步扩展到58个其他业务应用程序,包括客户关系管理、分析、营销自动化和销售工具,暴露了现代企业级软件的攻击面。

🔒 攻击者展现了高度的专业性,通过侦察查询和精确的数据提取,仅获取所需凭证而非批量数据,同时删除查询任务以掩盖痕迹,显示了对企业审计系统的了解。

📈 该事件凸显了非人类身份(如OAuth令牌)在现代网络安全中的风险,这些凭证通常缺乏监控且提供24/7访问权限,增加了长期风险,而传统安全模型难以应对这种分布式应用生态系统的复杂性。

Chinese hackers breach 700+ companies through single Salesforce integration point

UNC6395's systematic exploitation of Salesloft Drift OAuth tokens reveals dangerous vulnerabilities in enterprise third-party integrations

In ten days, Chinese hackers did what most cybercriminals can only dream of, they breached over 700 companies without attacking a single one directly.

Between August 8 and 18, 2025, the sophisticated threat group UNC6395 pulled off what security experts are calling the year's most audacious supply chain attack. They didn't waste time infiltrating individual corporate networks or crafting elaborate phishing campaigns. Instead, they found something far more valuable, a single compromised integration point that gave them keys to hundreds of enterprise kingdoms simultaneously.

The target was Salesloft's Drift platform—an AI chat agent that helps sales teams convert website visitors into leads. The prize was OAuth tokens that unlocked direct access to victims' Salesforce databases, packed with the crown jewels of corporate espionage, Amazon Web Services access keys, Snowflake credentials, VPN passwords, and customer data spanning industries from technology to finance.

This wasn't a smash-and-grab operation. UNC6395 demonstrated surgical precision, systematically cataloguing each victim's data before extracting exactly what they needed. They understood enterprise security systems well enough to cover their tracks while leaving just enough evidence for investigators to piece together the scale of their success weeks later.

The implications extend far beyond the immediate victims. This attack exposes a fundamental flaw in how modern businesses think about cybersecurity—and suggests that the convenience driving enterprise software adoption has created vulnerabilities that most security teams don't even know exist.

How one integration became 700 backdoors

UNC6395's breakthrough came from recognising a basic truth about modern enterprise software, everything connects to everything else.

Salesloft Drift wasn't just a chat widget. Once integrated with a company's Salesforce instance, it became a trusted insider with persistent access to customer records, sales pipelines, and support cases. The integration relied on OAuth tokens—digital credentials designed to eliminate password sharing between applications while maintaining security.

These tokens function like master keys that never expire. Unlike human users who log in and out, OAuth tokens remain "always authenticated," providing seamless access that makes SaaS applications productive and user-friendly. UNC6395 turned this convenience into their greatest weapon.

Once they compromised Drift's OAuth tokens, the attackers could waltz into victim organisations' Salesforce environments without triggering multi-factor authentication, security alerts, or most monitoring systems. To enterprise security infrastructure, UNC6395's systematic data harvesting looked like normal application behaviour.

The hackers demonstrated methodical expertise that would impress any database administrator. They began each intrusion with reconnaissance queries—simple commands like "SELECT COUNT() FROM User" to measure the size of their target before diving deeper. Then came the surgical extractions, pulling detailed user profiles, case histories, and account information with queries specifically designed to locate embedded credentials.

Their shopping list was precise, AWS access keys beginning with "AKIA," Snowflake database credentials, anything containing the words "password," "secret," or "key." They weren't interested in bulk data theft; they wanted the specific credentials that would unlock additional systems across their victims' infrastructure.

The expanding attack surface

What began as a Salesforce-focused incident rapidly evolved into something far more concerning. On August 28, Google's investigation revealed that UNC6395 had also compromised Drift's email integration tokens, providing access to Google Workspace accounts for organisations using that connection.

Austin Larsen from Google's Threat Intelligence Group delivered the sobering update, "The scope of this compromise is not exclusive to the Salesforce integration with Salesloft Drift and impacts other integrations."

This expansion illuminated the true scope of modern enterprise attack surfaces. Salesloft Drift doesn't just connect to Salesforce—it integrates with 58 different business applications spanning customer relationship management, analytics, marketing automation, and sales tools. Each integration potentially offered UNC6395 additional pathways into victim networks.

The attackers' infrastructure revealed careful operational planning. They mixed legitimate cloud hosting from AWS and DigitalOcean with Tor exit nodes for anonymity. Their custom tools bore innocuous names like "Salesforce-Multi-Org-Fetcher/1.0"—identifiers that would blend seamlessly into enterprise network traffic while enabling systematic data collection across hundreds of targets.

Most disturbing was their operational security discipline. UNC6395 routinely deleted query jobs after completing extractions, demonstrating awareness of Salesforce's audit capabilities while leaving just enough forensic evidence for investigators to reconstruct their activities. They understood enterprise logging systems better than many enterprises understand them themselves.

The ten-day blindness

The most unsettling aspect of this breach isn't the initial compromise—it's how long sophisticated enterprise security systems remained oblivious to systematic data theft happening through legitimate channels.

For over ten days, UNC6395 extracted sensitive data from hundreds of organisations while security monitoring systems detected nothing unusual. The attackers exploited a fundamental blindspot in enterprise cybersecurity, the assumption that authenticated access equals legitimate access.

Traditional security monitoring excels at detecting unauthorised entry attempts, unusual login patterns, and malware signatures. UNC6395's approach—using legitimate OAuth tokens to conduct apparently normal database queries—fell completely below the radar of most alerting systems.

This visibility gap reflects deeper challenges in protecting distributed enterprise environments. When critical business data flows through dozens of interconnected applications, each with its own authentication mechanisms and access patterns, distinguishing malicious activity from legitimate automation becomes nearly impossible.

Chad Knipschild from security vendor AppOmni captured the strategic implications, "The lateral movement is made possible by the abuse of admin OAuth tokens from lesser-known SaaS apps to compromise business-critical applications."

The delayed discovery wasn't due to poor security practices at individual organisations. Companies like Zscaler—a cybersecurity firm that confirmed its own compromise in this campaign—maintain sophisticated threat detection capabilities. The problem was architectural, OAuth-based integrations create trusted pathways that bypass many of the controls designed to detect unauthorised access.

When response reveals the problem

The coordinated response to UNC6395's campaign exposed just how complex modern enterprise security has become. On August 20, Salesloft and Salesforce revoked all active Drift OAuth tokens and removed the application from Salesforce's AppExchange marketplace. Google similarly disabled compromised integrations and revoked affected tokens.

But the remediation process revealed the true scope of the challenge facing enterprise security teams. Google's advisory read like a forensic manual, search Salesforce objects for AWS access key patterns, examine authentication logs spanning multiple platforms, deploy credential-scanning tools across entire data repositories, manually review third-party application permissions.

For organisations using Salesloft Drift, this represented weeks of investigative work just to understand their exposure. Many discovered they lacked basic visibility into their own integration ecosystems—they knew which applications their employees used, but not which applications those applications could access.

Zscaler's response illustrates the operational burden. Despite being a cybersecurity company with extensive internal expertise, they needed to revoke Drift's access, rotate API tokens across multiple systems, implement additional safeguards, and conduct comprehensive audits to determine what customer contact information had been exposed.

The incident highlighted a uncomfortable reality, most enterprises have limited understanding of their actual attack surface. The applications employees use daily connect to dozens of other systems through OAuth tokens, API keys, and automated workflows that operate largely outside IT oversight.

The non-human identity crisis

UNC6395's success exposes the most significant blindspot in contemporary cybersecurity, non-human identities.

While enterprises invest heavily in monitoring human user behaviour—tracking login patterns, enforcing multi-factor authentication, analysing behavioural anomalies—application-to-application authentication operates with minimal oversight. OAuth tokens and API keys function as "always logged in" identities that rarely expire and typically lack the monitoring applied to human accounts.

This creates an asymmetric risk profile. Human users might access enterprise systems for eight hours daily; OAuth tokens provide 24/7 access that persists across employee departures, organisational changes, and evolving business relationships. They enable the seamless integrations that make modern SaaS environments productive, but they also create permanent pathways that sophisticated threat actors can exploit indefinitely.

Research from Obsidian Security suggests that supply chain attacks exploiting SaaS integrations affect ten times more companies than traditional credential-based breaches. The mathematics are compelling, why target individual organisations when compromising one vendor with hundreds of downstream connections provides dramatically superior return on investment?

This economic logic suggests that UNC6395's technique represents more than an isolated incident. As enterprise application portfolios continue expanding—growing 41% over the past two years according to World Economic Forum research—the number of potential integration points multiplies accordingly.

The new enterprise reality

The Salesloft Drift incident crystallises fundamental tensions in modern enterprise technology adoption. The same features that make SaaS applications appealing—frictionless integration, seamless authentication, broad connectivity—also create attack surfaces that traditional security models cannot adequately address.

Most enterprise security frameworks assume defined network perimeters and known endpoints. The distributed reality of SaaS environments, where critical business data flows through dozens of interconnected applications managed by different vendors, challenges these foundational assumptions.

The incident also reveals the limitations of conventional vendor risk assessment. Neither Salesforce nor Google experienced direct platform compromises. Instead, the trusted relationships that enable their ecosystems became vectors for widespread data exposure. This dynamic complicates traditional due diligence processes that evaluate individual vendors' security postures rather than systemic supply chain implications.

UNC6395's systematic success demonstrates that sophisticated threat actors increasingly understand enterprise software architectures better than the organisations deploying them. Their reconnaissance-then-extraction methodology, operational security discipline, and infrastructure choices suggest deep familiarity with both Salesforce environments and enterprise monitoring capabilities.

The inevitable evolution

The response to this incident is already driving changes across the enterprise security industry. Vendors are expanding monitoring capabilities to include non-human identities and SaaS-to-SaaS connections. Organisations are conducting integration audits and implementing restrictive OAuth policies. Security frameworks are evolving to account for distributed application ecosystems.

Yet the fundamental challenge persists. The productivity and convenience benefits of SaaS integrations cannot easily be separated from their security implications. As artificial intelligence becomes more embedded in enterprise applications—as it was with Salesloft Drift's AI chat capabilities—the complexity and interconnectedness of these environments will only intensify.

UNC6395's campaign succeeded because it exploited the gap between how security teams conceptualise risk and how modern software actually operates. Until organisations develop security models that account for the complete ecosystem of applications, integrations, and non-human identities that comprise their actual attack surface, similar supply chain compromises appear inevitable.

The over 700 organisations affected by this incident face immediate operational challenges around credential rotation and system auditing. The broader enterprise community faces more fundamental questions about whether current security paradigms can protect the distributed, interconnected systems that increasingly define modern business operations.

What UNC6395 demonstrated isn't just a new attack technique—it's a preview of how cybercrime evolves when criminals understand enterprise architecture better than enterprises do.

#cybersecurity

Fish AI Reader

Fish AI Reader

AI辅助创作,多种专业模板,深度分析,高质量内容生成。从观点提取到深度思考,FishAI为您提供全方位的创作支持。新版本引入自定义参数,让您的创作更加个性化和精准。

FishAI

FishAI

鱼阅,AI 时代的下一个智能信息助手,助你摆脱信息焦虑

联系邮箱 441953276@qq.com

相关标签

网络安全 供应链攻击 OAuth令牌 Salesforce Salesloft Drift UNC6395 企业级软件 非人类身份
相关文章