Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

Cloudflare Impacted by Salesloft Drift Supply Chain Attack: A Closer Look at the Breach and Its Consequences



Cloudflare has been impacted by a recent supply chain attack through Salesloft Drift, exposing 104 Cloudflare API tokens. The attackers stole text-based data from Salesforce case objects between August 12 and August 17, including customer contact information. This breach highlights the importance of rigorous security testing and due diligence when selecting technology partners. While Cloudflare took steps to mitigate the impact of the breach, it also raises concerns about the potential for future attacks using compromised tokens.

  • Cloudflare suffered a data breach caused by a supply chain attack through Salesloft Drift.
  • The attackers gained access to a Salesforce instance, exfiltrating 104 Cloudflare API tokens.
  • The breach exposed customer contact information, but attachments remained unaffected.
  • The attackers' intentions are focused on harvesting credentials and customer information for future attacks.
  • The incident highlights the importance of rigorous security testing and due diligence when selecting technology partners.
  • Cloudflare's customers who used Salesloft Drift during the incident need to take proactive steps to secure their systems and protect customer data.



  • Cloudflare, a leading cloud-based content delivery network (CDN), has been hit by a recent data breach caused by a supply chain attack through Salesloft Drift. This breach highlights the vulnerabilities that can arise when third-party vendors are used in an organization's technology stack, and how quickly these breaches can spread to affect multiple customers.

    The incident occurred on August 23, when Cloudflare was notified of the breach. The attackers gained access to a Salesforce instance used for internal customer case management and customer support, which contained 104 Cloudflare API tokens. These tokens were later exfiltrated during the breach, posing significant security risks to Cloudflare's customers.

    While Cloudflare did take steps to mitigate the impact of the breach by rotating all 104 Cloudflare platform-issued tokens that had been exfiltrated, it also discovered some suspicious activity linked to these tokens. This has raised concerns about the potential for future attacks using these compromised tokens.

    The investigation into the breach revealed that the threat actors stole only text-based data from Salesforce case objects between August 12 and August 17. This included customer contact information such as company name, requester's email address, phone number, company domain name, and company country. However, it is essential to note that attachments were not affected by this breach.

    The attackers' intentions appear to be more focused on harvesting credentials and customer information for future attacks rather than selling or exploiting this data for financial gain. This raises significant concerns about the potential for targeted attacks against Cloudflare's customers across various organizations.

    In recent months, there has been a rise in supply chain attacks that have exploited vulnerabilities in third-party vendors to steal sensitive data from affected companies. ShinyHunters extortion group has been specifically targeting Salesforce customers through data theft attacks, utilizing voice phishing tactics to trick employees into linking malicious OAuth apps with their company's Salesforce instances.

    This incident is part of a larger trend of supply chain attacks that have become increasingly sophisticated and widespread in recent years. The use of third-party vendors can introduce vulnerabilities that attackers can exploit, highlighting the importance of rigorous security testing and due diligence when selecting technology partners.

    The breach has also had implications for Cloudflare's customers who used Salesloft Drift during the incident. As a result, it is essential for these organizations to take proactive steps to secure their systems and protect customer data.

    In conclusion, the recent data breach caused by a supply chain attack through Salesloft Drift highlights the vulnerabilities that can arise when third-party vendors are used in an organization's technology stack. Cloudflare's swift action in mitigating the impact of the breach is commendable, but it also underscores the need for organizations to prioritize security and take proactive steps to protect their systems and customer data.



    Related Information:
  • https://www.ethicalhackingnews.com/articles/Cloudflare-Impacted-by-Salesloft-Drift-Supply-Chain-Attack-A-Closer-Look-at-the-Breach-and-Its-Consequences-ehn.shtml

  • https://www.bleepingcomputer.com/news/security/cloudflare-hit-by-data-breach-in-salesloft-drift-supply-chain-attack/

  • https://blog.cloudflare.com/response-to-salesloft-drift-incident/


  • Published: Tue Sep 2 19:29:12 2025 by llama3.2 3B Q4_K_M













    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us