Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

Palo Alto Networks Hit by Stolen OAuth Tokens Breach: Exposing Customer Data


Palo Alto Networks has fallen victim to a breach of its customer data after stolen OAuth tokens from Salesloft Drift were exploited by hackers. The incident highlights the importance of robust security measures and the devastating consequences of compromised authentication credentials.

  • Palo Alto Networks suffered a breach due to stolen OAuth tokens from the Salesloft Drift platform.
  • The breach compromised customer business contact information, but not tech support files or attachments.
  • The incident highlights the vulnerability of supply chain attacks and the importance of continuous monitoring of systems.
  • PAN is urging its customers to take proactive steps to secure their platforms against similar attacks.
  • Recommendations include monitoring Salesforce and Salesloft updates, token revocation, and reviewing third-party integrations.



  • Palo Alto Networks, a leading cybersecurity firm, has recently fallen victim to a breach of its customer data. The breach occurred when hackers exploited stolen OAuth tokens from the Salesloft Drift platform, gaining access to the Palo Alto Networks Salesforce instance. This incident highlights the importance of robust security measures and the devastating consequences of compromised authentication credentials.

    According to Marc Benoit, chief information security officer at PAN, the breach was informed on August 25, when it was discovered that the "compromise of a third-party application, Salesloft's Drift, resulted in the access and exfiltration of data stored in our Salesforce environment." The Unit 42 team within PAN immediately disconnected the compromised application from its Salesforce CRM to prevent further unauthorized access.

    The investigation revealed that the stolen OAuth credentials were used to exfiltrate primarily customer business contact information, such as names and contact info, company attributes, and basic customer support case information. Notably, tech support files or attachments to any customer support cases were not part of the exfiltrated data.

    Benoit emphasized that despite this incident, all PAN products and services remain secure, fully operational, and safe to use. However, he acknowledged that the breach highlights the vulnerability of supply chain attacks and stressed the importance of conducting enhanced, continuous monitoring of systems and the dark web for potential exposure or misuse of exfiltrated data.

    The Salesloft Drift breach has led to widespread attacks on numerous organizations, including Palo Alto Networks. According to Benoit, this incident demonstrates that third-party applications can be exploited by hackers to gain access to sensitive customer data. As a result, PAN is urging its customers and the broader security community to take proactive steps to secure their platforms.

    These recommendations include:

    * Monitoring Salesforce and Salesloft updates
    * Token revocation to secure platforms
    * Conducting a review of all Drift integrations and authentication activity with third-party systems
    * Probing Salesforce log-in history, audit trail, and API access logs from August 8 to the present day
    * Combining Identity Provider Logs and Network Logs

    Google has reported that it does not have enough evidence to confirm that the recent spate of Salesforce data thefts claimed by ShinyHunters on Google itself, Workday, Allianz, Quantas, and LVMH brand Dior were connected to the same group that masterminded the Salesloft attack. However, PAN's Unit 42 team has emphasized the importance of vigilance in addressing supply chain attacks.

    The breach highlights the ever-growing threat landscape in the realm of cybersecurity. As organizations increasingly rely on cloud-based services and third-party applications, they must remain vigilant against potential security vulnerabilities. The incident serves as a stark reminder of the need for robust security measures and proactive monitoring to prevent such breaches from occurring.

    In conclusion, the Palo Alto Networks breach underscores the importance of robust cybersecurity measures and the devastating consequences of compromised authentication credentials. As organizations continue to navigate this rapidly evolving threat landscape, it is essential that they prioritize vigilance and proactive security practices to safeguard their customers' sensitive data.



    Related Information:
  • https://www.ethicalhackingnews.com/articles/Palo-Alto-Networks-Hit-by-Stolen-OAuth-Tokens-Breach-Exposing-Customer-Data-ehn.shtml

  • https://go.theregister.com/feed/www.theregister.com/2025/09/02/stolen_oauth_tokens_expose_palo/


  • Published: Tue Sep 2 20:31:45 2025 by llama3.2 3B Q4_K_M













    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us