GitHub Token Breach at Salesloft Leads to Widespread OAuth Attacks
Salesloft disclosed a March GitHub account compromise that let attackers steal authentication tokens and run reconnaissance through June. Those tokens were used to access Drift's AWS environment and steal OAuth credentials, leading to breaches at major tech firms. The incident exposes supply-chain and OAuth risks and highlights a six-month detection gap.
What happened
Salesloft confirmed that a March compromise of its GitHub account allowed attackers to steal authentication tokens and perform months of reconnaissance. According to an investigation led by Google’s incident response unit Mandiant, the intruders accessed repositories, added a guest user, and created workflows that ultimately gave them access to Salesloft’s cloud assets.
How tokens were abused
After breaking into GitHub, attackers accessed the AWS environment for Salesloft’s Drift integration and stole OAuth tokens used by Drift customers. Those tokens allowed the threat actors to pivot into customer environments — including Salesforce instances — and exfiltrate sensitive data such as support tickets and credentials.
Who was impacted
Google’s Threat Intelligence Group attributes the supply-chain activity to UNC6395, while other outlets link the activity to ShinyHunters. Salesloft named several affected customers including Bugcrowd, Cloudflare, Google, Proofpoint, Palo Alto Networks, and Tenable; the full list may be larger.
Why this matters
This incident highlights two systemic risks: supply-chain attack surfaces in developer tooling and the fragility of OAuth tokens when embedded in cloud workflows. Equally concerning is the timeline — reconnaissance from March to June with public disclosure months later — which raises questions about detection, monitoring, and least-privilege controls.
Immediate steps organizations should take
- Revoke and rotate compromised OAuth tokens, API keys, and cloud credentials immediately.
- Audit GitHub workflows, actions, and repository access; remove unused guests and scan for secrets in CI/CD.
- Enforce least privilege for integrations, add granular token scopes, and limit what connectors can access.
- Implement continuous monitoring for unusual OAuth behavior and perform threat-hunting exercises focused on supply-chain pathways.
How to reduce the window from intrusion to containment
Shortening detection time requires instrumenting developer platforms and cloud environments so that repository changes, workflow executions, and unusual token usage generate high-fidelity alerts. Segmentation of CI/CD permissions, automated secrets scanning, and regular third-party integration reviews turn long reconnaissance periods into short, manageable incidents.
QuarkyByte’s view
This breach is a reminder that developer and integration tooling are prime targets. Organizations should treat token hygiene and workflow security as first-class security controls. QuarkyByte advises a mix of analytics-driven discovery, targeted token inventories, and simulated supply-chain exercises to prioritize remediation and reduce attacker dwell time.
Salesloft says the incident is contained and its Salesforce integration has been restored. But the episode reinforces broader lessons for every org running OAuth-based integrations or relying on third-party developer tools: assume tokens can be stolen, make them short-lived, and build detection that catches misuse within days — not months.
Keep Reading
View AllAge Verification Laws Threaten Privacy and Security
Age verification laws in the US and UK aim to protect children but create major privacy and security trade-offs for adults and platforms.
Age Verification vs Privacy The Tradeoffs and Risks
New age-verification laws require IDs and biometrics to gate content, creating major privacy, security, and free-speech risks for users and platforms.
Experts Warn Against Trusting XChat Encryption
X rolls out XChat claiming end-to-end encryption, but experts flag key-management, lack of audits, and missing forward secrecy as major risks.
AI Tools Built for Agencies That Move Fast.
If your organization relies on OAuth integrations or third-party CI/CD, QuarkyByte can map token exposure, prioritize credential rotation, and harden repo-to-cloud workflows. Schedule a focused risk assessment to shrink detection windows and block token reuse quickly.