SHARE
Facebook X Pinterest WhatsApp

GitHub Breach Exposed 700+ Companies in Months-Long Attack

This security breach just exposed how hackers can hide for months before striking Cybersecurity investigators say a massive supply-chain attack affecting over 700 companies began with a seemingly minor GitHub breach earlier this year. A quiet intrusion in March grew into one of the largest SaaS breaches on record. The lesson lands hard, the most […]

Sep 9, 2025
eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

This security breach just exposed how hackers can hide for months before striking

Cybersecurity investigators say a massive supply-chain attack affecting over 700 companies began with a seemingly minor GitHub breach earlier this year. A quiet intrusion in March grew into one of the largest SaaS breaches on record. The lesson lands hard, the most dangerous attacks are not the ones that pop up in headlines, they are the ones that linger in plain sight.

Salesloft first disclosed a security issue in the Drift application on August 21, then shared more details about malicious OAuth token abuse five days later. According to an investigation by Mandiant, which is aiding Salesloft, the threat actors first gained access to its GitHub environment between March and June 2025. The two have been at the center of a major supply-chain style breach disclosed in late August, with Google’s Threat Intelligence Group tying it to UNC6395.

The patient attack that rewrote cybersecurity playbooks

Patience, not flashy malware, defined this breach. The hackers downloaded code from multiple GitHub repositories, added guest user accounts, and set up rogue workflows. Mandiant confirmed months of reconnaissance inside Salesloft and Drift environments, a slow burn that would pay off later.

Then the escalation. After breaching Drift’s AWS environment, the intruders stole OAuth tokens, essentially master keys used for integrations like Salesforce and Google Workspace. The threat actor, tracked as UNC6395, accessed the Salesloft GitHub account from March through June 2025, and during that window downloaded content from multiple repositories, added a guest user, and established workflows.

Think about that rhythm. While companies chased headline-grabbing ransomware, these attackers laid groundwork, piece by piece. No rush. Just a careful setup, like stashing spare keys under the mat and waiting for the right night.

How security giants fell victim to their own trust

Scope matters here, and so does who got hit. 22 companies have confirmed impact from the supply chain breach, but more than 700 organizations were affected, including Cloudflare, Zscaler, Palo Alto Networks, and PagerDuty.

With the stolen tokens in hand, the adversary moved with intent. They systematically queried Salesforce environments between August 8 and 18, counted records, mapped object structures, then pulled bulk exports. Data taken included customer contacts, support case content, account records, and possibly embedded secrets such as API keys or cloud credentials.

Cloudflare revealed that attackers accessed Salesforce data and obtained 104 Cloudflare API tokens, though no suspicious activity was seen on those tokens. Meanwhile, attackers actively scanned acquired data for high value access, think AWS keys, VPN creds, Snowflake tokens.

Security giants tripped over the very trust that powers their integrations. They protect millions, yet a patient intruder used vendor access to walk right in.

The emergency response that changed everything

When the scope became clear, the shutdowns came fast. Salesloft revoked all Drift-to-Salesforce access tokens on August 20, 2025. Salesforce disabled all Salesloft integrations on August 28, 2025. Salesloft took Drift completely offline on September 2, 2025.

Salesloft has rotated credentials and added segmentation controls between Salesloft and Drift. It also recommends that all third party apps integrated with Drift via API key revoke and reissue keys. Salesforce temporarily suspended the Salesloft integration on August 28 and restored it on September 7, 2025, after additional security measures and remediation.

This breach is a reminder that a single compromised integration can ripple outward, fast. The months between initial compromise and discovery show how traditional monitoring struggles against slow, methodical operators who play the long game.

Vendor risk needs a rethink, not a checkbox. Assume a trusted partner could already be compromised, quietly building footholds and waiting for scale. My read, more teams will start treating OAuth tokens and app-to-app connections like crown jewels, and late discoveries like this will push that shift from theory to habit.

Recommended for you...

Best AI Deepfake and Scam Detection Tools for Security
Matt Gonzales
Jul 16, 2025
Best Secure Tools for Protecting Remote Teams in 2025
Kezia Jungco
Jun 30, 2025
Protect Your Privacy: Best Secure Messaging Apps in 2025
Liz Ticong
Jun 25, 2025
NVIDIA: Agentic AI Is Reshaping Cybersecurity Defense
Aminu Abdullahi
Apr 30, 2025
eSecurity Planet Logo

eSecurity Planet is a leading resource for IT professionals at large enterprises who are actively researching cybersecurity vendors and latest trends. eSecurity Planet focuses on providing instruction for how to approach common security challenges, as well as informational deep-dives about advanced cybersecurity topics.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.