A coordinated supply‑chain attack is rippling through enterprise SaaS stacks after attackers weaponized OAuth tokens, associated with the Drift application (owned by Salesloft), to access customer data across multiple cloud platforms via trusted app‑to‑app connections. Salesforce surfaced early because Drift functioned as a connected app there, but Google has warned that all Drift integrations are at risk and confirmed impact to Google Workspace via Drift Email, with detailed indicators and methods published in its analysis.
Google attributes the activity to UNC6395 and has released actionable indicators such as user‑agents, IPs, and characteristic SOQL reconnaissance and credential‑hunting patterns. Defenders should hunt and contain activity anywhere Drift has had OAuth access.
In addition to Google’s attribution to UNC6395, Cloudflare’s threat intelligence team, Cloudforce One, has since attributed the campaign to the hacking group GRUB1, based on their investigation of the incident.
Multiple organizations have now publicly confirmed downstream exposure via this vector.
Key facts
Looking for ShinyHunters-Salesforce guidance? This is a different group and TTPs, but you can find our dedicated response checklist here: ShinyHunters Salesforce Response Tips.
We will continue to update the list of known victims of these attacks as they are revealed publicly.
This section distills the attacker playbook into concrete, hunt-ready signals drawn from public reporting. For full context and IOCs, see Google’s analysis and corroborating coverage in the security press.
Initial access
Discovery and enumeration
Collection and credential hunting
Defense evasion and operational security
Command and control / exfiltration
Network and infrastructure
Application-layer signals
Hunt: Apply Google’s IoCs across your Salesforce, Google Workspace, and any other platforms where Drift had access.
Contain: Disconnect/reauthorize Drift integrations; revoke tokens; rotate exposed secrets.
Govern: Inventory connected apps and scopes; enforce IP restrictions; shorten token lifetimes and require re-consent on material changes.
Monitor: Baseline Drift (and all connected apps) and alert on deviations; log and preserve evidence for follow‑up investigations.
Looking for ShinyHunters-Salesforce guidance? This is a different group and TTPs, but you can find our dedicated response checklist here: ShinyHunters Salesforce Response Tips.
When attackers hide behind “legitimate” OAuth tokens, most controls can’t tell normal integration traffic from active compromise. Vorlon can. Our platform continuously baselines every connected app’s behavior across your SaaS estate and correlates who is calling what, from where, with which user-agent, and at what volume. The moment Drift-like activity deviates from expected patterns Vorlon raises high-fidelity alerts, links the activity to the exact identity and connected app, and enables one-click containment.
In practice, that means:
Bottom line: OAuth abuse looks “authorized” to most tools. Vorlon makes it obvious and stoppable.
Ready to see it in action?
Get a live demo to see how Vorlon detects Drift‑style OAuth abuse in minutes, correlates activity to the exact app and identity, and enables one‑click containment across your SaaS ecosystem.