Qualys Acknowledges Data Breach – Cybercriminals Gained Access to Salesforce Information in Supply Chain Incident

Try Our Free Tools!
Master the web with Free Tools that work as hard as you do. From Text Analysis to Website Management, we empower your digital journey with expert guidance and free, powerful tools.

Qualys has announced that it fell victim to a far-reaching supply chain attack that compromised the Salesloft Drift marketing platform, leading to unauthorized access to segments of its Salesforce data.

This breach stemmed from an intricate cyberattack directed against Salesloft Drift, a third-party Software-as-a-Service (SaaS) tool leveraged by Qualys for the automation of sales workflows and the management of marketing leads.

The company reported that attackers successfully pilfered OAuth authentication tokens linking the Drift application to Qualys’s Salesforce environment, thereby enabling unauthorized access.

Qualys has clarified that this breach was confined to specific information within its Salesforce ecosystem, primarily concerning lead management and contact details.

In a formal statement, the company reassured stakeholders that its core security architecture remained uncompromised. There were no repercussions on Qualys’s production environments, including both shared and private platforms, codebase, or customer data housed on the Qualys Cloud Platform.

A group of people sitting around a white table

Notably, all operational platforms, agents, and scanners continued to function without interruption.

Upon detection of the incident, Qualys promptly enacted its incident response strategy. The security team swiftly acted to contain the threat by disabling all Drift integrations connected to Salesforce data, effectively severing the attackers’ access.

To enhance its internal investigation, Qualys has enlisted the expertise of renowned cybersecurity firm Mandiant, which is also aiding several other entities impacted by this extensive campaign against Salesloft Drift.

Among the confirmed victims of this supply chain attack are:

  • Palo Alto Networks: This cybersecurity firm verified the compromise of business contact information and internal sales data stored within its CRM platform.
  • Zscaler: The cloud security provider reported that sensitive customer information, including names, contact information, and portions of support case content, was accessed.
  • Google: Aside from its investigative role, Google confirmed that a “very small number” of its Workspace accounts were accessed using the compromised tokens.
  • Cloudflare: The company acknowledged a data breach where a sophisticated threat actor accessed and extracted customer data from its Salesforce instance.
  • PagerDuty: This firm confirmed an incident resulting in unauthorized access to certain data within Salesforce.
  • Tenable: The company revealed a data breach, exposing contact details and support case information for a subset of its customers.

Source link: Cybersecuritynews.com.

Disclosure: This article is for general information only and is based on publicly available sources. We aim for accuracy but can't guarantee it. The views expressed are the author's and may not reflect those of the publication. Some content was created with help from AI and reviewed by a human for clarity and accuracy. We value transparency and encourage readers to verify important details. This article may include affiliate links. If you buy something through them, we may earn a small commission — at no extra cost to you. All information is carefully selected and reviewed to ensure it's helpful and trustworthy.

Reported By

RS Web Solutions

We provide the best tutorials, reviews, and recommendations on all technology and open-source web-related topics. Surf our site to extend your knowledge base on the latest web trends.
Share the Love
Related News Worth Reading