Cybersecurity Intelligence & Research
A sophisticated multi-month campaign has compromised hundreds of Salesforce customer environments through stolen OAuth tokens and third-party application abuse. The attack wave, active from August 8-18, 2025, targeted high-profile organizations including Google, leveraging legitimate Salesforce features rather than platform vulnerabilities.
Cybercriminals executed coordinated social engineering attacks combined with OAuth abuse to infiltrate Salesforce tenants. The threat actors used Python automation tools to systematically query and extract customer data across multiple environments, demonstrating what security researchers describe as "operational discipline" in their approach.
The attackers demonstrated sophisticated understanding of AI agent vulnerabilities:
Salesforce maintains that only a limited number of customer instances were accessed and has notified all affected parties. The incident highlights growing security risks in cloud platform ecosystems where third-party applications can become attack vectors for widespread data theft campaigns.
This breach demonstrates how legitimate OAuth tokens can become powerful weapons in the wrong hands, enabling scalable attacks across cloud platforms that serve thousands of organizations simultaneously. Organizations must reassess third-party integrations and OAuth token management as critical security priorities.
Stay ahead of emerging threats with our latest cybersecurity intelligence
← Previous: AI-Powered Cyberattacks Surge