When security researchers issued warnings about the Salesloft Drift issues last month, two prominent cybersecurity companies found themselves facing the same threat β but their stories ended up unfolding in different ways.Β
Okta and Zscaler, among the larger players in the identity management space, were among the more than 700 Drift customers targeted in what has become one of the most significant supply chain attacks of the year. Β Within a week of Google security researchersβ warning about the incident, which targeted the widespread theft of Salesforce customer data, both companies went to work in figuring out how bad the damage would be.Β Β
The companies had very different experiences. While Oktaβs security measures thwarted any lasting damage, Zscaler wasnβt as lucky, having to deal with unauthorized access of both customer and internal company data. Same threat actor. Same timeline. Opposite outcomes.
The divergence in incidents and responses offers a rare opportunity to understand how a cybersecurity strategy works in action. CyberScoop spoke with the security leaders of both companies to learn about how the attack went down from those directly in its crosshairs, and lessons learned that could bolster defenses of their companies and others going forward.
From warning to incident
Salesloft hasnβt publicly released a comprehensive root-cause analysis into the attack, but initial results of its investigation revealed a threat group gained access to its GitHub account as far back as March. The group, which Google tracks as UNC6395, achieved lateral movement and set up workflows in the Salesloft application environment before it accessed Driftβs Amazon Web Services environment and obtained OAuth tokens used by Drift customers.Β
Those tokens allowed the threat group to access and steal data from separate platforms integrated with Drift, an AI chat agent primarily used by sales teams. Google said the βwidespread data theft campaignβ occurred during a 10-day period in mid-August. Nearly 40 companies, including more than 20 cybersecurity vendors, have publicly disclosed they were caught up in the attack spree.
Zscaler received its first security alert from Salesforce a week after the data theft concluded, warning the security vendor that unauthorized IP addresses were using the application programming interface (API) for its Drift OAuth token. Zscaler immediately revoked the token, βeven though it didnβt really matter by that point,β said Sam Curry, the companyβs chief information security officer.
The damage was already done. Data on a large number of Zscalerβs customers was exposed, including names, business email addresses, job titles, phone numbers, location details, Zscaler product licensing and commercial information, and plain text content from some support cases.Β
IP limitations for defense
Since Okta uses Drift, it proactively hunted for signs of compromise when threat intel experts started warning about an issue with the service. The company found a βshort burst of attemptsβ to use Drift tokens from locations outside of the manually configured IP range it set up for security purposes, David Bradbury, Oktaβs chief security officer, told CyberScoop.
That control blocked the attack and kept Oktaβs Drift integrations secure. Yet, many companies donβt take that approach because setting IP restrictions for API calls is a manual and often laborious process requiring input and support from every vendor in the supply chain.Β
βIf we can put our minds to these problems, we can come up with solutions so that you can implement IP restrictions in a matter of clicks, rather than in a matter of days and weeks of continuous testing, and investigation and discovery,β Bradbury said.
Oktaβs investigation revealed a seemingly automated threat campaign. βThey were not persistent,β Bradbury said. βThe hypothesis that we have at the moment is that there was a single significant script that was engineered that hit all of these all at once and pulled down all of this information in a series of events.β
Zscalerβs compromise was particularly frustrating given the timing: the company had already stopped using Drift in July, a decision completely unrelated to security β and made before any indicators of the attack campaign came to light.Β
βThat OAuth token that was being used with [Drift] was still active,β Curry said. βIt was due to be retired by the end of August,β he added, describing that decision as a deliberate delay to make sure the token was fully disconnected and no longer in use.Β
Token theft cause remains a mystery
Salesloft hasnβt explained how the threat group accessed its GitHub account, nor how it accessed Driftβs AWS environment and ultimately obtained customersβ OAuth tokens.Β
βI donβt actually know how they got the tokens out. I just know they did,β Curry said. βAs for how they store it, I donβt know internally, except that they passed our security questionnaire and probably hundreds, if not thousands of othersβ for third-party risk management, he added.Β
Okta also doesnβt know how the threat group accessed its Salesloft Drift OAuth token. That information would have to come from Salesloft, Bradbury said.
βThe internet is connected by some very brittle, small pieces of information β these tokens that we constantly talk about, these combinations of letters and numbers in files that ultimately provide access to all of the applications that we use,β he said.Β
βThose tokens need to be stored somewhere, and sadly there are mechanisms in place right now which doesnβt necessitate actually tying these tokens directly to something β to prevent their reuse,β Bradbury added.Β
Most SaaS applications implement tokens and authentication in rather rudimentary means. βTheyβre doing whatβs easy and what works, and what works is once youβve granted access youβre actually storing these tokens somewhere,β he said.Β
Lessons learned for collective defense
While their experiences in the wake of the Salesloft Drift attacks were quite different, Bradbury and Curry shared similar reflections and took many like-minded lessons from the third-party compromise that impacted hundreds of companies.Β
βAPIs are becoming a new highway of access that we need more control over, and we need better control of collectively,β Curry said. βAPIs get wider in terms of what you can do with them, and you need the ability to monitor them and to put preventative controls on them to look for behavioral changes.β
Zscaler learned another lesson the hard way β the importance of limiting IP address ranges for API queries, and rotating tokens more frequently.Β
βFor me, this wake-up call is saying API is a new attack-and-control plane thatβs far more exposed than most people realize from just a simple risk exercise,β Curry said.
βThere are no small vendors in an API-connected world. Itβs just like β if you think about border security β thereβs no small and insignificant ports of entry,β he added. βThey all use the same highway systems.β
Bradbury, who is expectedly pleased Okta wasnβt impacted by this malicious campaign, canβt help but feel frustrated because he believes there are better, more secure methods to protect unauthorized token use. The central issue in this supply-chain attack could have been avoided with Demonstrating Proof of Possession (DPoP), a mechanism that can constrain token use to a specific client and prevent the use of stolen tokens, he said.Β
Once attackers steal tokens that can be reused without restriction, disastrous consequences await all, Bradbury added.Β
βWe need to see more SaaS vendors actually prioritizing security features on their roadmap, not just the features that will result in customer growth and revenue,β he said.Β
Security leaders have an important role to play in demanding these changes from their vendors. βItβs about time that we started to use our collective ambitions to raise the bar for security to actually hold our vendors accountable,β Bradbury said.Β
Curry is taking a similar forward-looking approach. βLetβs learn from one another, instead of bayoneting the wounded,β he said.Β
βAfter the fact, in the cold light of day, weβll all look at what happened,β Curry added. βIβm not interested in blame at this point. Iβm interested in better security.β
The post Security leaders at Okta and Zscaler share lessons from Salesloft Drift attacks appeared first on CyberScoop.