
This Week in Cybersecurity: Major B2B Data Breaches and a New Threat Targeting Developers
The digital landscape is a constant battleground, and recent events serve as a stark reminder that no organization or individual is immune. This week, the cybersecurity community is grappling with the fallout from significant data breaches at major B2B sales platforms and a sophisticated malware campaign specifically designed to compromise developers. These incidents highlight the cascading nature of supply chain risk and the ever-present danger of credential theft.
Supply Chain Under Siege: Salesloft and Drift Incidents Reveal Widespread Risk
In a powerful illustration of third-party risk, two prominent sales and marketing engagement platforms, Salesloft and Drift, have been impacted by security incidents, creating a ripple effect that touches countless businesses that rely on their services.
The investigation into a recent Drift data breach has revealed a concerning scope. The incident stemmed from unauthorized access to a third-party vendor’s network—reportedly Salesloft. This initial compromise allowed attackers to gain access to Drift’s systems and exfiltrate sensitive customer information.
According to reports, the data stolen from Drift includes:
- User profile information such as names and email addresses.
- Hashed and salted passwords for a subset of users.
While hashing adds a layer of protection, it is not foolproof, and users are strongly advised to change their passwords immediately if they have an account with the service.
The root of this supply chain event appears to be a security lapse at Salesloft. The company disclosed that an attacker gained unauthorized access to its platform by leveraging a compromised API key. This allowed the threat actor to access and export customer data from its systems. The incident underscores the critical importance of API security and rigorous access control management, as a single exposed key can unlock a treasure trove of sensitive information, impacting not just one company but its entire partner and customer ecosystem.
Actionable Security Tip: Businesses must rigorously vet the security posture of their third-party vendors. Conduct regular security audits, enforce the principle of least privilege for all API keys and service accounts, and have a clear incident response plan in place for supply chain breaches.
Developers in the Crosshairs: Malicious GitHub Desktop Installers Steal Credentials
In a separate but equally alarming campaign, cybercriminals are targeting a highly valuable group: software developers. A new threat has emerged involving trojanized installers for the popular GitHub Desktop application.
Attackers are distributing these malicious installers through unofficial channels, likely using SEO poisoning or malvertising to trick developers into downloading their fake version instead of the legitimate software. Once executed, the malicious installer deploys a potent information-stealing malware designed to harvest sensitive credentials.
The malware specifically targets and exfiltrates:
- Credentials stored in web browsers.
- Cryptocurrency wallet data.
- Other sensitive information stored locally on the developer’s machine.
This type of attack is particularly dangerous because developers often have privileged access to source code repositories, cloud infrastructure, and internal company networks. A single developer’s compromised credentials can provide an attacker with the keys to an entire organization’s digital kingdom, leading to devastating code theft, infrastructure hijacking, or further malware distribution.
Actionable Security Tips for Developers:
- Download from the Source: Always download software directly from the official website or repository. For GitHub Desktop, this means getting it from desktop.github.com.
- Verify Signatures: Whenever possible, verify the digital signature of the installer to ensure it hasn’t been tampered with and was signed by the legitimate publisher.
- Enforce Multi-Factor Authentication (MFA): MFA is your single most effective defense against credential theft. Ensure it is enabled on your GitHub account, email, and all other critical services.
- Use a Password Manager: Avoid storing passwords in browsers. A dedicated password manager provides a more secure way to manage credentials.
These incidents are a clear signal that both large-scale B2B platforms and individual technical users are prime targets. Staying vigilant and implementing robust security controls is not just a best practice—it’s essential for survival in today’s digital ecosystem.
Source: https://www.helpnetsecurity.com/2025/09/14/week-in-review-salesloft-drift-breach-investigation-results-malicious-github-desktop-installers/


