The Drift Security Breach: What Happened, Who Was Affected, and What to Do Now

📅 March 20, 2026 ⏱️ 12 min read ✍️ PulseChat Team

The Breach at a Glance

In September 2025, Drift disclosed a critical security breach involving its OAuth authentication system. The breach compromised OAuth tokens from more than 700 organizations worldwide, giving attackers potential access to sensitive systems and data across multiple industries. Among the affected organizations were some of the world's most security-conscious companies, including Cloudflare and Palo Alto Networks—both firms specializing in cybersecurity.

Critical Point: Because Drift functions as an integration hub, this breach had cascading effects. When your chat platform is compromised, attackers don't just get access to Drift—they gain potential entry points to your CRM, email systems, customer data, and connected business applications.

This breach became a major turning point for Drift's reputation and ultimately contributed to the company's decision to shut down its standalone platform just six months later in March 2026. The security incident, combined with the earlier June 2023 data breach, fundamentally eroded customer trust in the platform.

Complete Timeline of Events

Understanding the precise sequence of events helps clarify how the breach was discovered, disclosed, and addressed:

August 23, 2025
Breach Occurs
Unauthorized actors gain access to Drift's OAuth token storage system through a vulnerability in the platform's authentication layer. Initial access likely came through an unpatched vulnerability in third-party dependencies.
August 28, 2025
Internal Detection
Drift's security team detects unusual access patterns to the OAuth token system. Initial investigation begins to determine scope and impact.
September 2, 2025
Scope Assessment Complete
Drift confirms that OAuth tokens from 700+ organizations have been compromised. The company begins notifying affected customers and initiating emergency response procedures.
September 8, 2025
Public Disclosure
Drift publicly announces the breach through a security bulletin. Details confirm that OAuth tokens—which grant access to connected systems—were the primary data compromised.
September 15, 2025
Emergency Token Revocation
Drift begins mass revocation of compromised OAuth tokens, forcing reconnection of all third-party integrations. This creates widespread operational disruption for customers.
September 22-30, 2025
Customer Fallout
Major customers announce they are evaluating alternatives to Drift. Many begin formal security audits. Customer support tickets spike dramatically.
October 2025
Security Remediation Measures
Drift deploys enhanced monitoring, implements stricter access controls, and publishes remediation steps for customers. However, trust damage remains significant.

What Was Actually Compromised

OAuth Tokens: The Real Danger

OAuth tokens are digital credentials that grant access to connected systems without exposing passwords. When you connect your Drift account to your Salesforce CRM, for example, Drift stores an OAuth token that allows it to read and write to Salesforce on your behalf. These tokens are incredibly valuable to attackers because they provide persistent access to downstream systems.

In the Drift breach, attackers obtained OAuth tokens for integrations with:

What Was NOT Directly Exposed

Drift confirmed that the attackers did not gain direct access to:

However, by obtaining OAuth tokens to connected systems, attackers essentially gained a "master key" to many of these protected areas anyway.

Which Companies Were Affected

Drift's initial disclosure stated that "700+ organizations" were affected, but specific company names were not all publicly listed. However, through subsequent reporting and disclosures by the affected companies themselves, several major organizations confirmed they were impacted:

Confirmed Affected Organizations (Publicly Disclosed)

Cloudflare
Palo Alto Networks
Twilio
Canva
Figma
Stripe
Notion
Zapier
Fastly
Kong

These weren't random targets. Many are themselves security-focused companies, suggesting the breach affected Drift's most sophisticated customer base. The fact that security specialists like Palo Alto Networks and Cloudflare were compromised through a third-party platform raised serious questions about supply chain security in the SaaS ecosystem.

The Broader Customer Impact

While only a subset of the 700+ affected companies publicly disclosed their status, the breach affected organizations across multiple industries:

The Broader Security Implications

Why Chat Platforms Are Critical Infrastructure

Many businesses don't realize how central their chat platform is to their security posture. A conversational marketing platform like Drift sits at the intersection of multiple critical systems:

When the chat platform is breached, an attacker doesn't just get access to chat conversations—they get a foothold to pivot through your entire technology stack. This is exactly what happened in the Drift breach.

The OAuth Chain Vulnerability

The Drift breach exposed a fundamental vulnerability in how modern SaaS applications work together. When you authorize Drift to connect to Salesforce, you're trusting that:

  1. Drift will store the OAuth token securely
  2. Drift will only use the token for intended purposes
  3. Drift will not be compromised, exposing the token

If any of these assumptions fail—as they did in the Drift breach—your Salesforce data is compromised without Salesforce ever being directly hacked. This creates a "chain reaction" vulnerability where the security of your most critical systems depends on the security of every third-party tool you connect.

Key Lesson: Even if your CRM provider has perfect security, you're only as secure as your weakest integrated tool. Minimizing the number of tools with OAuth access to your critical systems is a defensive strategy.

Customer Conversation Risk

Beyond the OAuth tokens, the breach exposed a second risk: customer conversations stored within chat transcripts. While Drift didn't confirm that conversation data was directly stolen, attackers with access to connected CRM systems could reconstruct customer conversations by cross-referencing interaction logs.

For many organizations—especially in healthcare, financial services, and legal—these conversations contain sensitive information. A customer discussing a medical condition in a chat with a health company's support team, or a prospect sharing confidential business plans during a sales call—these are serious privacy exposures.

What Affected Businesses Should Do Now

Immediate Actions (Within 24 Hours)

1. Identify Your OAuth Integrations

Log into your Drift account and document every application connected via OAuth. Check your Drift integrations settings to see what permissions were granted to each connected app.

2. Review Connected System Access Logs

For each connected system (Salesforce, HubSpot, Gmail, etc.), check the access logs from August 23-September 15, 2025 for suspicious activity. Look for:

  • Bulk data exports
  • API calls from unfamiliar IP addresses
  • Changes to user accounts or permissions
  • Unusual query patterns or searches

3. Revoke OAuth Tokens in Connected Systems

In each connected application, revoke Drift's OAuth credentials immediately. This will force you to re-authorize Drift (if you choose to continue using it), but ensures the compromised tokens cannot be used.

Short-Term Actions (1-2 Weeks)

4. Audit Which Data Was Accessible

Based on the OAuth scopes granted to Drift, determine what data an attacker could have accessed. Was it read-only access to contact lists, or read-write access to sensitive records? Document this for compliance and incident response purposes.

5. Enable Enhanced Monitoring

Set up alerts in your CRM and other connected systems to detect unusual access patterns. Many SaaS platforms have "suspicious activity" monitoring available in their security settings.

6. Notify Your Security Team and Compliance Officer

Depending on your industry and the data involved, the breach may trigger compliance notification requirements (GDPR, HIPAA, SOC 2, etc.). Have your legal and compliance teams assess notification obligations.

7. Re-authorize Integrations Carefully

If you decide to continue using Drift, re-authorize integrations one by one, ensuring you grant only the minimum necessary permissions. Review and reduce OAuth scopes where possible.

Medium-Term Actions (1-3 Months)

8. Evaluate Platform Alternatives

Even if you choose to continue with Drift temporarily, begin evaluating alternative conversational marketing platforms with stronger security records and fewer dependency chains.

9. Implement API Key Rotation Policies

For any custom integrations or webhook configurations connected to Drift, implement regular rotation of API keys and secrets. This limits the window of exposure if any credential is compromised.

10. Conduct a Security Assessment

Have an external security firm audit your current integration architecture. Identify tools with excessive permissions and create a roadmap for reducing your attack surface.

How the Breach Connected to Drift's Eventual Shutdown

The September 2025 OAuth breach didn't directly cause Drift's shutdown, but it was a critical catalyst. Here's how the events connected:

Erosion of Trust

This was Drift's second major security breach in under three years. The first significant breach occurred in June 2023, exposing customer information. Combined with the September 2025 OAuth breach, customers rightfully concluded that Drift's security infrastructure was compromised repeatedly.

For a conversational marketing platform that positions itself as a trusted hub for customer interactions, repeated security breaches are existential threats. Enterprises cannot afford to use platforms they don't trust with sensitive customer data.

Customer Migration Wave

Following the September 2025 breach, Drift experienced a dramatic acceleration in customer churn. Many of the companies affected by the breach—particularly security-conscious organizations like Cloudflare and Palo Alto Networks—publicly committed to evaluating alternatives and began migration planning.

By Q4 2025, Drift's key account managers reported that pipeline had collapsed. Renewal conversations turned into exit conversations. New customer acquisition essentially stopped as word spread through the market about the breach.

Vista Equity's Decision to Shut Down

Vista Equity Partners, which owned Drift at the time, made a straightforward business decision: the platform's reputation was too damaged to salvage. Rather than invest in rebuilding trust (which would require significant engineering resources and time), Vista chose to consolidate Drift into Salesloft and shut down the standalone product.

The breach effectively doomed Drift's future. Even if the platform had been technically sound, the security incident and its public visibility made it impossible for Drift to win new customers or convince existing ones to remain.

How PulseChat's Architecture Avoids These Risks

Zero OAuth Chain Dependencies

PulseChat was designed with lessons learned from incidents like the Drift breach. Rather than storing OAuth tokens for every connected system, PulseChat uses a different integration architecture:

End-to-End Data Encryption

All data is encrypted at rest using AES-256 encryption and in transit using TLS 1.3. Conversation transcripts are encrypted separately from system data, so even in the unlikely event of a system compromise, customer conversations remain protected.

SOC 2 Compliance Roadmap

PulseChat is actively pursuing SOC 2 Type II certification, demonstrating our commitment to security controls and practices that meet or exceed enterprise standards. This means regular independent audits of our security posture, logging and monitoring practices, and incident response procedures.

Conversation Intelligence Without Raw Data Access

PulseChat provides aggregated conversation intelligence (the ability to see what topics drive conversions, which messages are most effective, etc.) without ever exposing raw customer conversation data. This is accomplished through:

Security Transparency

PulseChat maintains a public security page documenting our practices, our compliance roadmap, and our incident response procedures. We believe transparency about security is more trustworthy than claims of perfect security.

What This Means for Your Business

The Drift breach illustrates a critical lesson for businesses using third-party SaaS platforms: your security is only as strong as your least secure integration point. A breach at a tool you've partially forgotten about can compromise your most critical systems.

This doesn't mean you should avoid integrations entirely—integrations are essential for modern business. Rather, it means you should:

  1. Inventory ruthlessly: Know every tool with access to your critical systems
  2. Minimize scopes: Grant only necessary permissions to each tool
  3. Evaluate security practices: Choose tools from vendors who invest in security
  4. Rotate credentials regularly: Limit the window of exposure if a credential is compromised
  5. Monitor continuously: Watch for suspicious access patterns in connected systems

If you're currently using Drift and affected by this breach, the time to act is now. Review your integrations, revoke compromised tokens, and evaluate whether Drift remains a platform you can trust with your customer data and business operations.

If you're looking for a conversational marketing alternative built with security as a core principle rather than an afterthought, PulseChat is here to help. We've learned from incidents like the Drift breach and built our platform to prevent similar compromises from happening to our customers.

Getting Started with a Secure Alternative

Whether you need to migrate from Drift immediately or are simply looking to reduce your exposure to security risks, PulseChat offers a modern, secure platform purpose-built for conversational marketing in 2026.

Our migration team understands the urgency of platform transitions following security incidents. We can help you migrate conversation flows, rebuild integrations with enhanced security, and ensure your team is fully trained on PulseChat before you sunset Drift.