While the company’s core Salesforce environment was not impacted, the incident exposed sensitive information contained within a limited number of emails.
The chain of events began on August 26, 2025, when Salesloft Drift publicly disclosed a security incident affecting its platform.
A subsequent in-depth report from Google’s Threat Intelligence Group detailed the threat actor’s activities related to the breach.
As a customer using Drift for certain business applications, Elastic initiated its incident response protocols to investigate any potential impact proactively.
Although Elastic was not directly notified of being affected, its security team launched an immediate investigation to determine if any company or customer data was exposed.
Elastic’s investigation confirmed that its Salesforce environment was not compromised. However, the team discovered that a single email account had been exposed through the “Drift Email” integration.
This exposure may have granted an unauthorized actor read-only access to emails received in that specific inbox.
After conducting a scan of the inbox’s contents, security personnel identified a small number of inbound emails that included potentially valid credentials.
In response to this discovery, Elastic notified the customers who were potentially affected through existing support channels.
The company has stated that any customer who did not receive a direct notification was not identified as being impacted by this credential leak.
Immediately after learning of the Drift incident, Elastic’s Information Security team took decisive action to contain the threat and assess the damage.
The team launched a comprehensive investigation, reviewing access logs, network activity, and system configurations to determine the extent of the data exposure.
A critical first step was to disable all Drift integrations within Elastic’s environment, thereby eliminating any further risk from the compromised third-party platform.
Concurrently, the team monitored open-source intelligence for Indicators of Compromise (IOCs) and coordinated with Drift’s security team to gather additional information.
Elastic has affirmed its commitment to transparency and protecting customer data, and its team continues to monitor for new information related to the event.
Confirmed victims of this supply chain attack include:
Find this Story Interesting! Follow us on Google News, LinkedIn, and X to Get More Instant Updates.
The post Elastic Security Incident – Hackers Accessed Email Account Contains Valid Credentials appeared first on Cyber Security News.
LAWRENCE, Ind. (WOWO) — The Indiana Department of Natural Resources is trying to figure out…
Xbox's Elite 3 controller has leaked ahead of its summer showcase event. Earlier today, Xbox's…
Director Matt Reeves has revealed the full cast for The Batman Part II, confirming several…
Looking for a powerful ebike with the speed and range to meet your ambitious needs?…
Marathon is attempting to broaden its playerbase with new offerings, such as a PVE-only mode.…
A Russian state-sponsored hacking group known as Sandworm has been caught making a calculated pivot…
This website uses cookies.