Context Is Key: What the Salesloft Drift Breach Reveals About SaaS Security Gaps

Published
Written by:
Vishwa Pandagle
Vishwa Pandagle
Cybersecurity Staff Editor

Quick Takeaways:

  • Koblentz states that edge cases look like anomalies; anomalies look like edge cases; context is key.
  • Application and cloud provider logs differ fundamentally; normalization creates SIEM-like consistency.
  • Salesloft Drift breach showed why raw app logs are insufficient without normalization and contextualization.
  • Considering the cross-application context, “impossible travel” matters if it coincides with abnormal file sharing.
  • Scattered Spider cut attack time-to-encryption to under 24 hours, using SIM-swaps, vishing, and SaaS token hijacking.

In this interview, Adam Koblentz, Field CTO of Reveal Security, breaks down how identity behavior analytics can distinguish malicious actions from edge cases in SaaS. 

With senior roles at Mandiant, Verodin, and Carbon Black, Koblentz brings deep expertise in detection strategy and identity analytics. His experience now shapes SaaS and application-layer threat defense.

He explains how detection pivots when logs come from apps rather than SIEMs, what subtle behaviors reveal insider abuse, and why drift stabilization is critical for accuracy. 

Koblentz details containment steps that preserve service levels, metrics to measure detection quality, and identity-first defense against account takeover.

Vishwa: In identity behavior analytics, what discriminates malicious deviations from legitimate edge cases in business workflows?

Adam: The shift to remote and hybrid work has upended anomaly detection. Traditional signals, like “impossible travel” between logins in different geographies, are no longer sufficient on their own. With distributed teams, contractors, and employees logging in from varied devices and networks, edge cases look like anomalies, and anomalies look like edge cases.

To separate legitimate edge cases from malicious events, detection must focus on contextualizing impactful actions rather than chasing surface-level anomalies. 

Key differentiators include:

Applying a security lens that blends behavioral analytics with business semantics makes it possible to identify what’s truly risky rather than alerting on every deviation. The Salesloft Drift breach illustrates this: abnormal Salesforce SOQL queries looked routine until contextualized against their impact: large-scale data exfiltration.

Vishwa: How should detection pivot when telemetry comes primarily from application logs rather than Security Information and Event Management (SIEM) events?

Adam: Application and cloud provider logs differ fundamentally from traditional infrastructure logs. While firewalls or endpoints tend to share broadly consistent schemas, Salesforce, Google Drive, and ServiceNow all log user activity differently, with no unified taxonomy. 

This fragmentation makes it difficult for security teams to interpret events across SaaS ecosystems.

To pivot effectively:

This approach allows teams to build SIEM-like consistency in a SaaS-first world, where taxonomy mismatches are the rule. 

The Salesloft Drift breach, where attackers abused OAuth tokens to exfiltrate Salesforce data, demonstrated why raw app logs alone are insufficient without normalization and contextualization. 

Vishwa: Insider threats mimic routine tasks; which behavioral features signal privilege abuse within systems like SAP or ServiceNow?

Adam: Advanced groups like Scattered Spider (UNC3944) excel at blending into normal workflows by reusing valid accounts, but even when their actions look routine, subtle behavioral signals betray privilege abuse. 

In systems like ServiceNow or SAP, strong indicators include:

APT groups like Scattered Spider compress attack timelines to under 24 hours, making these subtle privilege-abuse signals critical for early detection before an intrusion escalates.

Vishwa: Many detections degrade under drift; how do you stabilize baselines across seasonality, releases, and role changes?

Adam: Stabilization requires adaptive baselining:

Without these, SaaS detection suffers from false positives, especially as application logs lack consistent taxonomies, making drift harder to contextualize across systems.

Vishwa: Response is difficult inside business applications; what containment actions work without breaking critical processes or Service Level Agreements (SLAs)?

Adam: Containment must be tiered, context-aware, and minimally disruptive:

During the Salesloft Drift breach, organizations revoked OAuth tokens for the app without taking Salesforce offline -- an example of targeted containment that preserved business continuity. 

Vishwa: Many organizations track mean time to detect; what metric better captures detection quality for application layer threats?

Adam: MTTD is insufficient alone. Better metrics include:

This is especially important as SaaS breaches surged in 2024, highlighting the cost of both false positives and false negatives.

Vishwa: Given account takeover and session hijacking against SaaS business applications, which cybersecurity tools are suitable for preventing threats?

Adam: Preventing Account Takeover (ATO) and session hijacking requires identity-aware, taxonomy-bridging defenses:

Groups like Scattered Spider (UNC3944) prove why this matters: in 2025, they cut attack time-to-encryption to under 24 hours, using SIM-swaps, vishing, and SaaS token hijacking to move quickly across cloud environments (reveal.security blog)

Closing Notes:

SaaS breaches are on the rise, and credential-based attacks drive ~38% of breaches, outpacing phishing or software exploits. The taxonomy gap in SaaS logs makes identity-driven detection and normalization essential.

Incidents like Salesloft Drift and groups like Scattered Spider demonstrate that the battleground has shifted squarely into SaaS and identity security.


For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: