We want to share an update to our blog post regarding the recent unauthorized access to Salesloft’s Drift application, which was integrated with Bugcrowd’s Salesforce instance. Bugcrowd is among the more than 700 companies impacted by this incident.
We have no reason to believe this activity affected Bugcrowd’s platform, customer vulnerability information, its broader systems, or any payment information it collects.
As we discuss further below, any potential impact to Bugcrowd and its customers would be the result of the integration of Salesloft’s Drift application with Bugcrowd’s Salesforce instance.
Our investigation determined that an unknown actor gained unauthorized access to certain information in our Salesforce instance through the Salesloft/Drift Salesforce integration. Information regarding you as a customer that may have been exposed through this intrusion includes commonly available business contact details (such as employee name, business email address, and business phone number), billing addresses, old credentials for test accounts, product pricing and quotations, and notes which may have been stored in accounts. We do not believe any attachments or files were exposed.
In light of the Salesloft incident, we encourage all customers to immediately rotate their testing or triage credentials. Although we suspect these old credentials have already been rotated over time by our customers, updating them now is a prudent precaution to undertake.
We moved quickly to respond to the security event. We also took this opportunity to consider any additional actions we could take to further strengthen our defenses. Steps we have taken include:
The security and privacy of our customer’s data is very important to Bugcrowd. Our team continues to work diligently to respond to this incident and protect customer information affected by this incident. We greatly value the trust and patience of our customers, and we will provide further updates as appropriate. Please contact us with any questions at security@bugcrowd.com.