websights

Supply chain attacks meet Shadow AI

by

It’s hard to imagine an organization driving innovation and productivity without integrating various apps and AI tools. SaaS applications, third-party integrations, and AI assistants have become core to how businesses operate. Yet with this progress comes a challenge: every new connection expands the attack surface in ways that are increasingly difficult to monitor or control.

Supply chain attacks are exploiting the very apps and tools employees rely on daily. Each new integration or AI-driven feature creates an entry point that, if compromised, can ripple across ecosystems, exposing sensitive data and critical infrastructure.

A New Era of Supply Chain Risk

Traditionally, supply chain attacks exploited trust in third-party providers to gain entry into downstream systems. With SaaS adoption accelerating and AI tools embedded into daily workflows, attackers now have unprecedented access to sensitive data and privileged connections. Shadow IT, the unsanctioned adoption of apps, has already proven risky. Shadow AI takes it further, as employees experiment with AI assistants and integrations that may expose enterprise assets without oversight.

The Salesloft–Drift Breach: A Case Study

The recent Salesloft OAuth breach via the Drift AI chat agent illustrates how today’s supply chain risks intersect with Shadow AI. In this campaign, attackers compromised OAuth and refresh tokens tied to Drift’s integration with Salesforce. With these tokens, they pivoted into customer Salesforce environments and exfiltrated sensitive information such as AWS access keys, passwords, and Snowflake tokens.

Image: The hacker targeted Salesforce customer instances through compromised OAuth tokens associated with the Salesloft Drift third-party application

This wasn’t just an isolated incident. We’ve seen notification from Qantas, Allianz Life, and LVMH about similar breaches. These attacks demonstrate how a compromise of one SaaS provider and its AI-powered integration could ripple across an entire ecosystem of customers. In this case the integration itself became the weak link, and the lack of visibility into app-to-app connections left security teams flat-footed.

Why Shadow AI Raises the Stakes

AI tools and agents are particularly risky because they:

  • Expand invisibly: Employees that adopt these, with good intentions, may adopt tools, or integrate them, using default over-permissioned tokens. Without notifying IT security, these integrations create new, unmonitored access paths across the environment.
  • Use tokens for access: OAuth tokens grant powerful, persistent access. If compromised, they can enable attackers to move laterally without needing credentials.
  • Operate autonomously: AI chat agents and assistants can connect to systems and process or share data without human supervision.

As the Salesloft–Drift incident shows, attackers don’t need to break into your systems directly; they only need to compromise the apps and AI tools you already trust.

Defending the expanding application attack surface against supply chain attacks with Wing Security

To stay ahead of this wave of supply chain and Shadow AI attacks, Wing gives organizations the visibility and control needed to protect their expanding application attack surface:

  • Continuous Discovery: Wing continuously identifies every SaaS, internal app and AI tool in use, sanctioned or not, closing visibility gaps created by Shadow IT and Shadow AI.
  • Contextual Awareness: Each discovered app or tool is enriched with intelligence on app description, vendor reputation, breach history, compliance posture, and known compromises.
  • Identify Misuse & Misconfigurations: Wing flags insecure practices like over-permissioned OAuth tokens and missing MFA that attackers often exploit.
  • Map Connections: It builds a comprehensive map of how apps connect to one another and to enterprise resources, exposing risky data flows and hidden dependencies.
  • Threat Exposure Alerts: Wing also alerts on potential exposure through compromised third-party apps. Security teams can quickly assess the scope of exposure through connections to other apps and resources, understand which assets are at risk, and disconnect dangerous connections before attackers exploit them.
  • Respond & Enforce: Wing enables teams to set automated responses to revoke tokens, block compromised apps, or trigger review workflows in real time, to contain threats without slowing down operations.

Supply chain attacks are inevitable, but they can be contained

In a hyperconnected world, where every organization depends on SaaS applications, third-party integrations, and increasingly AI-driven tools, supply chain attacks are no longer a question of if but when. Threat actors will continue to exploit trust in vendors and integrations to gain footholds in downstream environments. Yet this does not mean you are helpless. With the right controls, these attacks can be quickly contained before any damage is done. 

Continuous discovery of every app and AI tool, mapping of interconnections, monitoring of token usage, and real-time posture assessment give security teams the visibility needed to detect risks early. Combined with threat exposure alerts and automated policy enforcement, e.g. revoking risky tokens, blocking compromised apps, and cutting off malicious connections, organizations can stop attackers from turning a single vendor breach into a full-blown enterprise compromise.

The Salesloft-Drift breach is a stark reminder that the attack surface is no longer confined to your perimeter, your cloud workloads, or even your sanctioned SaaS tools. It now extends into every integration and every AI tool operating inside your ecosystem. Without visibility and control, organizations risk cascading supply chain compromises that can expose their most sensitive data.

The intersection of supply chain attacks and Shadow AI is where the next wave of breaches will emerge. Enterprises that act now will be the ones best prepared to withstand it.

To learn more, schedule a demo with one of our experts.