OneDigital Discloses Supply-Chain Breach from 2025, 28,000 Individuals Impacted

OneDigital Investment Advisors Reveals 2025 Data Breach Affecting 28,414 Clients via Third-Party Chat App

HIGH
April 14, 2026
7m read
Supply Chain AttackData BreachRegulatory

Impact Scope

People Affected

28,414

Industries Affected

Finance

Geographic Impact

United States (national)

Related Entities

Products & Tech

Drift

Other

OneDigital Investment AdvisorsSalesforce SalesloftExperian

Full Report

Executive Summary

OneDigital Investment Advisors, a financial advisory firm, has begun notifying 28,414 individuals about a data breach that compromised their sensitive personal information, including names and Social Security numbers. The security incident was a supply-chain attack that occurred in August 2025. The point of entry was a vulnerability in the Drift online chat tool, which was integrated with OneDigital's former CRM platform, Salesloft. The breach was only discovered when the firm's current CRM provider, Salesforce, detected suspicious activity. The eight-month delay between the breach and the notification underscores the persistent and latent risks associated with third-party software integrations and the challenges organizations face in maintaining visibility across their entire software supply chain.

Threat Overview

This incident is a clear example of a cascading supply-chain compromise. The vulnerability was not in OneDigital's own systems but in a third-party application integrated into another third-party platform they were using.

Timeline of Events:

  • August 12-18, 2025: An unauthorized actor exploits a vulnerability in the Drift chat application. This allows them to access and copy client data stored within OneDigital's Salesforce environment, which was connected to Drift via the Salesloft platform.
  • August 22, 2025: Salesforce notifies OneDigital of a potential security event.
  • February 2, 2026: RMAP's forensic investigation concludes that a breach occurred. (Note: This date seems to be from a different article, the OneDigital article doesn't give a specific investigation conclusion date).
  • April 8, 2026: OneDigital begins mailing notification letters to the 28,414 affected individuals.

The compromised data includes highly sensitive PII:

  • Names
  • Social Security numbers

OneDigital is offering 12 months of credit monitoring services to the victims, acknowledging the high risk of identity theft and fraud associated with the stolen data.

Technical Analysis

The attack vector was a vulnerability in a third-party component, a common pattern in supply-chain attacks.

Impact Assessment

  • Significant Delayed Risk: The 28,414 victims have had their SSNs exposed for over eight months without their knowledge, putting them at prolonged risk of identity theft and financial fraud.
  • Regulatory Consequences: The long delay in notification could lead to regulatory penalties and legal action, particularly under state data breach notification laws like the one in Maine where the breach was filed.
  • Loss of Client Trust: For a financial advisory firm, the trust of its clients is its most valuable asset. A breach involving SSNs, coupled with a long notification delay, can be devastating to client relationships.
  • Complex Liability: This incident creates a complex web of liability between OneDigital, Salesforce, Salesloft, and Drift, which will likely result in costly legal and contractual disputes.

Cyber Observables for Detection

Detecting such an attack requires deep visibility into API traffic and third-party application behavior.

Type Value Description
log_source Salesforce Event Monitoring Logs Look for anomalous API activity from the service account associated with the Drift/Salesloft integration, such as accessing an unusually large number of records.
api_endpoint *.salesforce.com/services/data/vXX.X/query Monitor for SOQL queries from the integrated app that are broader than necessary (e.g., SELECT Name, SSN__c FROM Contact) when the app should only be accessing names.
user_account_pattern API key usage from unknown IPs If the integration's API key is used from an IP address not associated with Drift or Salesloft's infrastructure, it is a major red flag.

Detection & Response

  • D3FEND: Cloud Service Monitoring: Implement comprehensive monitoring for SaaS platforms like Salesforce. Utilize native tools like Salesforce Shield Event Monitoring to create alerts for anomalous data access patterns from integrated applications. This aligns with D3-CSM: Cloud Service Monitoring.
  • API Security: Deploy API security tools that can analyze traffic between integrated applications, baseline normal behavior, and detect threats like data exfiltration or abuse of API keys.
  • Supply Chain Intelligence: Subscribe to threat intelligence feeds that specifically cover vulnerabilities and breaches in the third-party software and SaaS applications your organization uses.

Mitigation

  • Vendor Risk Management: Conduct thorough security reviews of all third-party applications before integration. This must include an analysis of the data they will access and the permissions they require.
  • Principle of Least Privilege for APIs: When configuring an integration, grant the API key or service account the absolute minimum permissions required. The Drift chat app should not have had permissions to read the Social Security Number field in Salesforce.
  • Data Minimization: Do not store sensitive data in systems where it is not absolutely necessary. A key question to ask is why SSNs were accessible to a CRM that was integrated with a chat tool.
  • D3FEND: Application Configuration Hardening: Regularly audit the permissions of all integrated applications in your SaaS environments. Permissions can 'drift' over time, and what was once a secure configuration may become vulnerable. This maps to D3-ACH: Application Configuration Hardening.

Timeline of Events

1
August 12, 2025
Unauthorized actor begins accessing and copying client data.
2
August 18, 2025
Unauthorized access period ends.
3
August 22, 2025
Salesforce informs OneDigital of a potential security event.
4
April 8, 2026
OneDigital begins sending notification letters to affected individuals.
5
April 14, 2026
This article was published

MITRE ATT&CK Mitigations

Apply the principle of least privilege to API integrations, ensuring third-party apps cannot access sensitive data they don't need.

Implement a robust third-party risk management program that includes security assessments of all integrated software.

Audit

M1047enterprise

Leverage SaaS monitoring tools to audit API activity and detect anomalous data access patterns.

D3FEND Defensive Countermeasures

To prevent supply-chain breaches like the one at OneDigital, organizations must adopt a proactive SaaS Security Posture Management (SSPM) strategy. This goes beyond initial vendor vetting. For the Salesforce environment, an SSPM tool should be used to continuously scan for misconfigurations and excessive permissions granted to integrated third-party apps like Drift/Salesloft. The tool should have immediately flagged that a chat application had been granted API access to a field containing Social Security Numbers (SSN__c). This is a critical policy violation. A proper SSPM program would automatically alert security teams to this 'privilege creep' and provide a workflow for remediation, which involves modifying the integration's permission set in Salesforce to remove access to all sensitive fields. This automated, continuous governance is essential to managing the risk of dozens or hundreds of interconnected SaaS applications.

For detective control, continuous Cloud Service Monitoring is vital. OneDigital should have been ingesting Salesforce Shield Event Monitoring logs into their SIEM. Specifically, the ApiEvent and DataExportEvent log types are critical. A detection rule should have been in place to monitor the service account associated with the Drift integration. This rule would baseline normal activity (e.g., 'accesses 10-20 contact records per hour, never reads SSN__c field') and alert on any significant deviation. The attacker's activity—accessing over 28,000 records and specifically querying the SSN field—would have represented a massive anomaly. A well-configured detection rule, such as 'Alert if service account svc_drift accesses more than 100 records in an hour OR if ApiEvent.Query contains SSN__c', could have detected the breach in August 2025, rather than relying on a notification from another vendor months later.

Sources & References

OneDigital Latest to Warn Clients of Salesforce Data Breach
PLANSPONSOR (plansponsor.com) April 14, 2026
OneDigital Data Breach Affects 28K; Attorneys Investigating
ClassAction.org (classaction.org) April 9, 2026
Data Breach Notifications - OneDigital Investment Advisors LLC
Maine Attorney General (maine.gov) April 8, 2026
OneDigital Warns Clients of Alleged Salesforce Data Breach
WealthManagement.com (wealthmanagement.com) April 10, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

Supply Chain AttackData BreachOneDigitalSalesforceDriftDelayed DisclosurePIISSN

📢 Share This Article

Help others stay informed about cybersecurity threats