Don’t let overlooked obligations become incidents. Learn how.
Utility navigation bar redirect icon
Portal LoginSupportContact
Search
Close search
Huntress Logo in Teal
  • Platform Overview
    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed ITDR

    Protect your Microsoft 365 and Google Workspace identities and email environments.

    Managed ITDR

    Protect your Microsoft 365 and Google Workspace identities and email environments.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Integrations
    Integrations
    Support Documentation
    Support Documentation
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
  • Threats We Stop
    Phishing
    Phishing
    Business Email Compromise
    Business Email Compromise
    Ransomware
    Ransomware
    Infostealers
    Infostealers
    View Allright arrowView Allright arrow
    Industries We Serve
    Education
    Education
    Financial Services
    Financial Services
    State and Local Government
    State and Local Government
    Healthcare
    Healthcare
    Law Firms
    Law Firms
    Manufacturing
    Manufacturing
    Utilities
    Utilities
    View Allright arrowView Allright arrow
    Tailored Solutions
    MSPs
    MSPs
    Resellers
    Resellers
    SMBs
    SMBs
    Compliance
    Compliance
    What Gets Overlooked Gets Exploited

    Most days, nothing happens. But one day, something will.

    Huntress Cybersecurity
    Cybercriminals Have Evolved

    Get the intel on today’s cybercriminal groups and learn how to protect yourself.

    Huntress Cybersecurity
  • Pricing
  • Community Series
    The Product Lab

    Shape the next big thing in cybersecurity together.

    The Product Lab

    Shape the next big thing in cybersecurity together.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    Resources
    Upcoming Events
    Upcoming Events
    Ebooks
    Ebooks
    On-Demand Webinars
    On-Demand Webinars
    Videos
    Videos
    Whitepapers
    Whitepapers
    Datasheets
    Datasheets
    Cybersecurity Education
    Cybersecurity 101
    Cybersecurity 101
    Cybersecurity Guides
    Cybersecurity Guides
    Threat Library
    Threat Library
    Real Tradecraft, Real Results
    Real Tradecraft, Real Results
    2026 Cyber Threat Report
    2026 Cyber Threat Report
    The Huntress Blog
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
  • Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    The Huntress SOC

    24/7 Security Operations Center

    The Huntress SOC

    24/7 Security Operations Center

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Community

    Get in touch with the Huntress Community team

    Community

    Get in touch with the Huntress Community team

    Compare Huntress
    Bitdefender
    Bitdefender
    Blackpoint
    Blackpoint
    Breach Secure Now!
    Breach Secure Now!
    Crowdstrike
    Crowdstrike
    Datto
    Datto
    SentinelOne
    SentinelOne
    Sophos
    Sophos
    Compare Allright arrowCompare Allright arrow
  • HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    Partners
    MSPs

    Join our partner community to deliver expert-led managed security.

    MSPs

    Join our partner community to deliver expert-led managed security.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Tech Alliances

    Driving innovation through global technology Partnerships

    Tech Alliances

    Driving innovation through global technology Partnerships

    Microsoft Partnership

    A Level-Up for Your Business Security

    Microsoft Partnership

    A Level-Up for Your Business Security

  • Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Awards
    Awards
    Contact Us
    Contact Us
  • Portal Login
  • Support
  • Contact
  • Search
  • Get a Demo
  • Start for Free
Portal LoginSupportContact
Search
Close search
Get a Demo
Start for Free
HomeThreat LibraryData Breaches
Cloudflare

Cloudflare Data Breach


Published: 10/31/2025

Written by: Monica Burgess

Glitch effectGlitch effect

A hiccup in a third-party vendor’s system sent ripples through Cloudflare, a major player in internet infrastructure. This wasn't your typical smash-and-grab; it was a subtle exploit of a vendor's security gap that led to a breach. While the direct impact on Cloudflare was contained, the incident highlights just how interconnected our digital supply chains are and how one weak link can expose even the most fortified systems.

Cloudflare Data Breach Explained: What Happened?

The Cloudflare data breach stemmed from security incidents at two of its third-party vendors, Salesloft and Drift. Attackers compromised these platforms, which Cloudflare's sales and support teams used for customer relationship management. This access allowed the threat actors to view certain customer data, specifically from individuals who had interacted with Cloudflare’s sales and support teams.

When Did the Cloudflare Data Breach Happen?

The incidents occurred in early 2025. Cloudflare became aware of the issue and publicly disclosed details on March 21, 2025, after being notified by the vendors and conducting its own investigation.

Who Hacked Cloudflare?

The identities and motivations behind the Cloudflare data breach remain unknown. The attack was traced back to compromises at third-party vendors, but the specific threat actor or group responsible for the initial infiltration has not been publicly identified.

How Did the Cloudflare Breach Happen?

This breach wasn't a direct assault on Cloudflare's core infrastructure. Instead, attackers found a softer target: third-party software vendors used by Cloudflare's teams. By compromising accounts at Salesloft and Drift, the attackers gained indirect access to a subset of Cloudflare's customer information. The exact method used to compromise the vendors wasn't specified, but it serves as a classic example of a supply chain attack.

Cloudflare Data Breach Timeline

  • Early 2025: Security incidents occur at third-party vendors Salesloft and Drift, used by Cloudflare.

  • March 21, 2025: Cloudflare is notified of the breaches by the vendors and begins its investigation.

  • March 21, 2025 (Later that day): Cloudflare publicly discloses the incident via a blog post, explaining the scope and what data was potentially exposed.

  • Post-Disclosure: Cloudflare suspends the use of the affected vendor platforms, initiates a password rotation for impacted employees, and works to notify affected customers.

Technical Details

The attackers didn't breach Cloudflare’s primary network or services. The access was limited to the data accessible within the compromised third-party SaaS platforms. Because the breach occurred outside of Cloudflare's direct control, the technical details focus on the scope of the vendor compromise. The threat actors gained access to Salesloft and Drift, which integrated with Cloudflare's customer relationship management (CRM) systems. This allowed them to view data but not alter or control Cloudflare's network.

Indicators of Compromise (IoCs)

No specific Indicators of Compromise (IoCs) such as IP addresses, file hashes, or domains were released publicly by Cloudflare. The investigation focused on the scope of access within the third-party applications rather than malware or network intrusions on Cloudflare’s own systems.

Forensic and Incident Investigation

Cloudflare’s internal security team conducted a thorough investigation immediately upon being notified. They worked to understand the full scope of the breach by analyzing logs and access records within the compromised vendor platforms. Their findings confirmed that no Cloudflare systems were directly breached and that the exposure was limited to data housed within Salesloft and Drift. They also took immediate steps to contain the threat by disabling the integrations and forcing password resets for affected employees.

What Data Was Compromised in the Cloudflare Breach?

The compromised data was limited to customer information used for sales and support interactions. This included:

  • Customer names

  • Email addresses

  • Phone numbers

  • Company names

  • The content of support and sales communications

Crucially, Cloudflare confirmed that no sensitive financial information, passwords, or core customer configuration data was exposed.

How Many People Were Affected by the Cloudflare Data Breach?

Cloudflare has not confirmed the exact number of individuals affected by the breach. The impact was limited to customers and prospects who had engaged with Cloudflare’s sales and customer success teams via the compromised platforms.

Was My Data Exposed in the Cloudflare Breach?

If your data was exposed, you likely would have been notified by Cloudflare. The breach specifically affected individuals who had communicated with Cloudflare’s sales or support teams. If you did not interact with these teams, it's unlikely your data was involved. There is no public lookup tool to check for exposure.

Key Impacts of the Cloudflare Breach

While not a catastrophic breach of its core systems, the incident had several key impacts:

  • Reputational Damage: As a leading cybersecurity and infrastructure company, any security incident, even indirect, can affect trust.

  • Operational Disruption: Cloudflare had to temporarily suspend the use of the affected platforms, disrupting sales and support workflows.

  • Customer Concern: The breach raised concerns among customers about how their data is handled, even by third parties.

  • Supply Chain Scrutiny: The incident put a spotlight on the inherent risks of relying on third-party vendors and the need for rigorous vetting.

Response to the Cloudflare Data Breach

Cloudflare’s response was swift and transparent. Within hours of confirming the incident, the company published a detailed blog post outlining what happened, what data was exposed, and the steps they were taking. This included:

  • Immediately disabling the compromised applications.

  • Forcing password and session token rotations for any employee who may have been impacted.

  • Working with the vendors to understand the root cause.

  • Communicating openly with customers and the public.

This fast, clear communication is a solid model for effective data breach response.

Lessons from the Cloudflare Data Breach

This incident offers some critical takeaways for any business. You don't want to learn these the hard way.

  • Your Security Is Only as Strong as Your Weakest Vendor: This breach is a textbook example of supply chain risk. You must vet and continuously monitor the security practices of all your third-party vendors.

  • Transparency Is Key: Cloudflare’s rapid and detailed disclosure helped manage the narrative and maintain customer trust. When a breach happens, hiding it only makes it worse. Get ahead of it.

  • Principle of Least Privilege: Limit the data that third-party apps can access. If Salesloft and Drift had only been able to access the bare minimum of data required, the impact would have been even smaller.

  • Have an Incident Response Plan: Cloudflare was able to act quickly because they had a plan. Do you?

Is Cloudflare Safe after the Breach?

Yes. It's important to reiterate that Cloudflare's core infrastructure, network, and customer services were never compromised. The company's internal security remains robust. Following the incident, Cloudflare enhanced its vendor security review processes and reinforced its internal security protocols to further protect against supply chain attacks.

Mitigation & Prevention Strategies

You can't just hope a breach like this won't happen to you. You need to act. Here are some practical steps to protect your organization from similar supply chain attacks:

  • Implement Multi-Factor Authentication (MFA): Enforce MFA across all services, especially for third-party applications. This makes it much harder for attackers to use stolen credentials.

  • Conduct Vendor Security Assessments: Before you sign a contract, do your homework. Scrutinize the security practices of any vendor that will handle your data.

  • Apply the Principle of Least Privilege: Ensure users and third-party apps only have access to the data and systems they absolutely need to do their jobs. Nothing more.

  • Continuous Monitoring: Use security tools to monitor for suspicious activity across your network and in your cloud applications. An early warning can make all the difference.

  • Develop an Incident Response Plan: Know exactly who to call and what to do when a security incident occurs. Practice it.

Cloudflare Data Breach FAQs

The breach happened indirectly through security incidents at two of Cloudflare's third-party software vendors, Salesloft and Drift. Attackers compromised these platforms, gaining access to customer data used by Cloudflare's sales and support teams. Cloudflare's own systems were not breached.

The exposed data was limited to information from sales and support interactions. This included names, email addresses, phone numbers, and the content of communications. No passwords, financial data, or sensitive customer configuration details were compromised.

The specific threat actor or group behind the attack on Cloudflare's vendors has not been publicly identified. The investigation focused on the third-party compromise, and the ultimate culprit remains unknown.

Businesses can reduce their risk by rigorously vetting the security of their software vendors, implementing multi-factor authentication everywhere, and applying the principle of least privilege to limit data access. Having a well-rehearsed incident response plan is also critical for a swift reaction.

Glitch effectBlurry glitch effect

Protect What Matters

Secure endpoints, email, and employees with the power of our 24/7 SOC. Try Huntress for free and deploy in minutes to start fighting threats.
Try Huntress for Free
Huntress Managed Security PlatformManaged EDRManaged EDR for macOSManaged EDR for LinuxManaged ITDRManaged SIEMManaged Security Awareness TrainingManaged ISPMManaged ESPMBook a Demo
PhishingComplianceBusiness Email CompromiseEducationFinanceHealthcareManufacturingState & Local Government
Managed Service ProvidersResellersIT & Security Teams24/7 SOCCase Studies
BlogResource CenterCybersecurity 101Upcoming EventsSupport Documentation
Our CompanyLeadershipNews & PressCareersContact Us
Huntress white logo

Protecting 215k+ customers like you with enterprise-grade protection.

Privacy PolicyCookie PolicyTerms of UseCookie Consent
Linkedin iconTwitter X iconYouTube iconInstagram icon
© 2025 Huntress All Rights Reserved.

Join the Hunt

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.

By submitting this form, you accept our Terms of Service & Privacy Policy