Explore Acora One’s comprehensive IT services, designed to empower SMEs with innovative, tailored solutions.
Our focus is on empowering your team to work efficiently from anywhere, boosting productivity and collaboration through customised IT Solutions.
Meet the Acora One Team
The Acora team is ready and waiting to help. We’d love to hear from you!
Follow Us
Essence of Acora
To view this video please enable JavaScript, and consider upgrading to a web browser that
Home News Room News Token Theft – What is it and how is it Relevant to SMEs?
Businesses, especially small and medium enterprises (SMEs), increasingly rely on a myriad of online services, application programming interfaces (APIs) and third-party platforms to operate efficiently.
At the core of these modern business operations are digital tokens, which are commonly used by SMEs as convenient authentication methods with robust, flexible and scalable access control.
These tiny pieces of code serve as unique identifiers, acting as temporary credentials for a specified period. Once you enter your ID and password to access your business’s website, for example, a session token keeps you logged in across applications and services. All without having to re-enter your credentials for each request.
If you use third-party applications such as cloud services, mobile apps, devices and APIs, the OAuth/API token authorises the app to get into your accounts or resources (e.g., your Microsoft 365 account) on your behalf without requiring your password.
However, while such tokens are essential tools for streamlining access, they also introduce new vulnerabilities. Essentially, when a threat actor steals a valid session token, they can access sensitive data and resources just as the legitimate user – no questions asked. And they can usually do that across multiple services until the token expires.
This article explains how token theft works, the impact such attacks can have on SMEs today and how you can prevent them.
In August 2025, attackers stole Salesloft Drift chatbot’s OAuth tokens used for software integrations like Salesforce and Google Workspace. The breach triggered a devastating supply chain attack that impacted over 700 businesses globally, including tech giants Palo Alto Networks, Cloudflare and Zscaler.
Leveraging the stolen tokens, cybercriminals exfiltrated sensitive data, business contact records, Salesforce objects, and in some cases, API keys and cloud credentials.
Token theft attacks are increasingly becoming lucrative methods for cybercriminals to bypass security measures, including multi-factor authentication (MFA) and traditional protections. Understanding how these attacks occur is paramount for safeguarding your business operations.
Cybercriminals leverage different methods to harvest the tokens, such as:
Unlike traditional credential theft, token theft is exceptionally challenging to identify, as attackers can steal session tokens without you even noticing it.
By familiarising themselves with these vulnerabilities and implementing protective measures (more on that momentarily), SMEs can mitigate the risks associated with token theft, prevent SaaS data breaches and safeguard their digital assets against malicious actors.
Token theft can have devastating consequences. They can expose SMEs to a range of security breaches that may compromise sensitive data and disrupt operations.
Imagine an SME that utilises a cloud-based Customer Relationship Management (CRM) system to manage customer interactions and sensitive business information.
A cybercriminal could steal an API token through a phishing attack targeting an employee. Armed with this token, the attacker would then gain immediate access to the CRM without needing the employee’s password.
They could then manipulate customer records, steal personally identifiable information (PII), or access financial data. Ultimately, such a breach could lead to unauthorised transactions, legal issues and a loss of customer trust, severely impacting the business’s reputation and finances.
SMEs often rely on Single Sign-On (SSO) to further streamline access to multiple internal applications. With SSO, when users sign in once to an app, they automatically gain access to all the other linked applications.
That’s very convenient. Nevertheless, it also means that if an attacker successfully steals the session token from a vulnerable app, that single token gives him lateral access to all other apps connected to the SSO system.
Thus, the threat actor can wreak havoc across the entire network, manipulate data, escalate privileges, steal sensitive information undisturbed, until it is too late.
Cloud platforms like Amazon Web Services (AWS) or Microsoft Azure are popular among SMEs looking for flexible, cost-efficient cloud computing services.
Yet, according to Flexera’s 2025 State of the Cloud Report, the security of those cloud systems is the second top challenge for 77% of the SMEs interviewed. The following example explains the reason behind it.
Cybercriminals could steal a token that grants access to the remote management portal or the VPN gateway, allowing them to bypass traditional perimeter firewalls.
That would enable them to infiltrate not only cloud resources but also on-premise systems. They could then deploy ransomware directly onto physical servers, disrupting operations and resulting in costly and significant financial consequences. The incident may lead to prolonged downtime, as your team scrambles to respond to the attack, restore services and recover lost data.
Ultimately, these scenarios illustrate how tiny security missteps can result in catastrophic breaches, emphasising the need for robust security measures to protect digital tokens and sensitive business information. Hence, as attacking techniques continue to evolve, so should your cyber security strategies
1 in 5 SMEs polled by VikingCloud believe they would go out of business if they fell victim to a cyberattack. Token theft can have far-reaching consequences that can be particularly devastating for SMEs.
The aftermath can extend beyond immediate effects, leading to a cascade of challenges that can threaten the very survival of a business.
When attackers gain access to sensitive accounts and tools, they can launch all sorts of unauthorised transactions. For instance, if hackers steal a financial application’s token, they can initiate unauthorised money transfers, leading to substantial monetary loss before you even realise a breach has occurred. Furthermore, the cost of incident response and forensic investigations to assess the incident can significantly compound these direct losses.
As you deal with the consequences of the breach, your customers may experience prolonged disruptions. For example, loss of access to critical cloud infrastructure can temporarily stop essential services, delay key projects, and, consequently, erode customer satisfaction. Moreover, the chaotic scramble to contain the breach and the lengthy process of system recovery can drain time and resources.
70% of customers interviewed by Vercara would stop doing business with a brand that experienced a cyber security incident. That confirms that loss of customer trust caused by an attack can generate profound, long-lasting and even irreparable damage. Reputation is a key currency, and the fallout from a breach can deter potential clients and reduce loyalty among existing ones.
A SaaS data breach that exposes sensitive customer data can lead to legal repercussions, including significant fines under legislation such as the EU General Data Protection Regulation (GDPR). Moreover, failure to protect customer information can trigger scrutiny from regulatory bodies, increasing the financial burden and complicating recovery efforts.
To safeguard digital keys from cybercriminals and mitigate the risk of token theft, businesses must adopt a multi-faceted approach to cyber security. Here is a list of essential strategies that can help you strengthen digital defences and protect sensitive data from potential breaches.
Token theft poses a significant and growing threat to businesses reliant on third-party and cloud-based services. As cybercriminals continuously adapt and hone their tactics, ignoring the risks associated with token theft is no longer an option.
Security breaches can lead to catastrophic data losses and reputational damage. Therefore, SME leaders must start considering token security a foundational element of their cyber security strategy.
That translates into implementing preventive measures such as token-resistant MFA and real-time monitoring, but also into staying informed about evolving security standards and new technologies.
Embracing future-proof measures, including continuously expiring tokens and hardware-backed security solutions, will help you protect your assets more effectively and remain resilient against emerging threats.
However, making token security a priority to strengthen your digital fortress, safeguard your operational integrity and reinforce your commitment to protecting customer data requires proactive planning and investment.
Acora’s cyber security experts can guide you to ensure you remain competitive and secure in an increasingly dangerous cyber landscape. The time to enhance token security is now. Get in touch.
Powered by ConnectWise – empowering IT solution providers!
Why Small to Medium Businesses Are the New Prime Targets in a Modern Reality Small and medium-sized businesses (SMBs) often believe they are too small to be on cybercriminals’ radars. However, the latest Verizon Data Breach Investigations Report (DBIR) and…
Why Your Business Must Act Now and Upgrade to Windows 11 With October 14, 2025 approaching fast, Microsoft is drawing a line under Windows 10 support, a moment that carries serious implications for SMEs across the UK. Here at Acora…