Attacks/Breaches
4/11/2011
06:55 PM
50%
50%

Epsilon Fell To Spear-Phishing Attack

Breach apparently lasted for months despite warning of targeted attacks against email service providers.

10 Massive Security Breaches
(click image for larger view)
Slideshow: 10 Massive Security Breaches
The breach of Epsilon, the world's largest email service provider, has put the customers of at least 50 major companies at risk from targeted phishing attacks, aka spear phishing, which use fake yet personalized emails to trick people into disclosing personal information, including passwords and financial details.

In an ironic twist for a company entrusted with sending an estimated 40 billion emails per year, the Epsilon breach apparently stemmed from the company having itself been spear phished.

Furthermore, according to Australia's iTnews, Epsilon failed to heed a November 2010 security alert from the email intelligence group at Return Path, one of its business partners, that attackers had recently been targeting email service providers (ESPs) like Epsilon via spear phishing attacks.

Return Path included a sample message with its alert, noting that it "has been sent numerous times, over several different systems, including using the facility of some ESPs, using online greeting card sites, and by way of a botnet." In addition, it said, "sources confirm the list of addresses is very small (less than 3,000 addresses) and aimed 100% at staff responsible for email operations."

The sample phishing message shared by Return Path included a link, which if a user clicked on it would attempt to download three pieces of malware. They were Win32.BlkIC.IMG, which disables antivirus software and which many antivirus programs -- at least at the time--couldn't detect. The other two malware applications were iStealer, which is a keylogger, and CyberGate, a remote administration tool.

According to iTnews, spear phishing attacks resulting from a breach of Epsilon began appearing in early December, starting with Walgreens. But Epsilon apparently didn't discover that its systems had been breached until it installed software, in February 2011, designed to spot unusual--and potentially malicious--information access patterns. By then, stolen data included information relating to the customers of at least 50 companies, including Best Buy, Citi, Hilton, LL Bean, Marriott, Target, TiVo, and Walgreens.

According to Epsilon, attackers stole only 2% of its customer data. But given that the company provides email marketing services for more than 2,500 companies, and by some estimates stores 250 million emails, that's a sizeable breach.

Furthermore, the number of companies warning that their customers are at risk has been expanding, with the Better Business Bureau warning that customers of any affected companies were at risk.

The Epsilon breach highlights that with the growth of cloud services, one data breach can be a single point of failure for numerous organizations. "Outsourcing and the cloud are buzzwords of the 2010s--their many evangelists will assure you that cloud-sourcing your high-volume Internet services is certain to save you money, improve your up-time, and boost your security," said Paul Ducklin, the Asia-Pacific head of technology for Sophos, in a blog post. "After all, if you leave a job such as direct marketing--or email, or office automation, or authentication -- entirely to the specialists, you're bound to have experts on the job who are at least as switched on about security as you are."

Furthermore, entrusting a single company with data on so many people makes it an attractive target for attackers, which may in fact place customers at greater risk of having their personal information stolen.

Of course, customers also won't be holding just the ESP responsible. "The real lesson to be learned is that companies are still responsible to their customers for incidents like this, even if the fault lies with an outsourcer," security analyst John Pescatore, a vice president at Gartner Inc., said in the SANS Newsbites newsletter.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading December Tech Digest
Experts weigh in on the pros and cons of end-user security training.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-4807
Published: 2014-11-22
Sterling Order Management in IBM Sterling Selling and Fulfillment Suite 9.3.0 before FP8 allows remote authenticated users to cause a denial of service (CPU consumption) via a '\0' character.

CVE-2014-6183
Published: 2014-11-22
IBM Security Network Protection 5.1 before 5.1.0.0 FP13, 5.1.1 before 5.1.1.0 FP8, 5.1.2 before 5.1.2.0 FP9, 5.1.2.1 before FP5, 5.2 before 5.2.0.0 FP5, and 5.3 before 5.3.0.0 FP1 on XGS devices allows remote authenticated users to execute arbitrary commands via unspecified vectors.

CVE-2014-8626
Published: 2014-11-22
Stack-based buffer overflow in the date_from_ISO8601 function in ext/xmlrpc/libxmlrpc/xmlrpc.c in PHP before 5.2.7 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code by including a timezone field in a date, leading to improper XML-RPC encoding...

CVE-2014-8710
Published: 2014-11-22
The decompress_sigcomp_message function in epan/sigcomp-udvm.c in the SigComp UDVM dissector in Wireshark 1.10.x before 1.10.11 allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted packet.

CVE-2014-8711
Published: 2014-11-22
Multiple integer overflows in epan/dissectors/packet-amqp.c in the AMQP dissector in Wireshark 1.10.x before 1.10.11 and 1.12.x before 1.12.2 allow remote attackers to cause a denial of service (application crash) via a crafted amqp_0_10 PDU in a packet.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Now that the holiday season is about to begin both online and in stores, will this be yet another season of nonstop gifting to cybercriminals?