Attacks/Breaches
2/22/2013
10:11 AM
50%
50%

Twitter, Tumblr, Pinterest Users Hit In Zendesk Breach

Zendesk, which runs a help desk service and hosts customer service portals, alerts users that hackers accessed email addresses and personal data.

Zendesk this week became the latest in a long line of businesses that have recently had their website security breached by online attackers.

"We've been hacked," said Zendesk CEO Mikkel Svane Thursday in a blog post. Zendesk offers cloud-based help desk software and hosts customer support portals used by numerous businesses. Accordingly, the hack puts Zendesk's customers' personal information at risk.

"We've become aware that a hacker accessed our system this week," Svane said, without specifying the length of time that attackers had access to Zendesk's site. "As soon as we learned of the attack, we patched the vulnerability and closed the access that the hacker had. Our ongoing investigation indicates that the hacker had access to the support information that three of our customers store on our system," he said.

[ Could your users be at risk from another high-profile hack? See NBC Websites Hacked To Serve Citadel Financial Malware. ]

Zendesk didn't name the three affected customers, which it said knew nothing about the breach until being so informed. But Twitter and Tumblr were quickly identified as being two of the affected businesses, due to warnings they emailed to their own customers. "Emailing a small percentage of Twitter users who may have been affected by Zendesk's breach. No passwords involved," read a tweet to Twitter's support channel posted Thursday.

Twitter's email to users warned that some user information may have been stolen. "Zendesk's breach did not result in the exposure of information such as Twitter account passwords. It may, however, have included contact information you provided when submitting a support request such as an email, phone number or Twitter username," read Twitter's email to affected customers. "We do not believe you need to take any action at this time but wanted to ensure that you were notified of this incident."

The breach of some Twitter user data marked the second security breach to have affected Twitter users in two months, following the compromise of about 250,000 Twitter users' accounts. It also followed this week's high-profile hijackings -- by unknown hackers -- of the Burger King and Jeep Twitter accounts.

Tumblr, meanwhile, emailed customers to warn them that it's used Zendesk for more than two years, and that any customers who emailed Tumblr support in that time may be exposed, and had their email addresses and email message subject lines stolen by attackers. "The subject lines of your emails to Tumblr support may have included the address of your blog which could potentially allow your blog to be unwillingly associated with your email address," said Tumblr.

Stolen information might be exploited via social-engineering attacks. On that front, Tumblr advised users to beware potential phishing attacks disguised as official Tumblr communications. "Tumblr will never ask you for your password by email. Emails are easy to fake and you should be suspicious of unexpected emails you receive," said the company.

By late Thursday, the final affected Zendesk customer was publicly identified. "And we have a winner! Joining Tumblr and Twitter in the ZenDesk breach is Pinterest! Now if they would say how they got in ..." tweeted the threat intelligence manager for Trustwave SpiderLabs, who goes by "Space Rogue."

Pinterest likewise sent an email -- subject: "An important notice about security on Pinterest" -- to affected users. "We're sending you this email because we received or answered a message from you using Zendesk," it read. "Unfortunately your name, email address and subject line of your message were improperly accessed during their security breach." The email called on users to beware suspicious emails, and while it didn't suggest that any user passwords had been obtained, it recommended always using strong Pinterest passwords. "Hackers can sometimes guess very short passwords with no letters or symbols. If your password is weak, you can create a new one," read the email.

"We're really sorry this happened, and we'll keep working with law enforcement and our vendors to ensure your information is protected," it said.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Andrew Hornback
50%
50%
Andrew Hornback,
User Rank: Apprentice
2/24/2013 | 2:27:48 AM
re: Twitter, Tumblr, Pinterest Users Hit In Zendesk Breach
Saw this one coming... as more and more organizations move more of their internal services to the cloud, you start moving the boundaries of the security envelope and the risk/liability involved.

The e-mails from the services involved about using strong passwords and not giving your password out - that's common sense to those of us who didn't just show up yesterday on the 'net. Maybe they (or preferably ZenDesk, since they're the visibly liable party here) should start or expand programs to teach users of their services how to use those services securely. Ounce of prevention is worth a couple terabytes of cure.

Andrew Hornback
InformationWeek Contributor
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-7896
Published: 2015-03-03
Multiple cross-site scripting (XSS) vulnerabilities in HP XP P9000 Command View Advanced Edition Software Online Help, as used in HP Device Manager 6.x through 8.x before 8.1.2-00, HP XP P9000 Tiered Storage Manager 6.x through 8.x before 8.1.2-00, HP XP P9000 Replication Manager 6.x and 7.x before ...

CVE-2014-9283
Published: 2015-03-03
The BestWebSoft Captcha plugin before 4.0.7 for WordPress allows remote attackers to bypass the CAPTCHA protection mechanism and obtain administrative access via unspecified vectors.

CVE-2014-9683
Published: 2015-03-03
Off-by-one error in the ecryptfs_decode_from_filename function in fs/ecryptfs/crypto.c in the eCryptfs subsystem in the Linux kernel before 3.18.2 allows local users to cause a denial of service (buffer overflow and system crash) or possibly gain privileges via a crafted filename.

CVE-2015-0656
Published: 2015-03-03
Cross-site scripting (XSS) vulnerability in the login page in Cisco Network Analysis Module (NAM) allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka Bug ID CSCum81269.

CVE-2015-0890
Published: 2015-03-03
The BestWebSoft Google Captcha (aka reCAPTCHA) plugin before 1.13 for WordPress allows remote attackers to bypass the CAPTCHA protection mechanism and obtain administrative access via unspecified vectors.

Dark Reading Radio
Archived Dark Reading Radio
How can security professionals better engage with their peers, both in person and online? In this Dark Reading Radio show, we will talk to leaders at some of the security industry’s professional organizations about how security pros can get more involved – with their colleagues in the same industry, with their peers in other industries, and with the IT security community as a whole.