iTnews

Analysis: Epsilon breach reveals "spear-phishing" risk

By Staff Writers on Apr 6, 2011 11:44AM
Analysis: Epsilon breach reveals "spear-phishing" risk

Major banks and retailers impacted.

Tens of millions of customers and employees of major banks, hotels and retailers are now at risk of "spear-phishing" attacks after hackers stole their email addresses in what may become one of the biggest data breaches ever, security experts have warned.

The massive breach, involving online marketer Epsilon, a unit of Alliance Data Systems, looks like it will mainly put individuals at risk if they respond to camouflaged emails seeking their credit card numbers or other information, though it could help make those emails more believable.

The breach appeared to hit about 50 companies. About two percent of the companies that pay Epsilon to email their customers had data exposed in the attack, the online marketer said in a brief online statement on Monday. A spokeswoman would not give more details, but the company said on its website it has more 2,500 customers in all.

The breach, disclosed in stages since Friday, also reminded experts of other recent incidents in which individual company employees were targeted for email scams.

On Friday, Epsilon said some clients' customer names and email addresses were obtained via an "unauthorized entry."

Companies that have said they were exposed since then include banks Citigroup and Capital One Financial, and retailers Walgreen and Best Buy.

More companies came forward on Monday, including Blackstone Group's Hilton Hotels, Marriott International and Target.

Compromised files apparently did not include the payment card data that has created scares in the past, such as at retailer TJX.

But security experts said just having email addresses -- plus knowing where someone shops -- can help thieves write more sophisticated emails to steal financial data or spread malicious software, or malware.

That practice -- using emails that appear to come from a trustworthy source to steal data -- is sometimes known "spear-phishing" because such emails are more focused than traditional "phishing" emails.

BETTER TARGETING

One aim can be to get behind a company's firewalls without needing sophisticated software, said Anup Ghosh, chief scientist of security firm Invincea. Thieves might then aim for business plans or trade secrets.

"I think the Epsilon breach is a symptom of where we are in the security industry," he said. "If you look at the attacks over the past quarter they're all targeting the users, the employees inside the companies," he said.

Gartner Group analyst Avivah Litan said the Epsilon case showed better security rules may be needed. "The criminals are definitely trending toward targeted attacks, and they often start with targeted spear-phishing emails," she said.

Even as the Epsilon alarm sounded, details came out Friday in another spear-phishing case. This involved the RSA security unit of data-storage giant EMC Corp.

According to a company blog dated April 1, an attacker sent two different phishing emails over a two-day period "to two small groups of employees" that seemed harmless, with the subject line "2011 Recruitment Plan."

"This was intriguing enough for one of the employees to actually pull the e-mail out of their junk box and double-click on the email attachment," according to the blog.

The attachment was a spreadsheet that also contained a feature that exploited a security vulnerability to give access to the employees' PCs and elsewhere in RSA.

Other attacks against oil and energy companies have been classified as "Night Dragon" by security firm McAfee, now part of Intel, and also rely on spear-phishing and other misleading methods.

Epsilon helps companies manage email marketing campaigns. It is too early to know the financial consequences of the attack for Epsilon, said David Frankland, who follows the company for Forrester Research.

But, he said, other marketers could have been hit just as easily. "This is an industry issue, everybody in this industry should recognize that they've dodged a bullet," said Frankland. He said he received emails from Disney, Best Buy and retailer Brookstone Inc notifying him his email had been obtained in the Epsilon attack.

REVIEWS UNDER WAY

Kevin Rowney, director of breach response at Symantec, said it would be weeks before investigators would figure out who hacked into Epsilon's records.

"Given the phishing activity it feels like a hacker crime ring. It's not a nation state or an intelligence agency. It's clearly someone interested in profit off of this data," he said.

Joris Evers, spokesman for McAfee, said individuals as well as companies should be on the lookout for tricks. Addresses gathered from Epsilon, he said, could be a treasure trove for cyberattackers who could use the information to trick unsuspecting individuals out of more valuable information such as credit card numbers and home addresses.

(Additional reporting by Martinne Geller and Maria Aspan in New York. Editing by Ros Krasny, Steve Orlofsky and Bernard Orr).

Got a news tip for our journalists? Share it with us anonymously here.
Copyright Reuters
© 2019 Thomson Reuters. Click for Restrictions.
Tags:
breachdataepsilonsecurityspearphishing phishing security citigroup target walgreen best

Partner Content

Security "mindset shift" needed to protect organisations
Promoted Content Security "mindset shift" needed to protect organisations
5 essential digital transformation ideas
Promoted Content 5 essential digital transformation ideas
Top 5 Benefits of Managed IT Services
Promoted Content Top 5 Benefits of Managed IT Services
Why you can’t miss Australia’s premiere IoT Conference on 9th June
Promoted Content Why you can’t miss Australia’s premiere IoT Conference on 9th June

Sponsored Whitepapers

Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see
Beyond FTP: Securing and Managing File Transfers
Beyond FTP: Securing and Managing File Transfers
NextGen Security Operations: A Roadmap for the Future
NextGen Security Operations: A Roadmap for the Future
Video: Watch Juniper talk about its Aston Martin partnership
Video: Watch Juniper talk about its Aston Martin partnership
Don’t pay the ransom: A three-step guide to ransomware protection
Don’t pay the ransom: A three-step guide to ransomware protection

Events

  • iTnews Benchmark Awards 2022 - Finalist Showcase
  • 11th Annual Fraud Prevention Summit 2022
  • IoT Impact Conference
  • Cyber Security for Government Summit
By Staff Writers
Apr 6 2011
11:44AM
0 Comments

Related Articles

  • Exclusive: Epsilon locks down with grid pattern log-in
  • TfNSW finds more customers, employees impacted by Accellion breach
  • Volvo Cars investigating theft of R&D data
  • Australia's Copyright Agency investigates cyber incident
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Kmart Australia stands up consent-as-a-service platform

Kmart Australia stands up consent-as-a-service platform

NSW digital driver's licences 'easily forgeable'

NSW digital driver's licences 'easily forgeable'

Kmart Australia re-platforms ecommerce site to AWS

Kmart Australia re-platforms ecommerce site to AWS

NBN Co's 250Mbps and gigabit growth is finally clear

NBN Co's 250Mbps and gigabit growth is finally clear

Digital Nation

As NFTs gain traction, businesses start taking early bets
As NFTs gain traction, businesses start taking early bets
COVER STORY: From cost control to customer fanatics, AI is transforming the contact centre
COVER STORY: From cost control to customer fanatics, AI is transforming the contact centre
Metaverse hype will transition into new business models by mid decade: Gartner
Metaverse hype will transition into new business models by mid decade: Gartner
The other ‘CTO’: The emerging role of the chief transformation officer
The other ‘CTO’: The emerging role of the chief transformation officer
Case Study: PlayHQ leverages graph technologies for sports administration
Case Study: PlayHQ leverages graph technologies for sports administration
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.