iTnews

SendGrid hands customer to hacker

By Darren Pauli on Mar 28, 2014 9:57AM
SendGrid hands customer to hacker

Silver-tongued swindler sways staffer.

A staffer at popular email delivery system SendGrid was tricked by a hacker who used access granted to them to break into US-based cloud hosting provider ChunkHost.

The breach last weekend was described by ChunkHost as a "serious security incident" targeting two of its customers in "a really close call".

SendGrid boasts some 150,000 customers including Snapchat, Pinterest and FourSquare, and has delivered more than 200 billion emails. The company has been contacted for comment.

ChunkHost co-owner Nate Daiger said in a blog on the compromise his company had received a transcript of a chat between SendGrid's technical support group and an attacker who he said "was clearly someone trying to social engineer access to our account".

Despite obtaining word from SendGrid that it would not fall for such trickery again, a subsequent attack was successful.

SendGrid approved a simple terse request to change ChunkHost's registered email address from support@chunkhost.com to a .info domain, a move made in contravention to its security policies.

"Though SendGrid didn’t fall for [the first] attempt, we alerted them to the probing and asked them to please make sure that future social engineering attempts wouldn't work," Daiger said.

" ... it turns out that the policy was ignored this weekend, and someone managed to convince SendGrid over the phone to change the email address on the account. We got an email from them, but by that point it was already too late. The hacker had logged into SendGrid and taken control."

The attacker then activated a SendGrid feature to send blind carbon copy email for outgoing messages. They then reset passwords for two targeted customer accounts -- both described only as being involved in Bitcoins -- which were quietly sent to the .info email account.

But the attack was foiled as the customers used ChunkHost's two-factor authentication phone app.

"Our customers' accounts were protected and the attackers were stymied. But it was really close," Daiger said.

The attacker was kicked out within 20 minutes at which time ChunkHost disabled password resets, rebooted all sessions and cut SendGrid, opting instead for a local mail relay.

He said SendGrid had apologised for one of its staffers being lured in by the attackers.

"After the email address was changed, they were able to simply request a new password and gain account access," Daiger quoted SendGrid as saying.

"This should have never happened and we take things like this very seriously. I apologise that you've had to deal with this and I will make sure that we re-iterate with out (sic) staff that we have policies like that in place for a reason."

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
infosec security social engineering

Partner Content

Four data superpowers to harness before 2022
Promoted Content Four data superpowers to harness before 2022
What conversations should executives be having about cyber security?
Partner Content What conversations should executives be having about cyber security?
COVID puts agile IT under the microscope
Promoted Content COVID puts agile IT under the microscope
Tackling cybersecurity in 2021
Partner Content Tackling cybersecurity in 2021

Sponsored Whitepapers

The top 5 tech trends to deliver business outcomes
The top 5 tech trends to deliver business outcomes
10 reasons why businesses need to invest in cloud security training
10 reasons why businesses need to invest in cloud security training
Your guide to application security solutions
Your guide to application security solutions
State of Software Security: Open Source Edition
State of Software Security: Open Source Edition
Five questions to ask before you upgrade to a SIEM solution
Five questions to ask before you upgrade to a SIEM solution

Events

  • On-Demand Webinar: How Poly and Microsoft are Embracing Future Work Environments
  • [iTnews and Micro Focus] Navigating the cloud modernisation minefield
By Darren Pauli
Mar 28 2014
9:57AM
0 Comments

Related Articles

  • Swatch shuts down some technology systems after cyber attack
  • 86 400 looks to strengthen customer sign-up process
  • Britain's GCHQ cyber spies embrace the AI revolution
  • Critical remote code execution bug found in VMware vCenter
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

TPG Telecom to start enticing NBN customers to move

TPG Telecom to start enticing NBN customers to move

Infosys scores another $40m for Centrelink payments engine build

Infosys scores another $40m for Centrelink payments engine build

Telstra InfraCo opens up telco's own fibre network

Telstra InfraCo opens up telco's own fibre network

Transport for NSW data stolen in Accellion breach

Transport for NSW data stolen in Accellion breach

You must be a registered member of iTnews to post a comment.
Log In | Register
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.