Highly Targeted Phishing From Salesforce.com Leak 72
An anonymous reader writes "Salesforce.com has finally acknowledged what security experts have suspected for weeks: that a Salesforce.com employee had his company credentials stolen in a phishing scam, and criminals have been using names and e-mail addresses from Salesforce's customer list to conduct other highly targeted phishing attacks, including the recent round of fake e-mails apparently from the Federal Trade Commission." In such hightly targeted attacks, the AV companies are at a loss — they have little chance of quickly developing signatures for threats that only reach a few thousand victims.
ummm... what? (Score:5, Insightful)
Seriously, what do AV companies have to do with phishing scams? The proper counter-attack to phishing is user education, and proper security practices at various sites (e.g. banking sites not using email for official correspondence, not allowing info to leak, etc.). There are some technological tools that can help reduce the impact of phishing (e.g. toolbars that notify the user of suspicious activities) but ultimately this is an issue of user education...
Re: (Score:2)
Re: (Score:2)
Re: (Score:1)
Re: (Score:2)
If the user population were sufficinetly educated, spyware, viruses, trojans and phishing wouldn't be nearly the problem it is today. Antivirus software is for defending after the fact- by the time it comes into play you've already lost. Notice that there are few if any AV companies that specialize in OSes that are not frequently targets of
Re:ummm... what? (Score:5, Funny)
haha
You had me there. No really what is your solution to phishing?
Re: (Score:3)
Because when your only tool is a hammer, EVERYTHING is a nail.
Re: (Score:2)
Seriously, what do AV companies have to do with phishing scams? ...and I really have trouble understanding why AV companies should be the ones to come up with 'signatures' to detect this stuff...
[snip]
Well, AV companies are the ones who sold people snakeoil^H^H^H^H^H^H^H^H security in a bottle. It's the AV companies who have built a business model around the message "give us money every year or you won't be 'secure'"; I think it's perfectly reasonable for people to ask them to deliver the "security" they were promised. I can't count the number of times I've seen a user with a malware infection give me a confused look and say "but I've got antivirus installed". The fact is that the AV companies do a real
the only option (Score:4, Interesting)
Re: (Score:1)
but, once a few of them are acquainted, it becomes a stronger web of trust, so mail could easily be verified.
but if the credentials were phished then i reckon it's not that hard to get the pri key.
Re: (Score:2)
No. There is a big difference between knowing someone's email address and having system/root-level access on their PC (or better yet: physically stealing their smartcard).
So much money would be saved from fraud by issuing everyone smartcards (say, with their tax returns?) that such a system would pay for itself quickly. It is impossible to steal keys off of a smart card via a remote hack.
Re: (Score:1)
Re: (Score:2)
Re: (Score:1)
Re: (Score:1)
Re: (Score:2)
Thats including credit cards and similar sensitive stuff like that.
Cacert.org keeps theirs on a secure box who's only connection to the net is a slow serial link.
Re: (Score:2, Informative)
Re: (Score:2)
And your wrong on another count. On windows, private keys can only be accessed directly by a user with System level access.
Re: (Score:1)
Re: (Score:2)
Re: (Score:2)
Re: (Score:1, Funny)
Speak for yourself. I completely distrust every e-mail, and have never, ever clicked on an attachment to an e-mail. I've gotten hundreds of phishing scam e-mails... never fell for one.
When I was sysadmin at a large Fortune 500 company (back in the days of floppies), my policy was that if you got a virus, I had a box of floppy-locks and you got one for a week.... and had to get someone else to read your flop
Re: (Score:1)
Re: (Score:2)
But I don't know if anyone, even the BOFH, would be immune to a sufficiently targeted attack. (Although naturally a targeted attack against the BOFH would be a fatal mistake...)
Re: (Score:2)
I guess im not human then. Homo sapiens sapiens paranoius?
Re: (Score:2)
AV companies appropriate? (Score:5, Insightful)
Re: (Score:1)
I think the article poster is saying that perhaps salesforce.com should pony up and pay the a/v firms to fix the problem being that it affects very few people.
Re:AV companies appropriate? (Score:4, Insightful)
People are the way they are and no amount of you (or me) being smarter than the herd is going to change it.
Here's a suggestion (Score:2)
Re: (Score:2)
Its like I sometimes say when I feel
It's not just targeted phishing... (Score:5, Funny)
Also, there's software (like Internet Explorer) that pretty much trains people to fall victim to "thin" social engineering attacks (by, for example, crying wolf hundreds of times a day). This means that these attacks work often enough that if you can target a few hundred people at a specific location you'll get one, and they happen often enough that it's not even suspicious for a few hundred people at a location to get a dialog box asking if they want to infect their computer now.
Antivirus software can't help.
Security is like sex.
Once you're penetrated you're fucked.
Re: (Score:2)
Also, there's software (like Internet Explorer) that pretty much trains people to fall victim to "thin" social engineering attacks (by, for example, crying wolf hundreds of times a day).
Crying wolf isn't the problem. Instead, the problem is crying wolf when you can properly handle the wolf without collateral damage.
For example, some Firefox configurations can be set to block popups from web plugins. However, the common method of setting privacy.popups.disable_from_plugins to 2 prevents you from opening any popup from a plugin even if you wanted to. The correct procedure is to record the URL that needs to be opened (as it does if Javascript tries a popup.) Because of this, Adblock is
Re: (Score:3, Insightful)
It sure is.
This isn't just phishing I'm talking about, this is a remote execution attack that works because the user is trained to answer "yes" when they see a security dialog.
If your software is asking the user "Do you want me to do (dangerous thing)?" often enough that the user is conditioned to respond in the affirmative, that's a problem. Internet Explorer should have had every single capability related to the one that Gator used removed from the browser in 1997. In fact, I
Re: (Score:2, Funny)
Your mistake was in thinking that Microsoft was a Software Company.
They're nothing of the sort.
They are an Abuse Company that uses Software as the vehicle to deliver this abuse, as opposed to words, whips, and/or chains. >:-)
Screw antivirus, call law enforcement! (Score:2)
Re: law enforcement! (Score:3, Funny)
e-mail address, details of the scam and gve them a link to a security website
that reported the scam.
The response I got was basically, "They're not doing anything illegal. If you send them money/info about you, that's your business."
In short, as far as law enforcement in Canada is concerned, if you're dumb enough to fall
for phising, tough luck. And I kind of agree with them. It doesn't lave me with a warm,
fuzzy feeling, but I agree.
Re: (Score:2)
Either way, sure, I imagine a lot of the time you'll ge
Re: (Score:2)
Re:Screw antivirus, call law enforcement! (Score:4, Interesting)
They can't solve all the problems, or maybe even most of them, but they're doing what they can, and it's more than you'll read about on Slashdot. No matter how much resources the FBI and others throw at this problem, however, it will always remain mostly a problem of technology combined with user education.
At the last APWG meet, in Pittsburgh, some researchers fron Carnegie-Mellon presented there findings of an anti-phishing game they wrote, the idea being that you can more effectively train users to not be phished by having them play a video game, rather than read some boring instructions from the IT department or watch a similarly boring video. Their test subjects showed real improvement Vs. a control group, and there has been considerable interest in the game.
A preview version is here, for anyone interested:
http://cups.cs.cmu.edu/antiphishing_phil/ [cmu.edu]
License is CC-attribution-non-commercial.
(I am not affiliated with CMU)
Re: (Score:2)
When technology is not the answer (Score:5, Insightful)
My point is simply this. Training hours spent with each employee about how to recognize and respond correctly to online threats would have been a more effective and likely cheaper alternative to whatever their last security initiative was. Conversely testing or "job skill validation" that prevents people likely to do stupid things from getting enough clearance to have an email address on the corporate server - would also be effective.
The problem with modern operating systems is that they allow people to think they know how to run a computer. Vista says, "Shall I allow trojan.exe to run?" User says to self, "Self, I have no clue what that is, so I better let it run."
Anyone else see a problem with leaving immediate security questions to be answered by the person who happens to be at the keyboard?
IMHO Technology is not and should not be thought of as, the solution to all problems.
Dennis Dumont
Re: (Score:3, Informative)
I think that's a fair representation of the current state of affairs. Moreover, it pretty much sums up the beginning, middle and end of most malware issues. From the article:
Were web-based services ever the answer? (Score:4, Insightful)
Not everything can be addressed through technology. This is such a case. Note that the original error was with a human being that chose to be duped by a phishing expedition.
True, but this story appears to have started with an employee of an outside service, salesforce.com, succumbing to phishing.
While you can't entirely beat sociological threats through technological defences, this case doesn't exactly support the standard software-as-a-service provider's argument that by outsourcing your data handling to them, you are avoiding the complexity and problems of doing it yourself. What next, confidential planning documents from a company using one of the web-based office suites get leaked after the office suite business gets tricked? There is a lesson to be learned here.
Technological solutions and behavioral problems (Score:2)
Indeed. This was a people problem, through and through.
I note that, in their list of things SalesForce.com says they are doing to make sure it doesn't happen again, conspicuously absent is anything to do with people.
"There are seldom good technological solutions to behavioral problems." -- Ed Crowley
Re: (Score:2)
Yes I do, but the alternative is to whitelist the applications that are allowed to run and disallow everything else. That may work fine in the corporate environment, but it would fail utterly in the home environment where the user is the admin.
Monoculture (Score:2)
So, if bogus sales are transacted, then would (Score:2)
SALESFORCED?
Re: (Score:2)
Re: (Score:2)
Since the person was asking about CRM solutions (even if the original question was off-topic), evidently it was.
And if that qualifies as a sales pitch, something is wrong.
I'm a technician, not a sales guy. I, personally, don't give a shit WHAT he winds up with.
So take your crappy attitude somewhere else. It's not wanted here.
Re: (Score:2)
Ah. Starting with an attach, instead of delineating real problems. Good form!
"Not even their latest version saves it from looking like a modern application with last decades technology under the hood."
What is the "latest version" you're on?
"My company forces its upon everyone here and they hate it with a passion."
Great. Bandwagoning.
If you're an Outlook-head, I can see why you might not like it. The fact is, it's much easier to network and maintain than Outlook is. I
SugarCRM (Score:1, Offtopic)
Re: (Score:2)
Moderation without investigation is frustration - maybe some safes force people are scared that people will spread the word that there is a free alternative to their product that doesn't own your business data or charge you for the priveledge of accessing it.
Did I say suprisingly good in comparison, let me rephrase that...
SugarCRM KICKS SALESFORCE ASS
Re: (Score:2)
SugarCRM KICKS SALESFORCE ASS
because it will be interesting if I get modded down again, just for saying...
SugarCRM KICKS SALESFORCE ASS
But I can always just continue to re-post the same comment.
Disclaimer: I am in no way associated with SugarCRM in any way!
This is incredible (Score:3, Informative)
Bottom line is, how can you keep such breach a secret for 7 months without telling your clients at the very least? I have yet to receive an email from them about this. No correspondence has happened between them and us.
Oh, and the SalesForce "security" person was saying that the law enforcement has found where the phisher is located and that "if they have not aprehended him already, they will soon do so".... Whatever. BS.