Zendesk says breach compromised email addresses

But the company said the breach affected only three of its customers
  • Jeremy Kirk (IDG News Service)
  • — 22 February, 2013 05:30

Zendesk said Thursday a hacker gained access to support information for some customers of its online help desk software.

"We've become aware that a hacker accessed our system this week," wrote Mikkel Svane, Zendesk's CEO. "As soon as we learned of the attack, we patched the vulnerability and closed the access that the hacker had."

The company has more than 20,000 customers, including large enterprises such as Sears, Xerox and Groupon. Svane wrote that the three affected customers have been notified, but he did not identify the businesses.

However, Twitter wrote that it was "emailing a small percentage of Twitter users who may have been affected by Zendesk's breach. No passwords involved."

Pinterest and Tumblr was also affected. A Pinterest spokesman shared an advisory sent to its users that said in part: "Unfortunately your name, email address and subject line of your message were improperly accessed" in Zendesk's breach. Pinterest advised users to be wary of suspicious emails asking for their password.

Tumblr told its users in an advisory that while much of the exposed information is "innocuous," it could allow hackers to associate a person's email address with the address of their blog. "We're working with law enforcement and Zendesk to better understand this attack," Tumblr's notice said.

Zendesk's investigation so far shows that the hacker "downloaded email addresses of users who contacted those three customers for support, as well as support email subject lines," Svane wrote.

Email addresses are useful for hackers, as it gives them a direct way to deliver malicious links and content that could attack a victim's computer if it is running out-of-date software.

A range of attacks in the last few weeks have targeted software vulnerabilities in Oracle's Java and products from Adobe Systems. Although those companies have issued patches, many computers may not have been updated yet.

Zendesk is just one of a number of companies over the last few months to disclose network breaches. It comes just after a lengthy report on cyberespionage released earlier this week by security vendor Mandiant alleging a Chinese military unit waged an extensive seven-year hacking campaign against 141 companies and organizations.

Svane wrote Zendesk is committed to working with law enforcement on the breach and "bring anyone involved to justice."

"We're incredibly disappointed that this happened and are committed to doing everything we can to make certain it never happens again," he wrote. "We've already taken steps to improve our procedures and will continue to build even more robust security systems."

Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk

Tags: intrusion, security, Zendesk, data breach, data protection, Exploits / vulnerabilities, malware

Review: File Recovery Tools

READ THIS ARTICLE
DO NOT SHOW THIS BOX AGAIN [ x ]
Comments are now closed.
CSO Corporate Partners
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

Business Continuity Management Solutions

Automate business-continuity and disaster-recovery planning and enable crisis management in one solution.

Latest Jobs
Security Awareness Tip

Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).


  1. Have an incident response plan.

  2. Pre-define your incident response team 

  3. Define your approach: watch and learn or contain and recover.

  4. Pre-distribute call cards.

  5. Forensic and incident response data capture.

  6. Get your users on-side.

  7. Know how to report crimes and engage law enforcement. 

  8. Practice makes perfect.

For the full breakdown on this article

Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.