Zendesk says breach compromised email addresses

But the company said the breach affected only three of its customers
  • (IDG News Service)
  • — 22 February, 2013 05:30

Zendesk said Thursday a hacker gained access to support information for some customers of its online help desk software.

"We've become aware that a hacker accessed our system this week," wrote Mikkel Svane, Zendesk's CEO. "As soon as we learned of the attack, we patched the vulnerability and closed the access that the hacker had."

The company has more than 20,000 customers, including large enterprises such as Sears, Xerox and Groupon. Svane wrote that the three affected customers have been notified, but he did not identify the businesses.

However, Twitter wrote that it was "emailing a small percentage of Twitter users who may have been affected by Zendesk's breach. No passwords involved."

Pinterest and Tumblr was also affected. A Pinterest spokesman shared an advisory sent to its users that said in part: "Unfortunately your name, email address and subject line of your message were improperly accessed" in Zendesk's breach. Pinterest advised users to be wary of suspicious emails asking for their password.

Tumblr told its users in an advisory that while much of the exposed information is "innocuous," it could allow hackers to associate a person's email address with the address of their blog. "We're working with law enforcement and Zendesk to better understand this attack," Tumblr's notice said.

Zendesk's investigation so far shows that the hacker "downloaded email addresses of users who contacted those three customers for support, as well as support email subject lines," Svane wrote.

Email addresses are useful for hackers, as it gives them a direct way to deliver malicious links and content that could attack a victim's computer if it is running out-of-date software.

A range of attacks in the last few weeks have targeted software vulnerabilities in Oracle's Java and products from Adobe Systems. Although those companies have issued patches, many computers may not have been updated yet.

Zendesk is just one of a number of companies over the last few months to disclose network breaches. It comes just after a lengthy report on cyberespionage released earlier this week by security vendor Mandiant alleging a Chinese military unit waged an extensive seven-year hacking campaign against 141 companies and organizations.

Svane wrote Zendesk is committed to working with law enforcement on the breach and "bring anyone involved to justice."

"We're incredibly disappointed that this happened and are committed to doing everything we can to make certain it never happens again," he wrote. "We've already taken steps to improve our procedures and will continue to build even more robust security systems."

Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Jeremy Kirk

IDG News Service
Topics: intrusion, security, Zendesk, data breach, data protection, Exploits / vulnerabilities, malware
Comments are now closed.

Latest News Articles

Most Popular Articles

Follow Us

GGG Evaluation Team

Kathy Cassidy

STYLISTIC Q702

First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.

Anthony Grifoni

STYLISTIC Q572

For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.

Steph Mundell

LIFEBOOK UH574

The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.

Andrew Mitsi

STYLISTIC Q702

The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.

Simon Harriott

STYLISTIC Q702

My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.

Resources

Best Deals on GoodGearGuide

Compare & Save

Deals powered by WhistleOut
WhistleOut

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?