It has been reported that a piece of malware formerly used to target banking customers has been redirected towards users of Salesforce.com. With millions of subscribers, and utilised by over 100,000 organisations, Salesforce.com is one of the world leaders in customer relationship management (CRM) solutions; however, with the new malicious coding, people are being urged to take care and avoid phishing scams.
The Dyre/Dyreza malware is a sophisticated piece of technology and has the ability to bypass two-factor authentication (2FA). It steals the names and passwords of users and is therefore able to infiltrate systems. The malware first appeared in June this year, when British customers using RBS, NatWest Bank, Ulster Bank and other institutions were targeted. A Danish security team has now identified the same code being used to access Salesforce.
Jan Kaastrup, the chief technology officer of security firm CSIS, said it is more than likely that the developers of Dyre had been specifically asked to alter the trojan to access Salesforce.com’s network. “We can document that Salesforce is being targeted,” CSIS said, adding to the official advisory from Salesforce; at that time, the CRM firm said: “On 3rd September 2014 one of our security partners identified that the Dyre malware (also known as Dyreza), which typically targets customers of large, well-known financial institutions, may now also target some Salesforce users. We currently have no evidence that any of our customers have been impacted by this, and we are continuing our investigation.”
The Dyre trojan was first identified around mid-June 2014 when researchers at PhishMe, along with the team at CSIS, revealed that they had found a new strain of malware. Over the last few months the coding has evolved and multiple malware campaigns have been run, said Mr Kaastrup, with the expert saying that the code is still being distributed, largely using email techniques.
As part of the latest targeting, customers receive an email with a lookalike Salesforce imprint. If individuals then follow the link to the fake website, keylogging is utilised to grab people’s names and passwords. The case is particularly worrying because the system is able to circumnavigate 2FA checks and intercept one-time passwords.
In response to the situation, Salesforce said that it would contact any customer it thought had been impacted by the malware to give further guidance; in the meantime, for users who believe they have been targeted, it is vital to open a security support case with the company to gain additional help.
This article was written by Montash.
Montash is a multi-award winning, global technology recruitment firm. Specialising in permanent and contract positions across mid-senior appointments which cover a wide range of industry sectors and IT functions, including:
ERP, BI & Data, Information Security, IT Architecture & Strategy, Energy Technologies, Demand IT and Business Engagement, Digital and E-commerce, Infrastructure and Service Delivery, Project and Programme Delivery.
With offices based in London, Montash has completed assignments in over 30 countries and has appointed technical professionals from board level to senior and mid-management in permanent and contract roles.