BOSTON/WASHINGTON (Reuters) - A data breach involving online marketer Epsilon, whose clients are a Who’s Who of major banks and retailers, was only the latest in a string of hacking attacks aimed at getting email records for more thefts, security experts warned on Monday.
The breach, disclosed in stages since Friday, involved the Epsilon unit of Alliance Data Systems Corp, which said some clients’ customer names and email addresses were obtained via an “unauthorized entry.”
Companies that have said they were exposed since then include banks Citigroup Inc and Capital One Financial Corp, and retailers Walgreen Co and Best Buy Co.
Compromised files apparently did not include the payment card data that has created scares in the past, such as at retailer TJX Cos.
But security experts said just having email addresses — plus knowing where someone shops — can help thieves write more sophisticated emails to steal financial data or spread malicious software, or malware.
That practice — using emails that appear to come from a trustworthy source to steal data — is sometimes known “spear-phishing” because such emails are more focused than traditional “phishing” emails.
One aim can be to get behind a company’s firewalls without needing sophisticated software, said Anup Ghosh, chief scientist of Virginia security firm Invincea. Thieves might then aim for business plans or trade secrets.
“I think the Epsilon breach is a symptom of where we are in the security industry,” he said. “If you look at the attacks over the past quarter they’re all targeting the users, the employees inside the companies,” he said.
Gartner Group analyst Avivah Litan said the Epsilon case showed better security rules may be needed. “The criminals are definitely trending toward targeted attacks, and they often start with targeted spear-phishing emails,” she said.
Even as the Epsilon alarm sounded, details came out Friday in another spear-phishing case. This involved the RSA security unit of data-storage giant EMC Corp.
According to a company blog dated April 1, an attacker sent two different phishing emails over a two-day period “to two small groups of employees” that seemed harmless, with the subject line “2011 Recruitment Plan.”
“This was intriguing enough for one of the employees to actually pull the e-mail out of their junk box and double-click on the email attachment,” according to the blog.
The attachment was a spreadsheet that also contained a feature that exploited a security vulnerability to give access to the employees’ PCs and elsewhere in RSA.
Other attacks against oil and energy companies have been classified as “Night Dragon” by security firm McAfee, now part of Intel Corp, and also rely on spear-phishing and other misleading methods.
Epsilon helps companies manage email marketing campaigns. It is too early to know the financial consequences of the attack for Epsilon, said David Frankland, who follows the company for Forrester Research.
But, he said, other marketers could have been hit just as easily. “This is an industry issue, everybody in this industry should recognize that they’ve dodged a bullet,” said Frankland. He said he received emails from Disney, Best Buy and retailer Brookstone Inc notifying him his email had been obtained in the Epsilon attack.
Kevin Rowney, director of breach response at Symantec Corp, said it would be weeks before investigators would figure out who hacked into Epsilon’s records.
“Given the phishing activity it feels like a hacker crime ring. It’s not a nation state or an intelligence agency. It’s clearly someone interested in profit off of this data,” he said.
Joris Evers, spokesman for McAfee, said individuals as well as companies should be on the lookout for tricks. Addresses gathered from Epsilon, he said, could be a treasure trove for cyberattackers who could use the information to trick unsuspecting individuals out of more valuable information such as credit card numbers and home addresses.
Editing by Ros Krasny and Steve Orlofsky