Skip to product menu
close
  • Recent Launches
    Press Space or Enter to display list of options
EXPLORE ALL PRODUCTS

Recent Launches

New

Payroll software with automated tax payments and filing.

Try now
New

Robotic process automation software to automate high-volume, rule-based tasks.

Try for free
New

Low-code IoT platform and solutions for connected businesses.

Try now
New

Business formation service to launch and grow your businesses.

Try now
New

Privacy-friendly application analytics solution.

Try for free

Sales

 
CRM

Comprehensive CRM platform for customer-facing teams.

CRM
 
Bigin

Simple CRM for small businesses moving from spreadsheets.

Bigin
 
Forms

Build online forms for every business need.

Forms
 
SalesIQ

Live chat app to engage and convert website visitors.

SalesIQ
 
Bookings

Appointment scheduling app for consultations with customers.

Bookings
 
Sign

Digital signature app for businesses.

Sign
 
RouteIQ

Comprehensive sales map visualization and optimal route planning solution.

RouteIQ
 
Thrive

Complete loyalty and affiliate management platform.

Thrive
 
Voice

Cloud Contact Center Software for businesses.

Voice
 
Suites
CRM Plus

Unified platform to deliver top-notch customer experience.

CRM Plus

Marketing

 
Social

All-in-one social media management software.

Social
 
Campaigns

Create, send, and track targeted email campaigns that drive sales.

Campaigns
 
Forms

Build online forms for every business need.

Forms
 
Survey

Design surveys to reach and interact with your audience.

Survey
 
Sites

Online website builder with extensive customisation options.

Sites
 
PageSense

Website conversion optimization and personalisation platform.

PageSense
 
Backstage

End-to-end event management software.

Backstage
 
Webinar

Webinar platform for webcasting online webinars.

Webinar
 
Marketing Automation

All-in-one marketing automation software.

Marketing Automation
 
LandingPage

Smart landing page builder to increase conversion rates

LandingPage
 
Publish

Manage all your local business listings on a single platform.

Publish
 
SalesIQ

Live chat app to engage and convert website visitors.

SalesIQ
 
Sign

Digital signature app for businesses.

Sign
 
Thrive

Complete loyalty and affiliate management platform.

Thrive
 
Voice

Cloud Contact Center Software for businesses.

Voice
 
NEW
LeadChain

Sync, manage, and convert leads across channels seamlessly.

LeadChain
 
NEW
CommunitySpaces

Online community platform for individuals and businesses to grow their network and brand.

CommunitySpaces
 
Suites
Marketing Plus

Unified marketing platform for marketing teams.

Marketing Plus

Commerce and POS

 
Commerce

eCommerce platform to manage and market your online store.

Commerce

Service

 
Desk

Helpdesk software to deliver great customer support.

Desk
 
Assist

Remote support and unattended remote access software.

Assist
 
Lens

Interactive remote assistance software with augmented reality.

Lens
 
FSM

End-to-end field service management platform for service businesses.

FSM
 
SalesIQ

Live chat app to engage and convert website visitors.

SalesIQ
 
Voice

Cloud Contact Center Software for businesses.

Voice
 
NEW
Solo

The all-in-one toolkit for solopreneurs.

Solo
 
Bookings

Appointment scheduling app for consultations with customers.

Bookings
 
Suites
Service Plus

Unified platform for customer service and support teams.

Service Plus

Finance

 
Books

Powerful accounting platform for growing businesses.

Books
 
FREE
Invoice

100% Free invoicing solution.

Invoice
 
Expense

Effortless expense reporting platform.

Expense
 
Inventory

Powerful stock management and inventory control software.

Inventory
 
Billing

End-to-end billing solution for your business.

Billing
 
Checkout

Collect payments online with custom branded pages.

Checkout
 
NEW
Payroll

Payroll software with automated tax payments and filing.

Payroll
 
NEW
Solo

The all-in-one toolkit for solopreneurs.

Solo
 
Practice

Practice management software for accounting firms.

Practice
 
Sign

Digital signature app for businesses.

Sign
 
Commerce

eCommerce platform to manage and market your online store.

Commerce
 
Suites
Finance Plus

All-in-one suite to manage your operations and finances.

Finance Plus

Email and Collaboration

 
Mail

Secure email service for teams of all sizes.

Mail
 
Meeting

Online meeting software for all your video conferencing & webinar needs.

Meeting
 
Writer

Word processor for focused writing and discussions.

Writer
 
Sheet

Spreadsheet software for collaborative teams.

Sheet
 
Show

Create, edit, and share slides with a sleek presentation app.

Show
 
Notebook

Beautiful home for all your notes.

Notebook
 
Cliq

Stay in touch with teams no matter where you are.

Cliq
 
Connect

Employee experience platform to communicate, engage, and build positive employee relations.

Connect
 
Bookings

Appointment scheduling app for consultations with customers.

Bookings
 
TeamInbox

Shared inboxes for teams.

TeamInbox
 
WorkDrive

Online file management for teams.

WorkDrive
 
Sign

Digital signature app for businesses.

Sign
 
Office Suite

Powerful collaborative work platform for teams.

Office Suite
 
Office Integrator

Built in document editors for web apps.

Office Integrator
 
ZeptoMail

Secure and reliable transactional email sending service.

ZeptoMail
 
Calendar

Online business calendar to manage events and schedule appointments.

Calendar
 
Learn

Knowledge and learning management platform.

Learn
 
Voice

Cloud Contact Center Software for businesses.

Voice
 
ToDo

Collaborative task management for individuals and teams.

ToDo
 
Tables

Work management tool to connect people, processes, and information.

Tables
 
FREE
PDF Editor

Collaborative online PDF editing tool.

PDF Editor
 
Suites
Workplace

Application suite built to improve team productivity and collaboration.

Workplace

Human Resources

 
People

Organize, automate, and simplify your HR processes.

People
 
Recruit

Intuitive recruiting platform built to provide hiring solutions.

Recruit
 
Expense

Effortless expense reporting platform.

Expense
 
Workerly

Manage temporary staffing with an employee scheduling solution.

Workerly
 
NEW
Payroll

Payroll software with automated tax payments and filing.

Payroll
 
Shifts

Employee scheduling and time tracking app.

Shifts
 
Sign

Digital signature app for businesses.

Sign
 
Suites
People Plus

Comprehensive HR platform for seamless employee experiences.

People Plus

Security and IT Management

 
Creator

Build custom apps to simplify business processes.

Creator
 
Directory

Workforce identity and access management solution for cloud businesses.

Directory
 
FREE
OneAuth

Secure multi-factor authenticator (MFA) for all your online accounts.

OneAuth
 
Vault

Online password manager for teams.

Vault
 
Catalyst

Pro-code platform to build and deploy your apps.

Catalyst
 
Toolkit

Complete resource for any admin-related lookup queries.

Toolkit
 
Lens

Interactive remote assistance software with augmented reality.

Lens
 
Assist

Remote support and unattended remote access software.

Assist
 
QEngine

Test automation software to build, manage, execute, and report testcases.

QEngine
 
NEW
RPA

Automate manual, tedious, and repetitive tasks easily.

RPA

BI and Analytics

 
Analytics

Modern self-service BI and analytics platform.

Analytics
 
Embedded BI

Embedded analytics and white label BI solutions, tailored for your needs.

Embedded BI
 
DataPrep

AI-powered data preparation service for your data-driven organization.

DataPrep
 
NEW
IoT

Harnessing IoT analytics for real-time operational intelligence.

IoT

Project Management

 
Projects

Manage, track, and collaborate on projects with teams.

Projects
 
Sprints

Planning and tracking tool for scrum teams.

Sprints
 
BugTracker

Automatic bug tracking software for managing bugs.

BugTracker
 
NEW
Solo

The all-in-one toolkit for solopreneurs.

Solo

Developer Platforms

 
Creator

Build custom apps to simplify business processes.

Creator
 
Flow

Automate business workflows by creating smart integrations.

Flow
 
Catalyst

Pro-code platform to build and deploy your apps.

Catalyst
 
Office Integrator

Built in document editors for web apps.

Office Integrator
 
ZeptoMail

Secure and reliable transactional email sending service.

ZeptoMail
 
QEngine

Test automation software to build, manage, execute, and report testcases.

QEngine
 
Tables

Work management tool to connect people, processes, and information.

Tables
 
NEW
RPA

Automate manual, tedious, and repetitive tasks easily.

RPA
 
NEW
Apptics

Application analytics for all apps.

Apptics
 
Embedded BI

Embedded analytics and white label BI solutions, tailored for your needs.

Embedded BI
 
NEW
IoT

Build, deploy, and scale IoT solutions for connected businesses.

IoT
 
DataPrep

AI-powered data preparation service for your data-driven organization.

DataPrep

IoT

 
NEW
IoT

Low-code IoT platform and solutions for connected businesses.

IoT

Search Result

 
CRM Plus

Unified platform to deliver top-notch customer experience.

Try now
CRM Plus
 
Service Plus

Unified platform for customer service and support teams.

Try now
Service Plus
 
Finance Plus

All-in-one suite to manage your operations and finances.

Try now
Finance Plus
 
People Plus

Comprehensive HR platform for seamless employee experiences.

Try now
People Plus
 
Workplace

Application suite built to improve team productivity and collaboration.

Try now
Workplace
 
Marketing Plus

Unified marketing platform for marketing teams.

Try now
Marketing Plus
 
All-in-one suite

Zoho One

The Operating System for Business

Run your entire business on Zoho with our unified cloud software, designed to help you break down silos between departments and increase organizational efficiency.

TRY ZOHO ONE
Zoho One
Zoho Marketplace

With over 2000 ready-to-use extensions across 40+ categories, connect your favorite business tools with the Zoho products you already use.

EXPLORE MARKETPLACE
Marketplace
Skip to main content
  • HOME
  • Email
  • Email breach chronicles: Lessons learned from customer support email security incidents​

Email breach chronicles: Lessons learned from customer support email security incidents​

  • Published : November 28, 2023
  • Last Updated : November 28, 2023
  • 360 Views
  • 9 Min Read

Customer trust is crucial to a company's success, and security breaches and data theft can ruin years of painstakingly built confidence in an instant. Typically, numerous departments inside and outside an organization are involved in the safe storage, handling, and dissemination of customer information. Nevertheless, customer service teams are particularly vulnerable to information security breaches.

Customer service teams serve as the virtual front door for the majority of online firms. Customer care representatives detest hearing that their customers' accounts have been compromised. With so many online customer service departments, rising security issues have become a significant issue.

Support personnel are an enticing target for attackers seeking to steal sensitive data or extort money. They generally have access to sensitive information and high levels of trust, making them an appealing target for hackers. Support teams are frequently under pressure to respond swiftly to emails in order to fulfill deadlines and maintain customer satisfaction.

In this article, we’ll explore three email security incidents involving customer support teams and attempt to understand why support teams are vulnerable to email compromise and how to protect customer-facing teams from these types of attacks. 

Lessons learned from customer support email security incidents

Malicious attachments in support tickets

Malicious attachments in support requests can constitute a significant security risk to a company. These attachments may contain viruses, malware, or other forms of malicious software that compromise computer or network security. Additionally, they can be used to steal valuable information or initiate attacks against other systems.

As support teams interact with external entities such as customers, partners, and end users, they’re escalating more and more issues to the security operations center team. As more harmful attachments are being sent with support tickets, concern among support teams across enterprises has grown.

Support tickets can be hacked in numerous ways. Phishing attacks use a fake support request to deceive victims into opening a malicious attachment. Attackers also use hacked accounts to transmit harmful attachments through support tickets.

In recent times, malware (e.g., viruses) has shifted from being identified by antivirus and security controls to escaping antivirus and security controls.

Case 1: Support tickets with suspicious attachments

Attackers may send fake support tickets that appear legitimate but contain links or attachments that lead to phishing scams or malware downloads. These attachments have valid names and appear to be genuine client attachments; opening the HTML typically opens an HTML page. 

This document-based macro malware remains dormant to avoid detection by sandbox test environments and virtual machines. It drops a password-protected zip attachment that’s unnoticed by antivirus software (contents zipped with password-protected, ISO, or IMG files aren’t detected by antivirus because they don’t read the contents inside them). The attachment contains a Base64-encoded zip file within the HTML.

When the victim opens the attached zip file with the password displayed on the HTML page, an ISO file with the actual payload is present inside the zip. Once the ISO is mounted, the ISO mount point contains an INK file that resembles a folder icon. When the folder icon is clicked, the payload is executed, and the attacker now has access to the computer and can copy files and cookies, steal passwords, transfer configuration data to a remote site, and more. 

Some of the more sophisticated variants of the virus are also capable of querying the MaxMind IP database for information on the network, task counts, task names, and recent file counts in order to determine whether or not the program is being executed in a sandbox or is being analyzed.

Steps to control threats from malicious attachments in support requests

  • Support agents should be trained to spot hazardous social engineering emails or papers, much like phishing emails. Teach customer support personnel not to open macros or embedded documents and to only open attachments when indicated in the email and the client says the document is part of their troubleshooting process.
  • Admins should update email and help desk spam filters to detect HTML, zip, and obfuscated Javascript malware attachments. The team should update the antivirus and endpoint and detection response systems and ensure all endpoints have active antivirus agents.
  • The customer support team should implement a web-based portal so users can enter data, upload photographs, and convert files. The conversion software removes unnecessary and hazardous content from Word and JPG files.
  • Most customer support agents can be advised to use secure programs and (Linux) systems to enhance security, and their PCs can use a sandbox or virtual machine for opening files from untrusted sources to limit malicious files. 

Compromised transactional and operational emails

Operational emails are automatically triggered by the system and configured by the internal teams such as support, IT operations, and security. These emails include alerts, notifications, or guidelines to the end users, e.g., the emails that are triggered to the delivery stakeholders when a service request is raised, or emails to the end user when critical patches or updates are deployed, or alerts when an internal service or application is undergoing maintenance, and so on. These emails are essential for end users and teams so that they can plan workarounds. 

Transactional emails are a subset of the operational emails that have a very pertinent role (i.e., start, confirm, facilitate, and finish transactions) and are delivered to customers and employees as a result of their activity on their account or a transaction with a business.
These operational emails are central to the day-to-day operations of the support and service teams. Teams rely on SMTP or API-based email providers that they integrate with or build into their systems (i.e., help desk and workflow tools). The transactional email solutions come with numerous features, such as automation, templates, A/B testing, and more, to ensure optimal delivery of their transactional emails. 

These automated emails (i.e., operational/transactional emails) often fall prey to social engineering attacks where they’re used to trick individuals into giving away sensitive information or performing a certain action, such as clicking on a link or downloading a file. 

For example, a hacker may send a false transactional email posing as a bank or financial institution, demanding account details or login passwords. The email may seem urgent, threatening account closure if the receiver doesn't comply. This can deceive the recipient into revealing critical information or making an uncharacteristic decision.

Case 2: Transactional mail account credentials changed over an email ticket 

This case is based on the ChunkHost incident in 2014, where attackers used social engineering techniques to trick the support teams of transactional email providers into changing account credentials (i.e., the email address) on the account, which is against normal policy. This was done either over the phone or by submitting a support ticket. 

Policy dictated that the vendor should never modify a user's account credentials or email address, particularly via chat or email ticket. They must offer the user the necessary self-service links or instructions via a portal that can only be accessed with valid credentials.

The hacker set up a company.info domain and asked the vendor support team to update the email address to support@company.info. The previous email address was support@company.com. Convinced by the explanation, the vendor support team processed the request without conducting further investigation. 

The hacker enabled the transactional mail feature that allows users to blind carbon copy every outgoing transactional support email to a distinct email account. After activating that option, they immediately began the process of resetting the passwords for the accounts they were after. The email to reset the password was sent to the customer by the support team, but it was also copied and sent to the attacker. Because they had access to the password reset link, they were able to alter the password and access the accounts of the customers. 

Steps to protect against social engineering attacks through transactional emails

  • Educate the support staff on the strategies and techniques employed in social engineering attacks, particularly those that can be carried out via operational/transactional emails. This includes understanding how attackers may manipulate employees through urgency, authority, and other psychological factors.
  • Implement authentication methods, such as two-factor authentication or digital signatures, for support admins to access the transactional email provider tools or admin consoles.  
  • Review and revise the company's rules and processes regarding transactional emails and social engineering attacks on a regular basis. Provide team members with continual training and reminders on how to spot and prevent social engineering assaults via transactional emails.
  • Ensure that support teams adhere to predefined policies when it comes to service requests pertaining to account credentials. 
  • Establish processes for end users to verify and authenticate transactional emails, such as contacting the sender directly or confirming requests via a secure channel.
  • Product and IT teams should ensure that SPF, DKIM, and DMARC standards are in place within the email service and integrated with the SaaS systems to ensure that transactional and automated emails aren't faked or altered during transit, and they should monitor and report any concerns. This protects the SaaS tool's reputation and users' sensitive data.
  • Educate the end users and customers to be cautious when responding to emails that contain urgent or time-sensitive requests. If an email seems suspicious, encourage team members to seek confirmation from a trusted colleague or supervisor before acting on the request.

Case 3: Phishing attempt against the support staff

Phishing is one of the most popular security attacks against support personnel. This involves sending false emails that look like they originate from a legitimate source, frequently using recognized logos or language to deceive the receiver into divulging sensitive information, such as login credentials or financial data.

Support personnel are susceptible to spear phishing because they routinely handle sensitive customer data and engage with clients through email and other online channels. This makes them a prime target for attackers who want to acquire access to sensitive data or assume the identity of a support team member in order to win credibility with customers.

To earn the support team member's trust, the attacker may masquerade as a coworker, customer, or even a corporate executive. They may also adapt the message to the specific responsibilities of the support team, increasing the likelihood that the team member may fall for the attack.

In September 2020, attackers initiated a spear-phishing attempt against the support staff of a financial institution by sending them cleverly prepared emails that appeared to originate from legitimate sources. These emails contained links or attachments that, when clicked or opened, installed malware on the receivers’ devices. This malware would grant access to the victims' login credentials and any sensitive data stored on their devices. The attackers would then use this information to obtain unauthorized access to the financial institution’s systems, potentially stealing critical data or disrupting operations. The spear-phishing attempt was likely successful because of the targeted nature of the emails and the support crew's belief in the emails' apparent legitimacy.

Steps for customer service and support teams to protect themselves from phishing attempts

  • Use email filtering software. Email filtering software can help staff discover and prevent phishing emails. It can also alert employees to emails that may be questionable.
  • Consider adopting secure messaging services for customer communications to avoid transmitting critical information via unprotected networks.
  • Regularly update software and security protocols. To protect against the most recent attacks, it’s essential to keep all software and security protocols up-to-date. This involves updating antivirus software, firewall configurations, and password protocols.
  • Use strong, unique passwords. Strong, unique passwords should be used for all accounts, including company email and customer support platforms. This makes it more difficult for hackers to crack or guess passwords.
  • Enable two-factor authentication. This might be a code sent to a mobile device or an authentication application.
  • It’s essential to educate staff about phishing scams so they can recognize and prevent them. This may involve training on popular techniques and warning signs, as well as periodic phishing simulations to evaluate employee awareness.

Wrapping up

Email security incidents involving customer support teams can have serious consequences for both the company and its customers. These incidents can result in the theft of sensitive information, financial loss, and damage to the company's reputation. It’s essential for companies to implement strong security measures and provide regular training to customer support teams to prevent these incidents from occurring. By taking proactive steps to protect customer data, companies can ensure the safety and security of their customers and maintain their trust.


 

This article is co-authored by Sandeep Kotla and Vignesh S.

Sandeep is an accomplished inbound marketer at Zoho Corporation, specializing in digital workplace strategies, digital transformation initiatives, and enhancing employee experiences. Previously, he handled analyst relations and corporate marketing for Manage Engine (a division of Zoho Corp) and its suite of IT management products. He currently spends most of his time re-imagining and writing about how work gets done in large organizations, reading numerous newsletters, and Marie Kondo-ing his inbox.

Vignesh works as a Marketing Analyst at Zoho Corporation, specializing in content initiatives and digital workplace strategies. He's a passionate creator with a penchant for marketing and growth. In his free time, you can see him shuffling between books, movies, music, sports, and traveling, not necessarily in the same order.

Leave a Reply

Your email address will not be published. Required fields are marked

The comment language code.
By submitting this form, you agree to the processing of personal data according to our Privacy Policy.

You may also like