Miscreants have forged a variant of the infamous ZeuS banking Trojan that targets enterprise data held by clients of CRM giant Salesforce.com. The ZeuS variant does not exploit a vulnerability in the Salesforce.com platform itself but rather penetrates the insecure devices of corporate workers accessing Salesforce.com. The …
While the press will blame the companies, it's the humans that are the weak link
"The ZeuS variant does not exploit a vulnerability in the Salesforce.com platform itself but rather penetrates the insecure devices of corporate workers accessing Salesforce.com."
Standard stuff -- why sweat over trying to brreak in through the front door when there is always someone leaving a window open somewhere for you. 'I only had a fag in the bathroom -I was sure I shut the window'.
I really hope they don't make machines to behave like humans -- we're buggered if they do.
If it's not on your servers
Then it's not your data.
In this case it seams to be use the cloud and kiss any policies you have set for your companies computers good by.
Any sensible admin would have set up the corporate network to have blocked this users laptop from connecting due to the expired virus scanner. How are you supposed to do the same for your cloud service?
Re: If it's not on your servers
>How are you supposed to do the same for your cloud service?
In some cases SaaS can be treated like an internal service so users have to go through your security checks; although not all SaaS providers will limit access to your user accounts to connections via your IP-sec connection.
The real challenge is where companies (typically smaller businesses) have swallowed the cloud model and permit full direct access to SaaS from uncontrolled client systems. So whilst this isn't strictly an exploit of a Salesforce.com vulnerability, it is an exploit of Salesforce.com and other SaaS providers current approach to access security.
A natural progression...
With all the focus on banking sites, it was just going to be a matter of time before other uses for ZeuS were found.
The Adallom blog is a good write up and indicates the security headaches associated with SaaS.
Windows XP home laptop (running an old version of Internet Explorer, and an expired security scanner software) was behind the problem.
Welcome to BYOD.
- Crawling from the Wreckage Want a more fuel efficient car? Then redesign it – here's how
- Apple SILENCES Bose, YANKS headphones from stores
- Flesh-flapping, image-zapping app Snapchat NOW ad-wrapped
- Vid NASA eyeballs SOLAR HEAT BOMBS, MINI-TORNADOES and NANOFLARES on Sun
- TV Review Doctor Who's Flatline: Cool monsters, yes, but utterly limp subplots