Miscreants have forged a variant of the infamous ZeuS banking Trojan that targets enterprise data held by clients of CRM giant Salesforce.com. The ZeuS variant does not exploit a vulnerability in the Salesforce.com platform itself but rather penetrates the insecure devices of corporate workers accessing Salesforce.com. The …
While the press will blame the companies, it's the humans that are the weak link
"The ZeuS variant does not exploit a vulnerability in the Salesforce.com platform itself but rather penetrates the insecure devices of corporate workers accessing Salesforce.com."
Standard stuff -- why sweat over trying to brreak in through the front door when there is always someone leaving a window open somewhere for you. 'I only had a fag in the bathroom -I was sure I shut the window'.
I really hope they don't make machines to behave like humans -- we're buggered if they do.
If it's not on your servers
Then it's not your data.
In this case it seams to be use the cloud and kiss any policies you have set for your companies computers good by.
Any sensible admin would have set up the corporate network to have blocked this users laptop from connecting due to the expired virus scanner. How are you supposed to do the same for your cloud service?
Re: If it's not on your servers
>How are you supposed to do the same for your cloud service?
In some cases SaaS can be treated like an internal service so users have to go through your security checks; although not all SaaS providers will limit access to your user accounts to connections via your IP-sec connection.
The real challenge is where companies (typically smaller businesses) have swallowed the cloud model and permit full direct access to SaaS from uncontrolled client systems. So whilst this isn't strictly an exploit of a Salesforce.com vulnerability, it is an exploit of Salesforce.com and other SaaS providers current approach to access security.
A natural progression...
With all the focus on banking sites, it was just going to be a matter of time before other uses for ZeuS were found.
The Adallom blog is a good write up and indicates the security headaches associated with SaaS.
Windows XP home laptop (running an old version of Internet Explorer, and an expired security scanner software) was behind the problem.
Welcome to BYOD.
- Analysis iPhone 6: The final straw for Android makers eaten alive by the data parasite?
- First Crack Man buys iPHONE 6 and DROPS IT to SMASH on PURPOSE
- First Fondle Reg journo battles Sydney iPHONE queue, FONDLES BIG 'UN
- TOR users become FBI's No.1 hacking target after legal power grab
- Vid Reg bloke zips through an iPHONE 6 queue from ZERO to 60 SECONDS