back to article ZeuS KICKS that SaaS: Trojan raids Salesforce.com accounts

Miscreants have forged a variant of the infamous ZeuS banking Trojan that targets enterprise data held by clients of CRM giant Salesforce.com. The ZeuS variant does not exploit a vulnerability in the Salesforce.com platform itself but rather penetrates the insecure devices of corporate workers accessing Salesforce.com. The …

COMMENTS

This topic is closed for new posts.
  1. Elmer Phud

    While the press will blame the companies, it's the humans that are the weak link

    "The ZeuS variant does not exploit a vulnerability in the Salesforce.com platform itself but rather penetrates the insecure devices of corporate workers accessing Salesforce.com."

    Standard stuff -- why sweat over trying to brreak in through the front door when there is always someone leaving a window open somewhere for you. 'I only had a fag in the bathroom -I was sure I shut the window'.

    I really hope they don't make machines to behave like humans -- we're buggered if they do.

  2. John G Imrie

    If it's not on your servers

    Then it's not your data.

    In this case it seams to be use the cloud and kiss any policies you have set for your companies computers good by.

    Any sensible admin would have set up the corporate network to have blocked this users laptop from connecting due to the expired virus scanner. How are you supposed to do the same for your cloud service?

    1. Roland6 Silver badge

      Re: If it's not on your servers

      >How are you supposed to do the same for your cloud service?

      In some cases SaaS can be treated like an internal service so users have to go through your security checks; although not all SaaS providers will limit access to your user accounts to connections via your IP-sec connection.

      The real challenge is where companies (typically smaller businesses) have swallowed the cloud model and permit full direct access to SaaS from uncontrolled client systems. So whilst this isn't strictly an exploit of a Salesforce.com vulnerability, it is an exploit of Salesforce.com and other SaaS providers current approach to access security.

  3. Roland6 Silver badge

    A natural progression...

    With all the focus on banking sites, it was just going to be a matter of time before other uses for ZeuS were found.

    The Adallom blog is a good write up and indicates the security headaches associated with SaaS.

  4. Anonymous Coward
    Anonymous Coward

    Windows XP home laptop (running an old version of Internet Explorer, and an expired security scanner software) was behind the problem.

    Welcome to BYOD.

This topic is closed for new posts.

Other stories you might like