Zendesk Email Bombing: Hackers Abuse Customer Support Platform

Zendesk Security Flaw⁣ Enables ⁢Mass Email Abuse‍ Campaign Targeting Users

SAN FRANCISCO, CA – A critical security vulnerability in the popular customer ​service platform, Zendesk, is allowing cybercriminals to flood targeted email inboxes with malicious messages appearing to originate from legitimate companies. Security researcher Brian ⁣krebs of KrebsOnSecurity was the first to report the widespread abuse, receiving‌ thousands of ⁤threatening and harassing emails seemingly sent ​by a diverse range of Zendesk customers, including major brands like capcom, CompTIA, Discord, GMAC, NordVPN, The Washington Post, and Tinder.

Zendesk provides automated help desk ‌services, streamlining customer support interactions for businesses. Though, the current issue stems from a configuration flaw allowing anonymous users to submit ⁤support requests without email verification. This loophole enables⁤ attackers to leverage Zendesk’s auto-responder feature, sending emails with ⁢customized subject lines – in krebs’​ case, containing false warnings of law enforcement investigations and personal insults – directly from‌ the compromised customer’s email domain.

Crucially, these​ abusive emails aren’t ‍originating from Zendesk itself, but from the email⁢ addresses‌ associated with the affected ⁤businesses, ⁢such as help@washpost.com in the ‌case of The Washington Post (see image below).

[Image of email from The Washington Post as provided in the source]

Zendesk⁣ acknowledged the issue, explaining that some customers intentionally configure their systems to allow⁤ anonymous ticket submissions for business reasons. While the company recommends verifying user ⁢email addresses, it allows for versatility, creating the vulnerability now being exploited.

“These types of support tickets can be part of a customer’s ​workflow, where‍ a prior verification is not required to allow them to engage and make use of the Support capabilities,” stated Carolyn Camoens, communications director at Zendesk. “Though, this method can also be used for spam requests to be created on behalf of third party email addresses…allowing for the ticket notification email to be sent from our customer’s accounts.”

Zendesk ⁣claims to⁣ have rate limits in place⁢ to mitigate high-volume ⁣abuse,but these proved insufficient‌ to prevent the recent‍ attack,which inundated KrebsOnSecurity with thousands of messages in a short period. The company says it​ is indeed actively‍ investigating ‌additional preventative​ measures and advising customers to⁤ implement ⁢authenticated ticket creation workflows.

The Root Cause: Lack of Email Authentication

The core of the problem lies in the failure of Zendesk customers ⁢to validate the email addresses of support⁤ request submitters.While this may simplify the⁣ support​ process, it opens the door for malicious actors to exploit the system and damage the sender’s reputation through disruptive and potentially harmful ⁣email ‍campaigns.

This incident underscores the importance of robust email authentication protocols and highlights the⁤ potential consequences of prioritizing convenience over security in‌ customer service platforms.

You may also like

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.