Epsilon may have been tipped off that it was a target

The longtime partner of email marketing services provider Epsilon apparently warned the company last fall that it could be targeted by malware attacks.

In a Nov. 24 note sent by Return Path, which makes email monitoring tools for marketers, Neil Schwartzman, senior director of security strategy, warned of an ongoing "spear phishing campaign" against firms like Epsilon that had the "tremendous potential to damage corporate security."

"Over the course of the past five weeks, spam campaigns have been aimed at the staff members of over 100 ESPs (email service providers) and gambling sites," Schwartzman wrote. "These targets have received emails typically with content that mentions the staffer by name, and purports to be from a couple, presumably friends or co-workers." 

It is not clear if the campaign Schwartzman references is what led to the breach of Epsilon, which resulted in the theft of names and email addresses belonging to millions of customers. An estimated 60 Epsilon corporate clients were affected and forced to notify the victims.

Jessica Simon, spokeswoman for Epsilon, did not respond to a phone call seeking comment on Friday.

Epsilon, one of the world's largest email marketers, released a second statement on Thursday to remind victims that no personally identifiable information, such as credit card or Social Security numbers, were taken in the heist.

Meanwhile, Sen. Al Franken, D-Minn., chairman of the Senate Judiciary Committee's new privacy panel, and Sen. Richard Blumenthal, D-Conn., are among lawmakers investigating.

And the Better Business Bureau warned Thursday that one of the first phishing scams to result from the breach -- targeting customers of Chase Bank, one of the Epsilon clients -- is making the rounds.

Epsilon and Return Path have been partners since at least 2002.

Sign up to our newsletters

More in News

House Intelligence Committee OKs amended version of controversial CISPA

Despite the 18-to-2 vote in favor of the bill proposal, privacy advocates likely will not be satisfied, considering two key amendments reportedly were shot down.

Judge rules hospital can ask ISP for help in ID'ing alleged hackers

The case stems from two incidents where at least one individual is accused of accessing the hospital's network to spread "defamatory" messages to employees.

Three LulzSec members plead guilty in London

Ryan Ackroyd, 26; Jake Davis, 20; and Mustafa al-Bassam, 18, who was not named until now because of his age, all admitted their involvement in the hacktivist gang's attack spree.