Epsilon may have been tipped off that it was a target

Share this article:

The longtime partner of email marketing services provider Epsilon apparently warned the company last fall that it could be targeted by malware attacks.

In a Nov. 24 note sent by Return Path, which makes email monitoring tools for marketers, Neil Schwartzman, senior director of security strategy, warned of an ongoing "spear phishing campaign" against firms like Epsilon that had the "tremendous potential to damage corporate security."

"Over the course of the past five weeks, spam campaigns have been aimed at the staff members of over 100 ESPs (email service providers) and gambling sites," Schwartzman wrote. "These targets have received emails typically with content that mentions the staffer by name, and purports to be from a couple, presumably friends or co-workers." 

It is not clear if the campaign Schwartzman references is what led to the breach of Epsilon, which resulted in the theft of names and email addresses belonging to millions of customers. An estimated 60 Epsilon corporate clients were affected and forced to notify the victims.

Jessica Simon, spokeswoman for Epsilon, did not respond to a phone call seeking comment on Friday.

Epsilon, one of the world's largest email marketers, released a second statement on Thursday to remind victims that no personally identifiable information, such as credit card or Social Security numbers, were taken in the heist.

Meanwhile, Sen. Al Franken, D-Minn., chairman of the Senate Judiciary Committee's new privacy panel, and Sen. Richard Blumenthal, D-Conn., are among lawmakers investigating.

And the Better Business Bureau warned Thursday that one of the first phishing scams to result from the breach -- targeting customers of Chase Bank, one of the Epsilon clients -- is making the rounds.

Epsilon and Return Path have been partners since at least 2002.

Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

More in News

CryptoWall surpasses CryptoLocker in infection rates

CryptoWall surpasses CryptoLocker in infection rates

A threat analysis from Dell SecureWorks CTU says that CryptoWall has picked up where its famous sibling left off.

Professor says Google search, not hacking, yielded medical info

Professor says Google search, not hacking, yielded medical ...

A professor of ethical hacking at City College San Francisco came forward to clarify that he did not demonstrate hacking a medical center's server in a class.

Syrian Malware Team makes use of enhanced BlackWorm RAT

Syrian Malware Team makes use of enhanced BlackWorm ...

FireEye analyzed the hacking group's use of the malware, dubbed the "Dark Edition" of BlackWorm.