Zendesk Exposes 10,000 Accounts to Unknown Third Party
Cloud-based customer service company Zendesk notified customers that account information for 10,000 users was accessed prior to November 2016.
In a note posted Wednesday, Zendesk said email addresses, user names, and phone numbers were accessed for customers and users of its Support and Chat products. Zendesk Support is the company’s customer support ticketing service. Chat is Zendesk’s live messaging service used on websites and mobile devices.
Maarten Van Horenbeeck, chief information security officer of Zendesk said in a statement Wednesday the company became aware of the accessed data on September 24 when a third party notified them of the leak. The bulk of the account data accessed included PII data tied to its Support and Chat service, but also included expired trial accounts and accounts that are no longer active.
The company said for that smaller subset of 700 customers, the unknown third parties accessed Transport Layer Security encryption keys provided to Zendesk by customers along with configuration settings of apps installed from the Zendesk app marketplace or private customer apps.
“This may include integration keys used by those apps to authenticate against third-party services,” wrote Van Horenbeeck.
The company, who counts Airbnb, Stanley Black and Decker and Fossil as customers, said affected users are advised to “rotate all credentials for the respective app” used during the vulnerable time period.
“If you uploaded a TLS certificate to Zendesk prior to November 1st of 2016 which is still valid, we recommend you upload a new certificate, and revoke the old one,” Van Horenbeeck said. “API Tokens in Chat do not need to be rotated.”
He added that there is no indication that other authentication credentials were accessed.
The rotation of credentials will impact a larger group of customers and products that share authentication with the Zendesk Support service. Those include the Guide, Talk and Explore Zendesk products. When users log in to one of the products they will be prompted to reset their passwords.
Additional precautions are being made by Zendesk for its Chat APIs for customers that haven’t changed their password since 2016.
“Note that if you utilize basic authentication into the Zendesk or Chat APIs through your password, you will need to reestablish your connection to those APIs upon changing your password. This password rotation will not impact the use of API or OAuth tokens,” according to the note.
Access of Zendesk data by a third party may also have implications under the General Data Protection Regulation (GDPR). Zendesk is alerting customers they may have to report this incident to their Data Protection Authority (DPA). A DPA is an agency within each European Union country responsible for GDPR assistance and enforcement.
“Zendesk’s customers are the Data Controllers of Service Data, and Zendesk is a Data Processor of that Service Data when it is performing the Zendesk Service. This means that it is up to each customer to determine if it is required under Article 33 of the General Data Protection Regulation 2016/679 (GDPR) to notify its Supervisory Authority, depending on whether the relevant risk thresholds have been met under the GDPR,” according to Zendesk.
Industry: Cyber Security
- CONTRACT SOC Manager. London / Birmingham. URGENT Immediate role.
REF7847 Contract SOC Manager. SC cleared, London / Birmingham. Initial 3 month Contract. SOC Manager needed to for an URGENT 3-4 month CONTRACT. SC clearance is essential. The project is to aid in the setup, implementation and management of resources to help with the initial stand up stages of a new SOC within a greenfield site. This is a short term contract role whilst a permanent hire is brought on over the coming 3 to 4 months. Experience engaging with and managing client stakeholder relationships as well as 3rd party relationships is critical. The role will involve; setting up, implementing and fine tuning the various initial stages of a SOC environment. Experience establishing and building out technical process / operational capability, managing of technical teams (analysts, engineers and architects, creation of policy / playbooks, fine turning is key. SPLUNK is the tooling of choice… Interviewing immediately. Set up a call with me today on https://calendly.com/chris-holt/arranged-call-with-chris-holt-remote-soc-role Direct contact details Chris.Holt@dclsearch.com or 07884666351
- SPLUNK Level 3 SOC Consultant, SIEM Splunk, London / Birmingham
REF CH7825 Level 3 SOC Consultant, SIEM Splunk, London / Birmingham £55,000 + Level 3 SOC Consultant, SIEM SPLUNK needed. Security Clearance. Permanent role Level 3 SOC Consultant, SIEM SPLUNK needed to join a public sector client. The ability to achieve SC clearance is essential. MUST have experience working with SPLUNK ideally to an Advanced Power User level. Splunk Enterprise Security (ES) knowledge and hands on experience highly desirable. The role will include, but not be limited to; managing and handling incidents end to end, supporting and mentoring level 1 / level 2 staff, supporting the SOC manager in the delivery of the SOC roadmap, engaging with the client stakeholders (other technical teams) as and where needed, use case development, advanced search and reporting etc. The individual MUST currently be living in the UK and be able to achieve UK security clearance. (SC) This is a permanent role To arrange a call with Chris Holt use this calendy link https://calendly.com/chris-holt/arranged-call-with-chris-holt-remote-soc-role Chris.Holt@dclsearch.com
- Aspiring Cyber Partner. Business lead, market maker.
Aspiring Cyber Partner (management consultancy) with Cyber specialism into Healthcare, Utilities and or Public Sector. Working with new and existing clients to help them solve, transform or evolve their cyber capabilities. MUST have; A proven management consultancy background in cyber. A history of identifying and closing new business opportunities. Currently Revenue generating / must be able to demonstrate recent wins. Client facing to board level with international businesses. Team leadership / mentoring experience. Extensive cyber industry experience. Digital transformation, Start-up environments etc. Experienced presenter at industry events, to be the public face of a business / capability. Breadth of knowledge across Cyber security. Service definition / creation. Would consider a senior director with experience delivering the above looking to step up. All conversations kept in confidence. To arrange a discreet call book a time to speak in my diary via https://calendly.com/chris-holt/cyber-partner-call Chris.Holt@dclsearch.com
- Internal Security Auditor, Level 1 Service Provider (ISO27001)
- Upto 65,000 plus benefits
Internal Security Auditor ISO 27001, PCI, needed to join a Cyber team within this expanding Fintech business. The Internal Security Auditor will have end to end responsibility for planning, delivering, remediating any findings etc. Experience working within financial services is highly desirable. This Is a great time to join a newly formed and growing Cyber team within a rapidly expanding fintech, that is taking a major share of its market. We are looking for someone with experience, (but not to be limited to) a mix of Information Security standards, frameworks, audit principles, controls / policies and the management and use of the technical tooling etc. ISO 22301, ISO 27001, NIST Cybersecurity Framework etc An ideal candidate will be working within an end user environment with a cyber consultancy background. Experience taking a company through accreditation is highly desirable Experience managing internal stakeholders, technical teams and external third parties essential Flexible working, but with the ability to get into London. This is an exclusive role to DCL Search & Selection.