customers victimized by phishing scheme

Share this content

Customer Relationship Management software vender has sent a letter to its customers, warning that they may be the targets of malicious software or phishing scams, after one of its employees received a phishing e-mail message and was tricked into divulging a corporate password.

In addition to obtaining the employee's password, the scammer was able to download a copy of a customer contact list from the unsuspecting employee. The list included customer first and last names, company names, e-mail addresses, telephone numbers, and other data.

"As a result of this, a small number of our customers began receiving bogus e-mails that looked like invoices," said in a statement. reports that some of's customers have fallen victim to the scam and have provide3d their passwords to the criminals as well. When started seeing malicious software being attached to these e-mails, the company decided to issue a general alert to its nearly 1 million subscribers.

In the letter that sent to its customers, the company noted that online criminals have been sending customers fake invoices, viruses, and key logging software. The e-mails were sent using information that was illegally obtained from has reported the phishing crime to law enforcement officials and is recommending that customers implement a number of security measures to protect themselves and their data. suggests that its users follow these steps to implement and insure security:

  • Modify your Salesforce implementation to activate IP range restrictions. This will allow users to access Salesforce only from your corporate network or VPN, thus providing a second factor of authentication.

  • Educate your employees not to open suspect e-mails and to be vigilant in guarding against phishing attempts.

  • Use security solutions from leading vendors such as Symantec to deploy spam filtering and malware protection.

  • Designate a security contact within your organization so that can more effectively communicate with you. Contact your representative with this information.

  • Consider using other two-factor authentication techniques including RSA tokens and others.

  • Attend an educational Webinar presentation in which our experts will walk you through these recommended changes and best practices. Visit for details.

    You can read the letter that sent to its to users.


    Please login or register to join the discussion.

    There are currently no replies, be the first to post a reply.