{"id":19177,"date":"2021-09-03T18:42:37","date_gmt":"2021-09-03T18:42:37","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=19177"},"modified":"2021-09-03T19:09:12","modified_gmt":"2021-09-03T19:09:12","slug":"salesforce-email-service-used-for-phishing-campaign","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/threats\/salesforce-email-service-used-for-phishing-campaign\/","title":{"rendered":"Salesforce Email Service Used for Phishing Campaign"},"content":{"rendered":"<p>Cybercriminals are using Salesforce\u2019s mass email service to dupe people into handing over credit card numbers, credentials and other personal information in a novel <a href=\"https:\/\/www.esecurityplanet.com\/threats\/social-engineering-attacks\/\">phishing<\/a> campaign that highlights the threats to corporate networks that can come from <a href=\"https:\/\/www.esecurityplanet.com\/applications\/whitelisting-vs-blacklisting-which-is-better\/\">whitelisted<\/a> email addresses.<\/p>\n<p>According to a recent <a href=\"https:\/\/perception-point.io\/attackers-are-using-salesforces-mass-email-service-to-perpetrate-phishing-attacks\/\">blog post<\/a> from email security service provider Perception Point, the bad actors are sending phishing emails via the Salesforce email service by impersonating the Israel Postal Service in a campaign that has targeted multiple Israeli organizations.<\/p>\n<p>In the blog post, Perception Point cybersecurity analysts Miri Slavoutsky and Shai Golderman\u00a0wrote that this is the first time they had seen attackers abuse Salesforce services for malicious purposes.<\/p>\n<p>\u201cMass Email gives users the option to send an individual, personalized email to each recipient, thus creating the perception of receiving a unique email, created especially for you,\u201d Slavoutsky and Golderman\u00a0wrote. \u201c<a href=\"https:\/\/www.esecurityplanet.com\/threats\/email-spoofing\/\">Spoofing<\/a> attempts of Salesforce are nothing new to us. Attackers spoof emails from Salesforce for credential theft, is a typical example. In this case, the attackers actually purchased and abused the service; knowing that most companies use this service as part of their business, and therefore have it whitelisted and even allowed in their <a href=\"https:\/\/www.esecurityplanet.com\/applications\/how-to-set-up-and-implement-dmarc-email-security\/\">SPF records<\/a>.\u201d<\/p>\n<h2>Whitelisting Increases Vulnerability<\/h2>\n<p>Therein lies a key issue raised by the phishing campaign. Most email security services are unable to detect attacks using Salesforce\u2019s legitimate platform because they \u201cblindly trust that Salesforce is a safe source,\u201d even to the point of whitelisting the service\u2019s IP addresses to streamline the email process, they wrote.<\/p>\n<p>\u201cWhile Salesforce\u2019s recommendation is to whitelist their entire IP range, this creates a vulnerability in your company\u2019s network,\u201d the Perception Point analysts wrote. \u201cCreating this type of whitelist is essentially ignoring the fact that the platform might be used for malicious purposes. By creating such a whitelist, one is basically creating a hole in one\u2019s organizational security that such emails can sail straight through.\u00a0When users receive such emails, they are unable to distinguish that the email was sent via a Mass Email platform.\u201d<\/p>\n<p>Shlomi Levin, Perception Point\u2019s co-founder and CTO, told <em>eSecurity Planet<\/em> that given how whitelisting a trusted source can result in security breaches, \u201cit is essential to employ a <a href=\"https:\/\/www.esecurityplanet.com\/trends\/zero-trust-challenges\/\">zero-trust<\/a> attitude combined with a strong filtering mechanism to any content that enters the organization no matter the source: email, collaboration tools or Instant Messaging.\u201d<\/p>\n<h2>Spoofing Salesforce<\/h2>\n<p>In this case, bad actors sent the victims email via the Salesforce email service purportedly from the Israeli Postal Service, telling the recipient that a package had been held up because the shipping fees hadn\u2019t been paid. The email was sent from what Perception Point said is the standard sender of all salesforce.com emails.<\/p>\n<p>The phishing email contains a link automatically redirecting the victim to a spoofed website of the Israeli Postal Service that prompts the user to enter credit card details. The user is then redirected to another page, which requires verification through an SMS code.<\/p>\n<p>The Perception Point analysts said the attackers made an effort to prove the legitimacy of the emails, an indication of how far they will go to convince victims to give up their information and how easy it is to do just that. Researchers found that the malicious server running the website was accessible without any authentication and was developed and hosted by LiteSpeed Web Server. In addition, the site has a certificate issued to it.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-large wp-image-19179\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2021\/09\/Salesforce-phishing-1024x716.png\" alt=\"Salesforce phishing\" width=\"696\" height=\"487\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/09\/Salesforce-phishing-1024x716.png 1024w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/09\/Salesforce-phishing-300x210.png 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/09\/Salesforce-phishing-768x537.png 768w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/09\/Salesforce-phishing-150x105.png 150w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/09\/Salesforce-phishing-696x487.png 696w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/09\/Salesforce-phishing-1068x747.png 1068w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/09\/Salesforce-phishing.png 1080w\" sizes=\"(max-width: 696px) 100vw, 696px\" \/><\/p>\n<h2>Use of Legitimate Email Services<\/h2>\n<p>The use of Salesforce\u2019s email service is akin to a phishing campaign run by Nobelium, the Russia-based cybercrime group (also known as APT29 and CozyBear) behind the high-profile <a href=\"https:\/\/www.esecurityplanet.com\/threats\/guarding-against-solorigate-ttps-solarwinds-hack\/\">SolarWinds supply chain breach<\/a>, according to Saumitra Das, CTO of cybersecurity firm Blue Hexagon. In the latest <a href=\"https:\/\/www.esecurityplanet.com\/threats\/phishing-attacks\/\">Nobelium phishing campaign<\/a> reported by Microsoft in May, the group used the legitimate Constant Contact email marketing service.<\/p>\n<p>\u201cThey leveraged a compromised end-user account from Constant Contact, a legitimate email marketing software company, to send phishing emails to more than 7,000 accounts across approximately 350 government organizations, IGOs and NGOs,\u201d Das told <em>eSecurity Planet<\/em>.<\/p>\n<p>He said spoofing usually involves making up a source to look legitimate or using typosquatting.<\/p>\n<p>\u201cThere are ways to detect spoofing but in this case the emails look authentic and are also coming from where they say they are coming from,\u201d Das said, adding that in the case of the Salesforce example, \u201cthis means that attackers have got through the first email firewall both from a <a href=\"https:\/\/www.esecurityplanet.com\/products\/threat-intelligence-platforms\/\">threat intelligence<\/a> signature perspective of blocking known bad sources and also in some sense the instinct of the user themselves to be suspicious of what something is. It is common for attacks to get through email security solutions, but then well-trained or savvy users are the next line of defense. This [use of a legitimate email service] increases the chances of those users also clicking on links or downloading attachments.\u201d<\/p>\n<p>A key difference is that unlike Nobelium with Constant Contact, the attackers using Salesforce\u2019s service didn\u2019t hack into the email system but instead signed up for the service, Stephen Banda, senior manager of security solutions at cybersecurity vendor Lookout, told <em>eSecurity Planet<\/em>.<\/p>\n<p>\u201cThe practice of legitimately signing up for an email service with the full intention of using it for malice is an innovative strategy,\u201d Banda said. \u201cThis breach should be a warning to all service providers to conduct extensive due diligence into who is requesting access to their services so that this type of scam can be avoided in the future.\u201d<\/p>\n<h2>Adopting Zero Trust is Key<\/h2>\n<p>The phishing strategy is another reason for adopting a <a href=\"https:\/\/www.esecurityplanet.com\/networks\/3-tests-to-ensure-zero-trust-network-security\/\">zero-trust architecture<\/a>, which means assuming that an email from outside the organization is malicious until proven otherwise, according to Stefano De Blasi, cyber threat intelligence analyst with digital risk protection company Digital Shadows.<\/p>\n<p>\u201cAlthough more time-consuming than the traditional approach, zero-trust architecture can significantly reduce the potential impact of these malicious mass phishing campaigns and should always be considered the first option when possible,\u201d De Blasi told <em>eSecurity Planet<\/em>.<\/p>\n<p>In addition, along with having in place such standard solutions such as secure email gateways, spam filters and phishing protection, organizations need to invest in <a href=\"https:\/\/www.esecurityplanet.com\/products\/cybersecurity-training\/\">security training<\/a> so employees are more educated of the threats that might come their way, Banda said, adding that phishing simulations are a way to provide training that gives people a safe real-world experience.<\/p>\n<p>\u201cOrganizations also need to have a mobile security solution in place that detects and blocks phishing attacks,\u201d he said. \u201cThe solution should also educate the users on phishing every time a link is detected. Over time, this will raise awareness so that users question even the most effective phishing attack.\u201d<\/p>\n<p>Further reading:<\/p>\n<p><a href=\"https:\/\/www.esecurityplanet.com\/endpoint\/how-dmarc-protects-against-ransomware\/\">How DMARC Can Protect Against Ransomware<\/a><\/p>\n<p><a href=\"https:\/\/www.esecurityplanet.com\/products\/zero-trust-security-solutions\/\">Best Zero Trust Security Solutions<\/a><\/p>\n\n\n<div id=\"ta-campaign-widget-66d6d2d5eac16-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6d2d5eac16\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6d2d5eac16\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6d2d5eac16\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6d2d5eac16\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6d2d5eac16\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6d2d5eac16\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cybercriminals are using Salesforce\u2019s mass email service to dupe people into handing over credit card numbers, credentials and other personal information in a novel phishing campaign that highlights the threats to corporate networks that can come from whitelisted email addresses. According to a recent blog post from email security service provider Perception Point, the bad [&hellip;]<\/p>\n","protected":false},"author":256,"featured_media":19180,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[15],"tags":[2736],"b2b_audience":[33],"b2b_industry":[],"b2b_product":[398,394,31789],"class_list":["post-19177","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threats","tag-phishing","b2b_audience-awareness-and-consideration","b2b_product-anti-spam","b2b_product-email-security","b2b_product-phishing-and-spear-phishing"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Salesforce Email Service Used for Phishing Campaign | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"In a first, attackers are paying for Salesforce to use its email service in phishing attacks and bypass corporate defenses.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/threats\/salesforce-email-service-used-for-phishing-campaign\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Salesforce Email Service Used for Phishing Campaign | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"In a first, attackers are paying for Salesforce to use its email service in phishing attacks and bypass corporate defenses.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/threats\/salesforce-email-service-used-for-phishing-campaign\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2021-09-03T18:42:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-09-03T19:09:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/09\/Salesforce-logo.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"563\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jeff Burt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jeff Burt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/salesforce-email-service-used-for-phishing-campaign\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/salesforce-email-service-used-for-phishing-campaign\/\"},\"author\":{\"name\":\"Jeff Burt\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e\"},\"headline\":\"Salesforce Email Service Used for Phishing Campaign\",\"datePublished\":\"2021-09-03T18:42:37+00:00\",\"dateModified\":\"2021-09-03T19:09:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/salesforce-email-service-used-for-phishing-campaign\/\"},\"wordCount\":1126,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/salesforce-email-service-used-for-phishing-campaign\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/09\/Salesforce-logo.jpg\",\"keywords\":[\"phishing\"],\"articleSection\":[\"Threats\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/salesforce-email-service-used-for-phishing-campaign\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/threats\/salesforce-email-service-used-for-phishing-campaign\/\",\"name\":\"Salesforce Email Service Used for Phishing Campaign | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/salesforce-email-service-used-for-phishing-campaign\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/salesforce-email-service-used-for-phishing-campaign\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/09\/Salesforce-logo.jpg\",\"datePublished\":\"2021-09-03T18:42:37+00:00\",\"dateModified\":\"2021-09-03T19:09:12+00:00\",\"description\":\"In a first, attackers are paying for Salesforce to use its email service in phishing attacks and bypass corporate defenses.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/salesforce-email-service-used-for-phishing-campaign\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/threats\/salesforce-email-service-used-for-phishing-campaign\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/salesforce-email-service-used-for-phishing-campaign\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/09\/Salesforce-logo.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/09\/Salesforce-logo.jpg\",\"width\":1000,\"height\":563,\"caption\":\"Salesforce security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/salesforce-email-service-used-for-phishing-campaign\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Salesforce Email Service Used for Phishing Campaign\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e\",\"name\":\"Jeff Burt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg\",\"caption\":\"Jeff Burt\"},\"description\":\"Jeffrey Burt has been a journalist for more than three decades, the last 20-plus years covering technology. During more than 16 years with eWEEK, he covered everything from data center infrastructure and collaboration technology to AI, cloud, quantum computing and cybersecurity. A freelance journalist since 2017, his articles have appeared on such sites as eWEEK, eSecurity Planet, Enterprise Networking Planet, Enterprise Storage Forum, The Next Platform, ITPro Today, Channel Futures, Channelnomics, SecurityNow, and Data Breach Today.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/jburt\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Salesforce Email Service Used for Phishing Campaign | eSecurity Planet","description":"In a first, attackers are paying for Salesforce to use its email service in phishing attacks and bypass corporate defenses.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/threats\/salesforce-email-service-used-for-phishing-campaign\/","og_locale":"en_US","og_type":"article","og_title":"Salesforce Email Service Used for Phishing Campaign | eSecurity Planet","og_description":"In a first, attackers are paying for Salesforce to use its email service in phishing attacks and bypass corporate defenses.","og_url":"https:\/\/www.esecurityplanet.com\/threats\/salesforce-email-service-used-for-phishing-campaign\/","og_site_name":"eSecurity Planet","article_published_time":"2021-09-03T18:42:37+00:00","article_modified_time":"2021-09-03T19:09:12+00:00","og_image":[{"width":1000,"height":563,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/09\/Salesforce-logo.jpg","type":"image\/jpeg"}],"author":"Jeff Burt","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Jeff Burt","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/threats\/salesforce-email-service-used-for-phishing-campaign\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/salesforce-email-service-used-for-phishing-campaign\/"},"author":{"name":"Jeff Burt","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e"},"headline":"Salesforce Email Service Used for Phishing Campaign","datePublished":"2021-09-03T18:42:37+00:00","dateModified":"2021-09-03T19:09:12+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/salesforce-email-service-used-for-phishing-campaign\/"},"wordCount":1126,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/salesforce-email-service-used-for-phishing-campaign\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/09\/Salesforce-logo.jpg","keywords":["phishing"],"articleSection":["Threats"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/threats\/salesforce-email-service-used-for-phishing-campaign\/","url":"https:\/\/www.esecurityplanet.com\/threats\/salesforce-email-service-used-for-phishing-campaign\/","name":"Salesforce Email Service Used for Phishing Campaign | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/salesforce-email-service-used-for-phishing-campaign\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/salesforce-email-service-used-for-phishing-campaign\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/09\/Salesforce-logo.jpg","datePublished":"2021-09-03T18:42:37+00:00","dateModified":"2021-09-03T19:09:12+00:00","description":"In a first, attackers are paying for Salesforce to use its email service in phishing attacks and bypass corporate defenses.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/salesforce-email-service-used-for-phishing-campaign\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/threats\/salesforce-email-service-used-for-phishing-campaign\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/threats\/salesforce-email-service-used-for-phishing-campaign\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/09\/Salesforce-logo.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/09\/Salesforce-logo.jpg","width":1000,"height":563,"caption":"Salesforce security"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/threats\/salesforce-email-service-used-for-phishing-campaign\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Salesforce Email Service Used for Phishing Campaign"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e","name":"Jeff Burt","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg","caption":"Jeff Burt"},"description":"Jeffrey Burt has been a journalist for more than three decades, the last 20-plus years covering technology. During more than 16 years with eWEEK, he covered everything from data center infrastructure and collaboration technology to AI, cloud, quantum computing and cybersecurity. A freelance journalist since 2017, his articles have appeared on such sites as eWEEK, eSecurity Planet, Enterprise Networking Planet, Enterprise Storage Forum, The Next Platform, ITPro Today, Channel Futures, Channelnomics, SecurityNow, and Data Breach Today.","url":"https:\/\/www.esecurityplanet.com\/author\/jburt\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/19177"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/256"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=19177"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/19177\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/19180"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=19177"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=19177"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=19177"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=19177"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=19177"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=19177"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}