IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

The fallout from the Epsilon breach

The Epsilon breach took place late last month, but the ramifications could be serious. Tom Brewster looks at what the consequences could be...

From there, even more data can be acquired to garner what the target is interested in or where they work. Then, with a specially crafted email, the customer could be convinced to download a malicious file handing their control over to a hacker.

Such a process has been used in various attacks in recent times. RSA was one notable recent victim of a spear phishing attack.

"The illicitly extracted information from Epsilon, or from any

other company that stores and processes personal data, is very valuable, even though it may not seem much for the untrained eye," Catalin Cosoi, head of online threats lab at BitDefender, told IT PRO.

What makes the Epsilon breach that bit more significant is the number of people who could have been hit.

"We are seeing these [emails] sent to Europeans as well as American citizens," said Carl Leonard, senior manager for security research at Websense.

"Some reports are saying millions of people had their details on the lists that were stolen - that is a lot of people who are now more vulnerable to spam, social engineering attacks targeted to their email address, and of course the subscribers have also experienced a loss of privacy."

The impact on Epsilon

Whatever happens to users, Epsilon will be deeply concerned about the impact of the breach on its own business.

You have to wonder if some of its numerous big-name customers the firm has around 2,500 large companies as clients have sent strongly worded-letters venting their fury at the breach.

"It's not just the reputation of Epsilon that has been negatively impacted but the reputation of the high profile global corporations who have now had to advise their customers that the data breach occurred," Leonard noted.

Cosoi said it would take "some efforts to regain customers' trust," but what if it emerges the breach was worse than first thought? Often, the true connotations of a compromise only become clear in the ensuing weeks and months.

So far, the firms involved have stated only emails and names were leaked.

"If later it becomes apparent that additional pieces of data were also extracted from their networks, this could further erode the trust that clients place in the business," Leonard added.

Epsilon and its clients may also face investigations from regulators on both sides of the pond, including the Information Commissioner's Office (ICO) in the UK.

Of course, time could be a healer for Epsilon and if all keeps quiet for a while, the firm may recover without too much difficulty.

Featured Resources

The state of Salesforce: Future of business

Three articles that look forward into the changing state of Salesforce and the future of business

Free Download

The mighty struggle to migrate SAP to the cloud may be over

A simplified and unified approach to delivering Enterprise Transformation in the cloud

Free Download

The business value of the transformative mainframe

Modernising on the mainframe

Free Download

The Total Economic Impact™ Of IBM FlashSystem

Cost savings and business benefits enabled by FlashSystem

Free Download

Most Popular

How to boot Windows 11 in Safe Mode
Microsoft Windows

How to boot Windows 11 in Safe Mode

29 Jul 2022
Samsung proposes 11 Texas semiconductor plants worth $191 billion
Hardware

Samsung proposes 11 Texas semiconductor plants worth $191 billion

21 Jul 2022
Should you take your password manager off the internet?
Sponsored

Should you take your password manager off the internet?

28 Jul 2022