{"id":66811,"date":"2025-01-22T15:10:59","date_gmt":"2025-01-22T15:10:59","guid":{"rendered":"https:\/\/www.cxtoday.com\/?p=66811"},"modified":"2025-01-23T14:44:39","modified_gmt":"2025-01-23T14:44:39","slug":"zendesks-saas-solutions-are-being-exploited-by-phishing-pig-butchering-scams","status":"publish","type":"post","link":"https:\/\/www.cxtoday.com\/crm\/zendesks-saas-solutions-are-being-exploited-by-phishing-pig-butchering-scams\/","title":{"rendered":"Zendesk\u2019s Infrastructure Is Being Exploited by Phishing &#038; \u201cPig Butchering\u201d Scams"},"content":{"rendered":"<p><span data-contrast=\"auto\">A new study has claimed that Zendesk\u2019s SaaS infrastructure is being targeted by scammers and hackers. <\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Produced by CloudSek, the study claims that bad actors are using Zendesk\u2019s SaaS free trial offer to imitate genuine brands in an attempt to mislead unsuspecting users.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">In particular, CloudSek believes that the vendor is susceptible to phishing campaigns.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">In a nutshell, attackers are using the free trial to register brand-like subdomains to create convincing interfaces for phishing, data theft, and financial fraud.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Targeted subdomains combine the impersonated brand\u2019s name with numbers to appear legitimate to users.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The report states that there have been several reported cases of Zendesk clients being targeted by suspect domains in the past six months.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">While this is clearly an area of concern for the vendor, CloudSek posits that the fake domains could also be used to deploy &#8220;pig butchering&#8221; scams, as explained by the report author, <\/span>Noel Varghese.<\/p>\n<h2>Pig Butchering<\/h2>\n<p><span data-contrast=\"auto\">Named after the practice of fattening a pig before slaughter, pig butchering scams involve fraudsters building trust with random targets before tricking them into fake investments and disappearing with their money.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">While the report was keen to emphasize that, to the best of the firm\u2019s knowledge,\u00a0Zendesk has not currently been impacted by any scams of this kind, CloudSek believes that the free trial weakness makes the SaaS provider vulnerable. <\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">In exploring the possibility, CloudSek provided a demonstration of how a potential phishing attack targeting XYZ Company could exploit Zendesk as an infrastructure platform and leverage fake domains to propagate pig butchering scams. <\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Below is a brief summary of how the scam could work in practice:<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<ol>\n<li><b><span data-contrast=\"auto\">Zendesk Account Setup:<\/span><\/b><span data-contrast=\"auto\"> The attacker registers a Zendesk account using a subdomain that mimics the target company\u2019s name.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<li><b><span data-contrast=\"auto\">Fake Subdomain Creation:<\/span><\/b><span data-contrast=\"auto\"> Admin access allows the attacker to invite users and send phishing emails disguised as legitimate ticket notifications.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<li><b><span data-contrast=\"auto\">Phishing Setup:<\/span><\/b><span data-contrast=\"auto\"> Invitations include links to phishing pages pretending to be support tickets.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<li><b><span data-contrast=\"auto\">Data Collection:<\/span><\/b><span data-contrast=\"auto\"> Tools like RocketReach help gather employee email addresses, targeting specific users for phishing.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<li><b><span data-contrast=\"auto\">Exploitation:<\/span><\/b><span data-contrast=\"auto\"> Zendesk\u2019s lack of email verification enables attackers to send phishing links to any added email address.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ol>\n<p><span data-contrast=\"auto\">In this hypothetical example, a disposable email address was added as a member to the Zendesk portal, which received a phishing page masquerading as a legitimate support ticket assignment. <\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">This demonstrates how easily Zendesk\u2019s infrastructure can be misused for phishing attacks when proper safeguards are not in place.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h2>Observations and Recommendations <span data-ccp-props=\"{}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">First and foremost, the fact that all\u00a0email correspondence (tickets) from attacker-controlled Zendesk domains lands in the Primary Inbox instead of being marked as spam, poses a significant risk.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">As demonstrated above, this can lead to employees mistaking these phishing campaigns for legitimate communication from their organization.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">In addition, tickets can be assigned to both corporate and non-corporate email accounts without validation, allowing attackers to target anyone with emails from the spoofed Zendesk domain.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">In order to combat this threat, the report recommends the following:<\/span><span data-ccp-props=\"{&quot;335559685&quot;:0}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559682&quot;:2,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Blacklist Unknown Zendesk Instances<\/span><\/b><span data-contrast=\"auto\">: Restrict access to unverified Zendesk login pages to prevent employees from interacting with impersonated company domains.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559682&quot;:2,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Leverage XVigil\u2019s Detection Tools<\/span><\/b><span data-contrast=\"auto\">: Use XVigil\u2019s Fake URLs &amp; Phishing Submodule to identify and alert on suspicious Zendesk subdomains impersonating companies. Proactive monitoring and takedown activities can help prevent incidents.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559682&quot;:2,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Employee Awareness and Training<\/span><\/b><span data-contrast=\"auto\">: Educate employees about phishing tactics and warn them against scams posing as customer support or investment schemes to reduce the risk of successful attacks.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}\">\u00a0<\/span><\/li>\n<\/ul>\n<h2>A Worrying Trend<\/h2>\n<p><span data-contrast=\"auto\">From a customer service and experience perspective, the danger is that scammers could gain unauthorized access to sensitive customer data through fake Zendesk forms or impersonated support agents, which could lead to data breaches and financial losses.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Interestingly, the CloudSek report follows <a href=\"https:\/\/www.cxtoday.com\/crm\/hacker-exposes-zendesk-security-flaw-accesses-confidential-customer-info\/\" target=\"_blank\" rel=\"noopener\">another Zendesk vulnerability<\/a> that was revealed back in October of last year. <\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Exploited by a 15-year-old ethical hacker named Daniel through HackerOne, the weakness allowed him to access multiple customer support tickets and expose sensitive customer data.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The security flaw once again involved Zendesk\u2019s email system, which proved to be\u00a0vulnerable to email spoofing. <\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The simplicity of the exploit is particularly concerning for Zendesk and its users.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Attackers only needed the support email address and a predictable ticket ID to exploit the vulnerability. <\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">By spoofing the original requestor&#8217;s email and copying themselves in, they gained unauthorized access to support tickets.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The lack of spoofing protection allowed attackers to bypass single sign-on security and access sensitive customer information in active support conversations.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">It is important to note once more that there are no reported examples of Zendesk having been targeted by pig butchering. <\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">However, the ethical hacker breach and the report being released in the space of four months outlines a worrying trend that Zendesk will undoubtedly be looking to correct. <\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A new study has claimed that Zendesk\u2019s SaaS infrastructure is being targeted by scammers and hackers. \u00a0 Produced by CloudSek, the study claims that bad actors are using Zendesk\u2019s SaaS free trial offer to imitate genuine brands in an attempt to mislead unsuspecting users.\u00a0 In particular, CloudSek believes that the vendor is susceptible to phishing [&hellip;]<\/p>\n","protected":false},"author":4983,"featured_media":66812,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[61014],"class_list":["post-66811","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-crm","tag-ccaas","brands_to_track-zendesk","editorial_type-news","intent-loyalty"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.3.1 (Yoast SEO v25.3.1) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Zendesk\u2019s Infrastructure Is Being Exploited by Phishing &amp; \u201cPig Butchering\u201d Scams - CX Today<\/title>\n<meta name=\"description\" content=\"CX Today covers CRM &amp; Customer Data Management news including CCaaS and more.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cxtoday.com\/crm\/zendesks-saas-solutions-are-being-exploited-by-phishing-pig-butchering-scams\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Zendesk\u2019s Infrastructure Is Being Exploited by Phishing &amp; \u201cPig Butchering\u201d Scams\" \/>\n<meta property=\"og:description\" content=\"CX Today covers CRM &amp; Customer Data Management news including CCaaS and more.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cxtoday.com\/crm\/zendesks-saas-solutions-are-being-exploited-by-phishing-pig-butchering-scams\/\" \/>\n<meta property=\"og:site_name\" content=\"CX Today\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CXTodayNews\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-22T15:10:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-23T14:44:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cxtoday.com\/wp-content\/uploads\/2025\/01\/Zendesk-phishing-pig-butchering.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"850\" \/>\n\t<meta property=\"og:image:height\" content=\"425\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Rhys Fisher\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@cxtodaynews\" \/>\n<meta name=\"twitter:site\" content=\"@cxtodaynews\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Rhys Fisher\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.cxtoday.com\/crm\/zendesks-saas-solutions-are-being-exploited-by-phishing-pig-butchering-scams\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.cxtoday.com\/crm\/zendesks-saas-solutions-are-being-exploited-by-phishing-pig-butchering-scams\/\"},\"author\":{\"name\":\"Rhys Fisher\",\"@id\":\"https:\/\/www.cxtoday.com\/#\/schema\/person\/8658137cddc02e8aa6da2b92ccf4a044\"},\"headline\":\"Zendesk\u2019s Infrastructure Is Being Exploited by Phishing &#038; \u201cPig Butchering\u201d Scams\",\"datePublished\":\"2025-01-22T15:10:59+00:00\",\"dateModified\":\"2025-01-23T14:44:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.cxtoday.com\/crm\/zendesks-saas-solutions-are-being-exploited-by-phishing-pig-butchering-scams\/\"},\"wordCount\":804,\"publisher\":{\"@id\":\"https:\/\/www.cxtoday.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.cxtoday.com\/crm\/zendesks-saas-solutions-are-being-exploited-by-phishing-pig-butchering-scams\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cxtoday.com\/wp-content\/uploads\/2025\/01\/Zendesk-phishing-pig-butchering.jpg\",\"keywords\":[\"CCaaS\"],\"articleSection\":[\"CRM &amp; Customer Data Management\"],\"inLanguage\":\"en-GB\",\"copyrightYear\":\"2025\",\"copyrightHolder\":{\"@id\":\"https:\/\/www.cxtoday.com\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cxtoday.com\/crm\/zendesks-saas-solutions-are-being-exploited-by-phishing-pig-butchering-scams\/\",\"url\":\"https:\/\/www.cxtoday.com\/crm\/zendesks-saas-solutions-are-being-exploited-by-phishing-pig-butchering-scams\/\",\"name\":\"Zendesk\u2019s Infrastructure Is Being Exploited by Phishing & \u201cPig Butchering\u201d Scams - CX Today\",\"isPartOf\":{\"@id\":\"https:\/\/www.cxtoday.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cxtoday.com\/crm\/zendesks-saas-solutions-are-being-exploited-by-phishing-pig-butchering-scams\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cxtoday.com\/crm\/zendesks-saas-solutions-are-being-exploited-by-phishing-pig-butchering-scams\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cxtoday.com\/wp-content\/uploads\/2025\/01\/Zendesk-phishing-pig-butchering.jpg\",\"datePublished\":\"2025-01-22T15:10:59+00:00\",\"dateModified\":\"2025-01-23T14:44:39+00:00\",\"description\":\"CX Today covers CRM &amp; Customer Data Management news including CCaaS and more.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cxtoday.com\/crm\/zendesks-saas-solutions-are-being-exploited-by-phishing-pig-butchering-scams\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cxtoday.com\/crm\/zendesks-saas-solutions-are-being-exploited-by-phishing-pig-butchering-scams\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.cxtoday.com\/crm\/zendesks-saas-solutions-are-being-exploited-by-phishing-pig-butchering-scams\/#primaryimage\",\"url\":\"https:\/\/www.cxtoday.com\/wp-content\/uploads\/2025\/01\/Zendesk-phishing-pig-butchering.jpg\",\"contentUrl\":\"https:\/\/www.cxtoday.com\/wp-content\/uploads\/2025\/01\/Zendesk-phishing-pig-butchering.jpg\",\"width\":850,\"height\":425,\"caption\":\"Cyber Security Alert: Phishing Email with Hook Icon Illustrating Common Cyber Attack Methods\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cxtoday.com\/crm\/zendesks-saas-solutions-are-being-exploited-by-phishing-pig-butchering-scams\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cxtoday.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CRM &amp; Customer Data Management\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cxtoday.com\/#website\",\"url\":\"https:\/\/www.cxtoday.com\/\",\"name\":\"CX Today\",\"description\":\"Customer Experience Technology News\",\"publisher\":{\"@id\":\"https:\/\/www.cxtoday.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cxtoday.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cxtoday.com\/#organization\",\"name\":\"CX Today\",\"url\":\"https:\/\/www.cxtoday.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.cxtoday.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cxtoday.com\/wp-content\/uploads\/2022\/03\/CX_Today_FullLogo.png\",\"contentUrl\":\"https:\/\/www.cxtoday.com\/wp-content\/uploads\/2022\/03\/CX_Today_FullLogo.png\",\"width\":2606,\"height\":1154,\"caption\":\"CX Today\"},\"image\":{\"@id\":\"https:\/\/www.cxtoday.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CXTodayNews\/\",\"https:\/\/x.com\/cxtodaynews\",\"https:\/\/www.linkedin.com\/company\/69192959\/\",\"https:\/\/www.youtube.com\/channel\/UCZSpkvnZtjGc7UAP1r-MRoA\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.cxtoday.com\/#\/schema\/person\/8658137cddc02e8aa6da2b92ccf4a044\",\"name\":\"Rhys Fisher\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.cxtoday.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3f343531884f01a524078c0707db60820463a470a442a647423a53c783b60296?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3f343531884f01a524078c0707db60820463a470a442a647423a53c783b60296?s=96&d=mm&r=g\",\"caption\":\"Rhys Fisher\"},\"url\":\"https:\/\/www.cxtoday.com\/author\/rhys-fisher\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Zendesk\u2019s Infrastructure Is Being Exploited by Phishing & \u201cPig Butchering\u201d Scams - CX Today","description":"CX Today covers CRM &amp; Customer Data Management news including CCaaS and more.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cxtoday.com\/crm\/zendesks-saas-solutions-are-being-exploited-by-phishing-pig-butchering-scams\/","og_locale":"en_GB","og_type":"article","og_title":"Zendesk\u2019s Infrastructure Is Being Exploited by Phishing & \u201cPig Butchering\u201d Scams","og_description":"CX Today covers CRM &amp; Customer Data Management news including CCaaS and more.","og_url":"https:\/\/www.cxtoday.com\/crm\/zendesks-saas-solutions-are-being-exploited-by-phishing-pig-butchering-scams\/","og_site_name":"CX Today","article_publisher":"https:\/\/www.facebook.com\/CXTodayNews\/","article_published_time":"2025-01-22T15:10:59+00:00","article_modified_time":"2025-01-23T14:44:39+00:00","og_image":[{"width":850,"height":425,"url":"https:\/\/www.cxtoday.com\/wp-content\/uploads\/2025\/01\/Zendesk-phishing-pig-butchering.jpg","type":"image\/jpeg"}],"author":"Rhys Fisher","twitter_card":"summary_large_image","twitter_creator":"@cxtodaynews","twitter_site":"@cxtodaynews","twitter_misc":{"Written by":"Rhys Fisher","Estimated reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cxtoday.com\/crm\/zendesks-saas-solutions-are-being-exploited-by-phishing-pig-butchering-scams\/#article","isPartOf":{"@id":"https:\/\/www.cxtoday.com\/crm\/zendesks-saas-solutions-are-being-exploited-by-phishing-pig-butchering-scams\/"},"author":{"name":"Rhys Fisher","@id":"https:\/\/www.cxtoday.com\/#\/schema\/person\/8658137cddc02e8aa6da2b92ccf4a044"},"headline":"Zendesk\u2019s Infrastructure Is Being Exploited by Phishing &#038; \u201cPig Butchering\u201d Scams","datePublished":"2025-01-22T15:10:59+00:00","dateModified":"2025-01-23T14:44:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cxtoday.com\/crm\/zendesks-saas-solutions-are-being-exploited-by-phishing-pig-butchering-scams\/"},"wordCount":804,"publisher":{"@id":"https:\/\/www.cxtoday.com\/#organization"},"image":{"@id":"https:\/\/www.cxtoday.com\/crm\/zendesks-saas-solutions-are-being-exploited-by-phishing-pig-butchering-scams\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cxtoday.com\/wp-content\/uploads\/2025\/01\/Zendesk-phishing-pig-butchering.jpg","keywords":["CCaaS"],"articleSection":["CRM &amp; Customer Data Management"],"inLanguage":"en-GB","copyrightYear":"2025","copyrightHolder":{"@id":"https:\/\/www.cxtoday.com\/#organization"}},{"@type":"WebPage","@id":"https:\/\/www.cxtoday.com\/crm\/zendesks-saas-solutions-are-being-exploited-by-phishing-pig-butchering-scams\/","url":"https:\/\/www.cxtoday.com\/crm\/zendesks-saas-solutions-are-being-exploited-by-phishing-pig-butchering-scams\/","name":"Zendesk\u2019s Infrastructure Is Being Exploited by Phishing & \u201cPig Butchering\u201d Scams - CX Today","isPartOf":{"@id":"https:\/\/www.cxtoday.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cxtoday.com\/crm\/zendesks-saas-solutions-are-being-exploited-by-phishing-pig-butchering-scams\/#primaryimage"},"image":{"@id":"https:\/\/www.cxtoday.com\/crm\/zendesks-saas-solutions-are-being-exploited-by-phishing-pig-butchering-scams\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cxtoday.com\/wp-content\/uploads\/2025\/01\/Zendesk-phishing-pig-butchering.jpg","datePublished":"2025-01-22T15:10:59+00:00","dateModified":"2025-01-23T14:44:39+00:00","description":"CX Today covers CRM &amp; Customer Data Management news including CCaaS and more.","breadcrumb":{"@id":"https:\/\/www.cxtoday.com\/crm\/zendesks-saas-solutions-are-being-exploited-by-phishing-pig-butchering-scams\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cxtoday.com\/crm\/zendesks-saas-solutions-are-being-exploited-by-phishing-pig-butchering-scams\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.cxtoday.com\/crm\/zendesks-saas-solutions-are-being-exploited-by-phishing-pig-butchering-scams\/#primaryimage","url":"https:\/\/www.cxtoday.com\/wp-content\/uploads\/2025\/01\/Zendesk-phishing-pig-butchering.jpg","contentUrl":"https:\/\/www.cxtoday.com\/wp-content\/uploads\/2025\/01\/Zendesk-phishing-pig-butchering.jpg","width":850,"height":425,"caption":"Cyber Security Alert: Phishing Email with Hook Icon Illustrating Common Cyber Attack Methods"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cxtoday.com\/crm\/zendesks-saas-solutions-are-being-exploited-by-phishing-pig-butchering-scams\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cxtoday.com\/"},{"@type":"ListItem","position":2,"name":"CRM &amp; Customer Data Management"}]},{"@type":"WebSite","@id":"https:\/\/www.cxtoday.com\/#website","url":"https:\/\/www.cxtoday.com\/","name":"CX Today","description":"Customer Experience Technology News","publisher":{"@id":"https:\/\/www.cxtoday.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cxtoday.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.cxtoday.com\/#organization","name":"CX Today","url":"https:\/\/www.cxtoday.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.cxtoday.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cxtoday.com\/wp-content\/uploads\/2022\/03\/CX_Today_FullLogo.png","contentUrl":"https:\/\/www.cxtoday.com\/wp-content\/uploads\/2022\/03\/CX_Today_FullLogo.png","width":2606,"height":1154,"caption":"CX Today"},"image":{"@id":"https:\/\/www.cxtoday.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CXTodayNews\/","https:\/\/x.com\/cxtodaynews","https:\/\/www.linkedin.com\/company\/69192959\/","https:\/\/www.youtube.com\/channel\/UCZSpkvnZtjGc7UAP1r-MRoA"]},{"@type":"Person","@id":"https:\/\/www.cxtoday.com\/#\/schema\/person\/8658137cddc02e8aa6da2b92ccf4a044","name":"Rhys Fisher","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.cxtoday.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/3f343531884f01a524078c0707db60820463a470a442a647423a53c783b60296?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3f343531884f01a524078c0707db60820463a470a442a647423a53c783b60296?s=96&d=mm&r=g","caption":"Rhys Fisher"},"url":"https:\/\/www.cxtoday.com\/author\/rhys-fisher\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cxtoday.com\/wp-json\/wp\/v2\/posts\/66811","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cxtoday.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cxtoday.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cxtoday.com\/wp-json\/wp\/v2\/users\/4983"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cxtoday.com\/wp-json\/wp\/v2\/comments?post=66811"}],"version-history":[{"count":6,"href":"https:\/\/www.cxtoday.com\/wp-json\/wp\/v2\/posts\/66811\/revisions"}],"predecessor-version":[{"id":66893,"href":"https:\/\/www.cxtoday.com\/wp-json\/wp\/v2\/posts\/66811\/revisions\/66893"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cxtoday.com\/wp-json\/wp\/v2\/media\/66812"}],"wp:attachment":[{"href":"https:\/\/www.cxtoday.com\/wp-json\/wp\/v2\/media?parent=66811"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cxtoday.com\/wp-json\/wp\/v2\/categories?post=66811"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}