The $400M Password Problem: Can You Get a New One?

▼ Summary
– Attackers from Scattered Spider compromised Clorox in August 2023 by repeatedly calling the outsourced service desk and convincing agents to reset passwords and MFA without proper verification.
– The breach resulted in approximately $380 million in damages for Clorox, including $49 million in remediation costs and significant business interruption losses.
– Social engineering tactics involved reconnaissance and scripted calls that mimicked legitimate users to pressure agents into skipping security protocols.
– Outsourcing the service desk amplified risks due to broad vendor privileges, process drift under high call volumes, and visibility gaps in logging and detection systems.
– Defenders should enforce out-of-band verification, require approval thresholds for high-risk resets, implement automated telemetry, and conduct regular audits and simulated attacks.
The staggering financial fallout from a single social engineering attack on Clorox underscores a critical vulnerability in modern cybersecurity: the service desk reset process. In August 2023, threat actors associated with the Scattered Spider group bypassed advanced security measures not through technical exploits, but by repeatedly calling an outsourced service desk, impersonating employees, and convincing agents to reset passwords and multi-factor authentication (MFA) settings. This simple yet effective tactic resulted in an estimated $380 million in damages, highlighting how human factors and procedural gaps can lead to catastrophic breaches.
Attackers executed their plan through careful reconnaissance and psychological manipulation. By gathering internal employee details and using scripted, convincing dialogue, they pressured service desk agents into skipping verification protocols. Legal documents indicate that frontline staff at Cognizant, Clorox’s service desk provider, performed credential resets without proper authentication, directly violating agreed-upon security procedures. What began as a single compromised account quickly escalated into widespread lateral movement across Clorox’s network, leading to operational paralysis.
The consequences were severe. Production systems were taken offline, manufacturing halted, and manual order processing led to significant shipment delays and reduced sales. Beyond immediate disruption, the company faced enormous remediation costs and long-term business impacts. This incident reinforces a troubling pattern identified by agencies like CISA: outsourced help desks are increasingly targeted due to their privileged access across multiple client environments. When verification processes are weak, these service desks become gateways for enterprise-wide compromise.
Several structural factors amplify risk in outsourced arrangements. Vendors often maintain broad administrative privileges and streamlined workflows, such as password and MFA resets, that, if misused, can affect entire organizations. High call volumes and ambiguous scripts can lead agents to prioritize quick resolutions over security, a phenomenon known as process drift. Additionally, visibility gaps often exist when third-party activity logs aren’t fully integrated into the client’s security monitoring systems, delaying threat detection.
To defend against such attacks, organizations must treat help desk resets as high-privilege operations. Implementing out-of-band verification, such as callbacks to registered numbers or cryptographic challenges, is essential. High-risk actions should require dual approval and trigger automatic notifications. Session isolation and temporary elevation can limit the damage of compromised credentials, while comprehensive logging and real-time alerting can identify suspicious patterns, like repeated resets from the same external number.
Contractual and operational governance plays an equally important role. Organizations should mandate that vendors demonstrate enforceable technical controls, including immutable audit trails and integration with client SIEM systems. Regular social engineering tests and red-team exercises can help identify weaknesses in both internal and vendor processes. Measuring and reducing the time between a suspicious reset and containment is often more effective than investing in isolated security upgrades.
Technology solutions can significantly reduce risk by automating verification and response. Platforms like Specops Secure Service Desk enforce deterministic caller authentication, maintain immutable logs, and integrate reset actions with ticketing systems. These tools help shrink the attacker’s window of opportunity and provide defenders with the visibility needed to respond rapidly.
Ultimately, while technology provides critical support, human factors remain central to security. Regular training, clear procedures, and continuous testing are necessary to ensure that service desk agents, whether in-house or outsourced, can resist social engineering attempts. In a landscape where a simple phone call can lead to hundreds of millions in losses, reinforcing human and procedural defenses is not optional, it’s imperative.
(Source: Bleeping Computer)





