What we can learn from the hack at Odido

odido hack

A wake-up call for identity security and CRM systems

It was recently announced that telecom provider Odido fell victim to a major hack. In the process, customer data was captured through a customer contact system. It involved millions of records including names, addresses and contact information. Many of our customers noticed that their data was also included in the hack.

This incident is not an isolated one. Globally, we are seeing a marked increase in attacks on CRM systems and cloud environments such as Salesforce. Not because those platforms are “insecure,” but because attackers are getting smarter about abusing identities.

What exactly happened? More importantly, what can we learn from this?

What happened?

In these types of incidents, the cause is usually not a technical leak in the platform itself. In many cases, it involves a so-called identity compromise.

This means that attackers cleverly manage to get login credentials or sessions of employees. This is often done through:

  • Phishing emails
  • Fake login pages
  • Social engineering (e.g. fake phone calls from “IT support”)
  • Hijacking active session tokens

Once an attacker has valid login credentials or an active session, he can often access CRM data undetected. And that is precisely where sensitive information resides.

Why are CRM systems so attractive?

A CRM system often contains the beating heart of an organization. Consider:

  • Customer data
  • Contact History
  • Contract Information
  • Internal notes
  • Integrations with other systems

For cybercriminals, this is worth its weight in gold. With this information, they can:

  • Run targeted phishing campaigns
  • Committing identity fraud
  • Blackmailing companies
  • Reselling data

The damage is then not only technical, but also legal and reputational. Under the AVG, a data breach can lead to mandatory reporting and possible fines. But just as important: customer trust comes under pressure.

What is the most important lesson?

At the heart of these types of attacks is almost always identity.

Not the firewall.

Not the CRM platform.

But access to accounts.

Traditional security is no longer enough. Today, a password and a simple SMS code offer too little protection against sophisticated phishing.

How do you better protect your organization?

These are the main measures we recommend:

1. Use phishing-resistant MFA.

Choose modern authentication methods such as hardware keys or FIDO2 instead of just text messages or push notifications.

2. Limit access rights

Give employees access only to what they really need. Fewer permissions means less risk.

3. Actively monitor for deviant behavior

Watch for strange login locations, unusual export actions or sudden large data movements.

4. Check integrations

CRM systems often have dozens of links. Old or unused integrations can be a weak spot.

5. Invest in security awareness

Employees remain an important link. Regular training helps to recognize phishing and social engineering more quickly.

What does this mean for your organization?

This incident shows that cloud can be secure provided identity and access are properly managed. Many organizations rely on their CRM and SaaS solutions, but regularly forget to critically assess the security of accounts, rights structure and integrations. Therein lies the very difference between “we have security” and “we are truly secure.”.

Want to know how your CRM environment is doing?

We help organizations to set up their Microsoft, Apple and SaaS environments securely and conveniently. With clear analyses, pragmatic advice and without unnecessary complexity. Want to know if your organization is well protected against these types of attacks? Feel free to contact us. We are happy to think along with you. Super logical right?

Recent blogs

apple business
Blog
Apple Business: Easier device management… but…
Managing laptops, smartphones, and tablets within your organization is becoming increasingly complex. Especially as employees work hybrid and you want to maintain control over security, updates, and usage. Apple is responding to this with Apple Business: a new platform designed to simplify device management. But the real question is: does this completely solve your challenges? The problem: growing number of devices, less oversight. Many SMEs recognize this: New employees receive devices that need to be set up manually. Apps and settings differ per user. Security is difficult to keep consistent. IT spends a lot of time on management and support. This leads to frustration,…
apple header
Blog
Apple 50 Years: 50 Years of Daring to Think Differently
This year, Apple celebrates its 50th anniversary. A milestone that cannot simply be overlooked. Because whether you are a fan or not: Apple has permanently changed the way we work, communicate, and create. At Analyst ICT, we are proud to be part of this ecosystem. As an Apple Technical Partner, we work daily with technology that is not only powerful but, above all, logical and pleasant to use. A different perspective on technology Apple has always distinguished itself by one simple conviction: technology should help people, not hinder them. No unnecessary complexity, but simplicity and ease of use. That aligns seamlessly...
browser password
Blog
Why saving passwords in your browser is not a good idea
The blog post below was created in response to a question during our engineering meeting. Every two weeks, we get together with all of our technical staff to discuss the latest developments in technology or with clients. Good client questions also arise during these meetings, such as this one. Time to do some research. Thank you, Wiebe! You've probably experienced this: you log in to a website, and your browser asks if it should remember your password. Convenient, fast, and you don't have to remember anything. However, there's a risk involved. In practice, we see that many security incidents start with something small. Like saving passwords…

A newsletter

Superlogic right?