• Hello and welcome! Register to enjoy full access and benefits:

    • Advertise in the Marketplace section for free.
    • Get more visibility with a signature link.
    • Company/website listings.
    • Ask & answer queries.
    • Much more...

    Register here or log in if you're already a member.

  • 🎉 WHV has crossed 14,000 monthly views and 157,000 clicks per month, as per Google Analytics! Thank you for your support! 🎉

Password Reset Hack Costs Clorox $400M – The Big Security Lesson

johny899

New Member
Content Writer
Messages
299
Reaction score
3
Points
23
Balance
$302.3USD
Ever thought a simple “forgot password” call could cost a company nearly $400 million? Sounds crazy, right? But that’s exactly what happened to Clorox after hackers executed a brilliant little trick with their help desk. It really makes me consider how often I casually reset my own passwords.

The Hack That Started With A Phone Call​

One of the members of a group named Scattered Spider executed a social engineering attack in August 2023. Instead of smashing through firewalls or releasing some ridiculous next-gen malware, they called Clorox’s outsourced help desk (which is run by Cognizant) and pretended to be locked-out employees.

The miserable part is the agents reset their passwords, and MFA should, without ever meaningfully verifying their identities. Imagine dialing in authentically and saying to the agent, “Hey, I am locked out, can you help me reset my login” and the agent replying, “Sure thing, buddy.”

The Damage That Followed​

Once the attackers had injection points, however, they got busy in escalating privileges, took the domain administrator rights, and propagated across Clorox’ systems in short order. The damage resulting from this incident is:

• $380M in total damage.
• About $49M just in remediation and
• The remainder in business-interruption loss.

For a company like Clorox, this is more than just a bad day in the office; this is financial Armageddon.

Why This Matters to Everyone​

Now, you’re probably thinking “Well, I don’t run a global corporation, so what do I care?” But here’s the kicker; this just shows that tiny cracks in human processes can often lead to large scale chaos.

Think about the accounts you own. Have you ever reused the same weak password? Have ever trusted someone too quickly? Hackers can take advantage of all of that; and it’s not always code, sometimes it’s simply asking nicely.

Lessons Learned (and What Companies Should Do)​

If I were running help desk, these fixes would be set in stone:

Out-of-band verification: Call back on official numbers or use one-time tokens.

Two-person approval: Major actions (e.g. resetting MFA) should require a secondary set of eyes.

Temporary suspension of access: In the event of suspicious activity, terminate admin access requests without undue delay.

Third-party audits: When outsourced support is a thing, ask how regularly they test/quantify against social engineering threats.

It sounds basic, right? And, missing these four steps will put you anywhere from zero to a factor of .5 billion ($0 to $400 million) behind.

The $400M Reminder​

This reflects a little more than a Clorox problem—it’s a wake-up call. Security is only as good as the humans stitching the latest and greatest into the loop. After all, if a hacker can just talk their way in, they don't always need the latest and greatest toolkits.