$380m Lawsuit Claims Intruder Got Clorox’s Passwords From Cognizant Simply Byasking

Clorox is suing its service desk provider, Cognizant, for $380 million in a California state court, alleging the IT support crew “enabled a cybercriminal to gain a foothold in Clorox’s network” by handing over staffers’ passwords to attackers after they simply requested them.

Someone holding up two bottles of Clorox in a store

Clorox cleans up IT security breach that soaked its biz ops

READ MORE

Clorox filed a complaint yesterday alleging breach of contract and negligence, among other things, and claimed Cognizant’s “failures” ultimately led to a “catastrophic cyberattack” against the bleach maker in 2023, which it claims caused “devastating disruptions to Clorox’s systems and operations.” You can read the partially redacted 19-page complaint [PDF] here.

According to the lawsuit, Cognizant operated a service desk for Clorox and provided IT support for Clorox staffers, “including employee credential recovery when needed.” It adds the pair first signed a contract more than a decade ago, in 2013, with updates to the services agreement along the way.

The bleach maker is claiming Cognizant failed to follow its “straightforward procedures” for providing credential recovery or reset assistance.

Clorox alleges in the suit that its internal service desk manager requested an updated credential support procedure in February 2023, several months before the August 2023 cyberattack, and after some pestering, claims that Cognizant’s Service Desk Lead “responded and confirmed that the credential support procedures action item had been completed with the comment ‘Educated the team,’ in past tense.”

“Cognizant Agents’ calls with the cybercriminal exposed that this was a blatant lie,” the complaint goes on to allege.

The filing claims:

Cognizant was not duped by any elaborate ploy or sophisticated hacking techniques. The cybercriminal just called the Cognizant Service Desk, asked for credentials to access Clorox’s network, and Cognizant handed the credentials right over. Cognizant is on tape handing over the keys to Clorox’s corporate network to the cybercriminal – no authentication questions asked:

Cybercriminal: I don’t have a password, so I can’t connect.

Cognizant Agent: Oh, ok. Ok. So let me provide the password to you ok?

Cybercriminal: Alright. Yep. Yeah, what’s the password?

Cognizant Agent: Just a minute. So it starts with the word “Welcome…”

According to the suit, Clorox’s updated procedures for responding to network credential support requests meant that, upon receiving a network password reset request from a Clorox employee, service agents were supposed to “guide the employee toward using Clorox’s verification and self-reset password tool, MyID; or if MyID was not available, to verify the employee’s identity by (a) manager name and MyID user name before resetting the employee’s password, along with (b) required confirmation emails to the employee’s Clorox email account and to the relevant manager after a reset.”

The company alleges these weren’t followed during the attack, claiming an agent working at Cognizant’s Service Desk reset access “for Okta,” the identity management tool Clorox used to authenticate access to its network, when an attacker called posing as the staffer on August 11, 2023. Clorox claims the service agent asked the attacker to connect to Clorox’s VPN, but the intruder allegedly protested they couldn’t without a password. The filing claims the service agent then reset the Okta access without any further questioning or identity verification, “in direct violation of Clorox’s credential support procedures.”

The attacker then asked to have their Microsoft MFA credentials reset, which the service agent allegedly did “multiple times without any identity verification at all.”

Clorox further alleges in the filing that “at no point did the Agent send the required emails to the employee or the employee’s manager to alert them of the password reset.”

The lawsuit claims the attacker also asked to reset the phone number associated with that staffer – the complaint calls them “Employee 1” – for SMS MFA.

Clorox alleges: “The cybercriminal used Employee 1’s compromised credentials to log into and gather information from the Clorox network. The cybercriminal then was able to target the credentials of Employee 2, who worked in IT security.”

Despite managing to flush the attacker from its environment “within three hours from the cybercriminal’s initial activity,” Clorox claims the cyberattack caused “devastating” disruptions to its operations after it had to yank its systems offline to avoid further escalation, which meant it had to pause manufacturing, and rely on manual order processing methods for “weeks,” resulting in product shortages for customers and “significant lost sales.”

It also took its IT support partner to task for its post-incident response, alleging that when Clorox urgently requested that Cognizant reinstall a “critical cybersecurity tool that the cybercriminal had uninstalled… Cognizant took over an hour to complete a task that should have taken less than 15 minutes.” It further claims that database recovery, IP address lists, and account shutdowns weren’t handled properly. It’s seeking $380 million in damages and a jury trial.

The $16 billion market cap bleach maker made $7 billion in revenues last year, and its brand encompasses everything from ubiquitous disinfectant to charcoal briquettes, cat litter, and trash bags, to Hidden Ranch salad dressing.

The Register asked Cognizant to comment on the lawsuit and a spokesperson sent us a statement:

“It is shocking that a corporation the size of Clorox had such an inept internal cybersecurity system to mitigate this attack. Clorox has tried to blame us for these failures, but the reality is that Clorox hired Cognizant for a narrow scope of help desk services which Cognizant reasonably performed. Cognizant did not manage cybersecurity for Clorox.” ®


Original Source


A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.