FraudHIGH

Fraud - Nordstrom's Email System Used for Crypto Scams

BCBleepingComputer·Reporting by Bill Toulas
Summary by CyberPings Editorial·AI-assisted·Reviewed by Rohit Rana
Ingested:
🎯

Basically, scammers used Nordstrom's email to trick customers into sending them cryptocurrency.

Quick Summary

Nordstrom's email system was compromised to send out fraudulent cryptocurrency scam emails. Customers received these deceptive messages, leading some to send money. The retailer is investigating the breach and advises customers to ignore the scam.

What Happened

Recently, customers of the upscale department store chain Nordstrom were targeted by a fraudulent email campaign. Scammers exploited Nordstrom's legitimate email system to send out messages that appeared to promote a St. Patrick's Day cryptocurrency promotion. The emails promised recipients a 200% return on any cryptocurrency sent to a specified wallet address within just two hours. This urgency aimed to pressure customers into acting quickly, often overlooking warning signs.

The emails were sent from an official Nordstrom address, nordstrom@eml.nordstrom.com, which added to the deception. Many customers reported receiving these emails, some to addresses that had never been exposed online. This indicates a significant security breach within Nordstrom's email system, potentially linked to a compromise involving Okta and Salesforce.

Who's Affected

The fraudulent emails reached a segment of Nordstrom's customer base, although it remains unclear how many individuals were impacted. Some recipients fell victim to the scam, sending a total of over $5,600 in cryptocurrency to the scammer's wallet. This incident highlights the risks associated with email communications, even when they appear to come from trusted sources.

Nordstrom, a retailer with millions of customers and annual revenues exceeding $15 billion, is now facing the fallout from this incident. Customers who received the emails were understandably alarmed, especially since the messages contained glaring errors, such as misspelling the company's name as “Normstorm.”

What Data Was Exposed

While specific personal data exposure details are not fully disclosed, the incident raises concerns about the integrity of customer information held by Nordstrom. The fact that the emails were sent from an official company address suggests that the email system was compromised. This could potentially allow unauthorized access to customer data, increasing the risk of further scams or phishing attempts.

Nordstrom has since issued a warning to its customers, advising them to disregard the fraudulent emails and emphasizing that the company will never request cryptocurrency transactions. They are actively investigating the breach and taking steps to secure their systems.

What You Should Do

If you received an email from Nordstrom promoting a cryptocurrency offer, it is crucial to ignore it. Do not send any funds or disclose sensitive information. Always verify promotions by visiting the official Nordstrom website or checking their verified social media channels.

Customers should remain vigilant about suspicious emails, even from known senders. Look for signs of phishing, such as incorrect spellings or unusual requests. If in doubt, contact Nordstrom directly through official channels to confirm any offers or communications. Staying informed and cautious can help protect you from falling victim to similar scams in the future.

🔒 Pro insight: This incident underscores the importance of securing third-party integrations, as breaches can exploit legitimate systems to conduct fraud.

Original article from

BCBleepingComputer· Bill Toulas
Read Full Article

Related Pings

HIGHFraud

Drift Hack - $285 Million Theft Linked to DPRK Operation

A major hack on Drift resulted in a staggering $285 million theft, linked to a six-month DPRK social engineering operation. This highlights the growing threat of state-sponsored cybercrime in the cryptocurrency sector. Organizations must enhance their security measures to prevent similar attacks.

The Hacker News·
HIGHFraud

Device Code Phishing - Attacks Surge 37 Times in 2026

Device code phishing attacks have skyrocketed this year, with a 37x increase. Users of IoT and streaming devices are particularly at risk. New phishing kits like EvilTokens are making these attacks easier for cybercriminals. Stay alert and protect your accounts.

BleepingComputer·
HIGHFraud

Job Scams - Coca-Cola and Ferrari Offers Are Traps

Scammers are impersonating Coca-Cola and Ferrari with fake job offers to steal your passwords. Job seekers are at high risk as these scams become more sophisticated. Protect your personal information by verifying job offers directly with companies.

Malwarebytes Labs·
HIGHFraud

FCC Proposes $4.5 Million Fine for Voxbeam's Fraudulent Calls

The FCC is proposing a hefty fine against Voxbeam for allowing fraudulent calls to reach American consumers. This could lead to stricter regulations on voice service providers. Stay alert to protect your personal information from scams.

The Record·
HIGHFraud

Windows Extortion Plot - Engineer Pleads Guilty to Charges

A former engineer has pleaded guilty to locking Windows admins out of servers in an extortion scheme. This incident underscores the risks of insider threats. Rhyne's actions could lead to a 15-year prison sentence. Companies must strengthen their cybersecurity measures to prevent similar attacks.

BleepingComputer·
MEDIUMFraud

Business Email Compromise - The New Threat Landscape Explained

A recent fraud attempt shows how business email compromise is evolving. Small organizations are now prime targets for these scams. Awareness is key to staying safe.

Cisco Talos Intelligence·