Unknown number of customers, $5,600+ in losses
On March 20, 2026, reports emerged that the official customer email system of the upscale retailer Nordstrom had been hijacked to launch a large-scale cryptocurrency scam. Attackers gained control of Nordstrom's email distribution, which is integrated with Salesforce Marketing Cloud and Okta for single sign-on, to send fraudulent emails from the legitimate nordstrom@eml.nordstrom.com address. The emails, which successfully bypassed spam filters, masqueraded as a St. Patrick's Day promotion and tricked customers into sending cryptocurrency to an attacker-controlled wallet. The incident highlights the growing threat of attackers compromising trusted third-party SaaS platforms to abuse a company's brand and communication channels.
This attack is a classic example of abusing a trusted relationship. Instead of trying to spoof a Nordstrom email address and likely getting caught by spam filters, the attackers compromised the actual system used to send legitimate emails.
T1078.004 - Valid Accounts: Cloud Accounts). This follows a pattern seen in recent attacks against other companies like Betterment and GrubHub, suggesting a campaign targeting misconfigured or weakly secured SaaS integrations.nordstrom@eml.nordstrom.com address, the attackers ensured high deliverability and credibility. The email would have passed SPF, DKIM, and DMARC checks, making it appear completely legitimate to both email security systems and end-users.The attack chain focuses on the compromise and misuse of legitimate cloud services.
T1219 - Remote Access Software). They crafted their scam message and sent it to a segment of Nordstrom's customer base.Enforce strong, phishing-resistant MFA on all cloud and SaaS accounts, especially administrative ones.
Apply the principle of least privilege within SaaS applications. Use approval workflows for high-impact actions like sending mass emails.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats