Unknown number of customers, $5,600+ in losses
On March 20, 2026, reports emerged that the official customer email system of the upscale retailer Nordstrom had been hijacked to launch a large-scale cryptocurrency scam. Attackers gained control of Nordstrom's email distribution, which is integrated with Salesforce Marketing Cloud and Okta for single sign-on, to send fraudulent emails from the legitimate nordstrom@eml.nordstrom.com address. The emails, which successfully bypassed spam filters, masqueraded as a St. Patrick's Day promotion and tricked customers into sending cryptocurrency to an attacker-controlled wallet. The incident highlights the growing threat of attackers compromising trusted third-party SaaS platforms to abuse a company's brand and communication channels.
This attack is a classic example of abusing a trusted relationship. Instead of trying to spoof a Nordstrom email address and likely getting caught by spam filters, the attackers compromised the actual system used to send legitimate emails.
T1078.004 - Valid Accounts: Cloud Accounts). This follows a pattern seen in recent attacks against other companies like Betterment and GrubHub, suggesting a campaign targeting misconfigured or weakly secured SaaS integrations.nordstrom@eml.nordstrom.com address, the attackers ensured high deliverability and credibility. The email would have passed SPF, DKIM, and DMARC checks, making it appear completely legitimate to both email security systems and end-users.The attack chain focuses on the compromise and misuse of legitimate cloud services.
T1219 - Remote Access Software). They crafted their scam message and sent it to a segment of Nordstrom's customer base.Enforce strong, phishing-resistant MFA on all cloud and SaaS accounts, especially administrative ones.
Apply the principle of least privilege within SaaS applications. Use approval workflows for high-impact actions like sending mass emails.
Reports emerge that Nordstrom's email system was compromised to send cryptocurrency scams.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.