The Human Perimeter

Clorox lost $380 M when hackers duped a help‑desk agent. Discover how human error, not malware, drives breaches—and how to fortify your human perimeter.
Jul 29, 2025
The Human Perimeter

How a Simple Phone Call Cost Clorox $380 Million

Published 29 July 2025


1. The Breach That Didn’t Need a Hacker

In August 2023 a caller—linked to the Scattered Spider crew—rang Cognizant’s help‑desk, claimed to be a locked‑out Clorox employee, and was given fresh credentials on the spot. No malware. No zero‑day. Just an unverified request. Four months of disruption later, Clorox tallied USD 380 million in losses and is now suing Cognizant for gross negligence. (Reuters, Tom's Hardware, Cybersecurity Dive)


2. Why “The Human Perimeter” Matters

A firewall can’t stop an employee from believing a convincing voice on the phone.

The Clorox incident is a textbook reminder that security succeeds—or fails—at the human perimeter: the constellation of people, processes and culture that wrap around every security control.

Tech Control

Human Equivalent

MFA policy

Help‑desk agent who enforces (or bypasses) it

SIEM alert

Analyst who triages instead of ignores

Data‑loss rule

Marketing lead who resists pressure to “just email the file”


3. Anatomy of the Failure

  1. Help‑Desk Verification Gap – Internal policy required multi‑factor identity checks; agents skipped them. (Specops Software)

  2. Social Engineering Awareness – Attackers made multiple calls before landing the right agent, showing inconsistent staff training. (Hackread)

  3. Governance & Culture – Audit logs suggest no second‑eye approval for password resets—indicative of process drift. (BleepingComputer)

Key takeaway: attackers exploited behaviour, not software.


4. Counting the Cost

Category

Reported Impact

Direct remediation

USD 49 M (forensics, clean‑up) (Reuters)

Business interruption

~USD 330 M in lost shipments & shelf space (Medium)

Ongoing litigation

USD 380 M claim vs. Cognizant + legal fees (Tom's Hardware)


5. Your Quick Audit: Can You Say “Yes” to These?

  • Help Desk follows a scripted identity checklist—and managers spot‑check calls weekly.

  • Every employee completes social‑engineering drills at least quarterly.

  • Authority to override MFA is limited, logged and requires supervisor approval.

  • Table‑top exercises simulate live voice‑phishing, not just email phishing.

  • Reward culture: agents praised for stopping questionable requests, not for “fast ticket closure.”


6. Building a Human‑Centric Defense

Pillar

Practical Step

Training

Run voice‑phishing red‑team calls and publish results internally.

Governance

Embed dual‑control for privileged resets (NIST CSF PR.AC‑6).

Culture

CEO‑level messages that security > speed. Reward “good friction.”

Testing

Quarterly purple‑team to measure help‑desk social‑engineering resilience.


EU regulations now formalise “people & process” risk:

  • DORA Article 11 demands ICT incident response & reporting that covers human error.

  • NIS2 Article 21 calls for basic cyber‑hygiene and training for “essential entities.”

Clorox’s lawsuit is a preview: regulators will treat human‑process failure as negligence. (Financial Times)


8. Conclusion

Scattered Spider didn’t need a zero‑day. They needed one untrained person.

Your people are your strongest firewall—or your fastest breach.
Which one are you training them to be?


Further Reading

  1. Reuters – “Lawsuit says Clorox hackers got passwords simply by asking.” (Reuters)

  2. Tom’s Hardware – “IT provider sued after it simply handed the credentials to hackers.” (Tom's Hardware)

  3. Cybersecurity Dive – “Clorox files $380M suit blaming Cognizant for 2023 cyberattack.” (Cybersecurity Dive)

  4. Specops Software – “How a simple service desk attack cost Clorox millions.” (Specops Software)

  5. HackRead – “How Scattered Spider used fake calls to breach Clorox via Cognizant.” (Hackread)

  6. ComputerWeekly – “Scattered Spider victim Clorox sues help‑desk provider.” (Computer Weekly)


Need to harden your human perimeter?

#HumanPerimeter #SocialEngineering #CyberSecurity #DORA #NIS2 #ScatteredSpider

Share article

Trescudo Blog