...

Deep Code

contact@decodecybercrime.com

When Help Desks Hurt: How Freshdesk Credential Compromises Become a Silent Breach Vector

When Help Desks Hurt: How Freshdesk Credential Compromises Become a Silent Breach Vector

In our ongoing analysis of triage systems such as Zendesk, Freshdesk, Zoho, and Jira, we continue to uncover how customer service platforms—essential tools for modern business—can unintentionally act as gateways for cyberattacks. These platforms, often outsourced or cloud-managed, are frequent entry points for infostealer malware targeting employees, partners, and customers alike.

This article focuses specifically on Freshdesk, a widely adopted support system, by examining credential compromises linked to its use across dozens of organizations. Our investigation is supported by Infostealers.info—an open-source intelligence (OSINT) platform that aggregates credential logs, metadata, and infection patterns from infostealer malware campaigns. It enables cybersecurity teams and investigators to track compromised identities, understand exposure surfaces, and connect seemingly isolated infections to broader threat actor ecosystems.

Top Organizations Compromised via Freshdesk

Customer Sector Total Infections
Poloniex Cryptocurrency Exchange 3,460
boAt Consumer Electronics 3,194
AdGate Media User Acquisition & Monetization 1,874
Hikvision AIoT & Security Systems 1,811
Exabytes Group Global Cloud Services 1,070
Genesis Mining Cryptocurrency Mining 997
CoinPay Digital Payments 844
Coinomi Blockchain Services 493
Lionbridge Games Game Localization & QA 474
Futureadpro Online Marketing 423
Telus Telecommunications 413
Gamersfy Social Network / Gaming 366
Delivery Hero Online Food Delivery 332
International Marketing Group Multi-Level Marketing 299
Meesho E-Commerce (India) 158
Parks S/A Digital Communications Telecommunications (Brazil) 142
SERMIG (Chile Govt) National Migration Office 128
Transsnet Digital Services (Music, Fintech) 115

Top Compromised Freshdesk URLs

The table below outlines the most affected Freshdesk subdomains and login paths, based on the volume of infostealer-related infections. This data provides actionable insight for red-teams and defenders prioritizing risk exposure across third-party help desk platforms.

Customer Freshdesk URL # of Infections
Poloniex https://poloniex.freshdesk.com/support/login 984
https://poloniex.freshdesk.com 653
boAt https://imaginemarketing.freshdesk.com 602
https://imaginemarketing.freshdesk.com/support/login 357
Hikvision https://hikvisionlatam.freshdesk.com 244
https://hikvisionlatam.freshdesk.com/es/support/login 146
https://hikvisionlatam.freshdesk.com/support/login 55
AdGate Media https://adgatemedia.freshdesk.com 292
https://adgatemedia.freshdesk.com/support/login 246
CoinPay https://coinpay.freshdesk.com/support/login 173
https://coinpay.freshdesk.com 158
Genesis Mining https://genesismining.freshdesk.com 178
https://genesismining.freshdesk.com/support/login 211
Exabytes Group https://exabytes.freshdesk.com 170
Lionbridge Games https://lionbridgegsmi.freshdesk.com/support/login 132
Meesho https://meeshodesk.freshdesk.com/support/login 69
Futureadpro https://futureadpro.freshdesk.com/support/login 67
Telus https://teluspdo.freshdesk.com/support/login 65
Gamersfy https://gamersfy.freshdesk.com/support/login 65
Parks S/A Digital Communications https://atendimentoparks.freshdesk.com/support/login 64
Coinomi https://coinomi.freshdesk.com 60
Transsnet https://transsnet.freshdesk.com/ 58
International Marketing Group https://imgcorp.freshdesk.com/support/login 58
SERMIG (Gov. of Chile) https://sernamig.freshdesk.com/es/support/tickets/new 57
Delivery Hero https://deliveryhero-sa.freshdesk.com/login/normal 55

Freshdesk Compromises by Email Provider

The chart below highlights the distribution of Freshdesk login compromises based on the associated email provider. This breakdown offers insight into which providers are most commonly linked to infostealer infections involving Freshdesk portals. The prevalence of certain providers may reflect user base size, password reuse habits, or regional adoption trends—all of which can inform targeted security measures and awareness efforts.

Risk Exposure Case Study I: RADIANCE Energy (IKAROS Solar)

RADIANCE Energy, formerly IKAROS Solar, is a European solar power leader that develops and operates photovoltaic systems. They rely on Freshdesk for customer support. Through Infostealers.info, we identified two compromised emails associated with ikarossolaresc.freshdesk.com—one linked to a former employee and another still active. By pivoting on the latter’s stealer log, we surfaced additional personal and potentially sensitive data, illustrating the downstream risk of support portal compromise.

Risk Exposure Case Study II: Compromised Bank Employees

Infostealer infections tied to Freshdesk portals used by financial institutions reveal direct risk to bank personnel. By tracing login emails, we confirmed several banks had employee credentials compromised. In some cases, an extra security layer appeared via integration with third-party cybersecurity firms, showing mixed levels of defense maturity. A full table of affected financial institutions follows below.

Bank Name Country Compromised via Subdomain # Compromised  Employees
OwnBank Philippines ownbank.freshdesk.com 2
Steward Bank Zimbabwe stewardbankhelp.freshdesk.com 2
SoftBank Japan aidosmarket.freshdesk.com 2
KBZ Bank Myanmar kbzbank64189777108652853.freshdesk.com 2
Discount Bank Israel bulwarx.freshdesk.com 1
Türkiye İş Bankası Turkey alternateam.freshdesk.com 1
Optima bank Greece pronetdesk.freshdesk.com 1
Kbank Brazil kbank.freshdesk.com 1
Manila Bankers Life and General Assurance. Philippines manilabankerslife.freshdesk.com 1
Jana Small Finance Bank India securax.freshdesk.com 1
Wema Bank Nigeria wemabank.freshdesk.com 1
Bank Islam Malaysia Berhad Malaysia valuefy.freshdesk.com 1

Risk Exposure Case Study III: Visma/Zetech & Customer Intel Leakage

Visma, a major Norwegian software firm, acquired Zetech in 2020 to expand their HR cloud offerings in Latin America. However, our analysis reveals 54 compromised logins to zetechsa.freshdesk.com between December 2022 and June 2025. While most M&A due diligence overlooks credential leakage, infostealer data revealed exposure not only for internal staff—but also for customer organizations.

Identified client emails included:

  • Farmacias Central Oeste (Argentina)
  • MGM Australia Limited (Australia)
  • Los Soles Internacional (Argentina)
  • Agired (Uruguay)

This case underscores a key insight: infostealer logs are not just a cybersecurity problem—they’re also a competitive intelligence and M&A risk.

Key Takeaways from Infostealers.info

Infostealers.info goes beyond raw breach data—it uncovers patterns of compromise, exposure points, and human error across organizations. By aggregating credential logs, metadata, and infection timelines, it empowers investigators and cybersecurity teams to:

  • Map risk surfaces across support systems like Freshdesk, Zendesk, and other help desk systems
  • Reveal insider exposure, supply chain risk, and customer intel leaks
  • Trace repeated infections linked to poor password hygiene or shared infrastructure.
administrator

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Seraphinite AcceleratorOptimized by Seraphinite Accelerator
Turns on site high speed to be attractive for people and search engines.