Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Operation malicious network supply software gets to NPM and Pypi ecosystems, focusing on millions worldwide

June 8, 2025

Extension of the malicious browser has infected 722 users across Latin America since the beginning of 2025

June 8, 2025

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Proofpoint’s email routing issue is being used to send millions of fake phishing emails
Global Security

Proofpoint’s email routing issue is being used to send millions of fake phishing emails

AdminBy AdminJuly 29, 2024No Comments6 Mins Read
Spoofed Phishing Emails
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


Fake phishing emails

An unknown threat actor has been linked to a massive fraud campaign that used email routing misconfigurations in email security vendor Proofpoint’s defenses to send millions of messages impersonating various popular companies such as Best Buy, IBM, Nike, and Walt Disney, among others. others.

“These emails originated from official Proofpoint authenticated email relays SPF and DKIM signaturesthus bypassing basic security measures – all in order to trick recipients and steal funds and credit card data.” – Guardio Labs researcher Nati Tal said in a detailed report shared with The Hacker News.

A cyber security company named the company EchoSpoofing. The activity is believed to have begun in January 2024, and the threat actor used the vulnerability to send an average of three million emails per day, peaking at 14 million in early June, when Proofpoint began taking countermeasures.

“The most unique and powerful part of this domain is the spoofing method, which leaves almost no chance to understand that it is a fake email sent by these companies,” Tal told the publication.

“This concept of EchoSpoofing is really powerful. It’s strange that it’s used for large-scale phishing like this, instead of a boutique phishing campaign, where an attacker can quickly get the identity of any real member of the company’s team and send emails to other employees – ultimately, through high-level social engineering, to gain access to internal data or credentials and even compromise the entire company.

The technique, which involves threat actors sending messages from an SMTP server to a virtual private server (VPS), is notable for its compliance with authentication and security measures such as SPF and DKIM, which stand for Sender Policy Framework and DomainKeys Identified Mail, respectively, and refer to authentication methods that are designed to prevent attackers from impersonating a legitimate domain.

Cyber ​​security

It boils down to the fact that these messages are routed from various Microsoft 365 tenants controlled by the adversary, which are then relayed through the email infrastructures of Proofpoint’s corporate clients to reach users of free email providers such as Yahoo!, Gmail, and GMX.

This is the result of what Guardio described as a “super-permissive misconfiguration flaw” in Proofpoint’s (“pphosted.com”) servers, which essentially allowed spammers to take advantage of the email infrastructure to send messages.

“The root cause is a modified email routing configuration feature on Proofpoint’s servers that allows outbound organization messages to be relayed from Microsoft 365 tenants, but without specifying which M365 tenants to allow,” – Proofpoint said in a coordinated disclosure report shared with The Hacker News.

“Any e-mail infrastructure that offers this e-mail routing configuration feature can be abused by spammers.”

Fake phishing emails

In other words, an attacker could use the flaw to set up fake Microsoft 365 tenants and deliver spoofed emails to Proofpoint’s relay servers, where they are “delivered” as genuine digital messages impersonating customer domains.

This, in turn, is accomplished by configuring the Exchange server’s outgoing email connector directly to the vulnerable pphosted.com endpoint associated with the client. Also, a hacked version of a legitimate email delivery software called PowerMTA used to send messages.

Fake phishing emails

“The spammer used a recurring series of virtual private servers (VPS) leased from multiple vendors, using many different IP addresses, to initiate rapid bursts of thousands of messages simultaneously from their SMTP servers, which are sent to Microsoft 365 for transmission to Proofpoint-hosted customer servers.” Proofpoint said.

“Microsoft 365 was receiving these spoofed messages and sending them to these customers’ email infrastructures for relaying. When customer domains were spoofed while relaying through the respective customer’s email infrastructure, the DKIM signature was also applied when messages passed through Proofpoint’s infrastructure, making spam messages more accessible.”

It is suspected that EchoSpoofing was deliberately chosen by the operators as a way to generate illegal income, and also as a way to avoid the risk of disclosure for long periods of time, as directly targeting companies with this modus operandi could dramatically increase the chances of being detected, effectively endangering the whole scheme.

At the same time, it is still unclear who is behind the company. Proofpoint said the activity does not intersect with any known threat or group.

“In March, Proofpoint researchers identified spam campaigns being transmitted through a small amount of Proofpoint customers’ email infrastructure, sending spam from Microsoft 365 tenants,” the statement said. “All analysis indicates that this activity was carried out by a single spam actor, whose activities we do not attribute to a known organization.”

“Since the discovery of this spam campaign, we have worked diligently to provide remedial guidance, including implementing an optimized administrative interface for customers to determine which M365 tenants are allowed to relay and all other M365 tenants are denied by default.”

Proofpoint stressed that no customer data was exposed and none experienced data loss as a result of these campaigns. He also noted that he contacted some of his customers directly to request that they change their settings to stop the outbound spam relay from being effective.

“As we began blocking the spammer’s activity, the spammer accelerated testing and quickly moved on to other customers,” the company said. “We have established a continuous process to identify affected customers every day, prioritizing coverage to fix configurations.”

To reduce spam, he urges VPS providers to limit their users’ ability to send large volumes of messages from SMTP servers hosted on their infrastructure. It also urges email service providers to restrict free trial options and newly created unverified tenants to bulk outbound email messages, and to prevent them from sending messages that impersonate a domain they have not verified ownership of.

“For CISOs, the key takeaway here is to pay close attention to your organization’s cloud posture, particularly with the use of third-party services that become the foundation of your company’s networking and communications practices,” Tal said. “Especially when it comes to email, always maintain feedback and self-monitoring – even if you completely trust your email provider.”

“As for other backbone companies like Proofpoint, they need to be vigilant and proactively address all possible types of threats. Not just threats that directly affect their customers, but the general public as well. good.

“This is critical to the security of us all, and the companies that build and operate the Internet’s core network, even if they are privately owned, bear the biggest responsibility. As has been said, in a completely different context, but very relevant here: “With great power comes great responsibility.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Operation malicious network supply software gets to NPM and Pypi ecosystems, focusing on millions worldwide

June 8, 2025

Extension of the malicious browser has infected 722 users across Latin America since the beginning of 2025

June 8, 2025

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025

Microsoft helps CBI disassemble the Indian Centers for Japanese Technical Support

June 6, 2025

Expand users’ capabilities and protect against Genai data loss

June 6, 2025

Why are more security leaders choose AEV

June 6, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Operation malicious network supply software gets to NPM and Pypi ecosystems, focusing on millions worldwide

June 8, 2025

Extension of the malicious browser has infected 722 users across Latin America since the beginning of 2025

June 8, 2025

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025

Microsoft helps CBI disassemble the Indian Centers for Japanese Technical Support

June 6, 2025

Expand users’ capabilities and protect against Genai data loss

June 6, 2025

Why are more security leaders choose AEV

June 6, 2025

New data Wiper Pathwiper Data Wiper violates Ukrainian critical infrastructure in 2025 attack

June 6, 2025

Popular Chrome Extensions API leaks, user data via HTTP and Hard Codes

June 5, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Operation malicious network supply software gets to NPM and Pypi ecosystems, focusing on millions worldwide

June 8, 2025

Extension of the malicious browser has infected 722 users across Latin America since the beginning of 2025

June 8, 2025

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.