Tuesday, June 24, 2025
  • Login
Whats Current In
Advertisement
  • Cyber Security
No Result
View All Result
  • Cyber Security
No Result
View All Result
Whats Current In
No Result
View All Result
Home Cyber Security

Proofpoint settings exploited to send millions of phishing emails daily

wcisrvadm by wcisrvadm
July 29, 2024
in Cyber Security
0
Proofpoint settings exploited to send millions of phishing emails daily
0
SHARES
0
VIEWS
Share on FacebookShare on Twitter

This post was originally published on this site

Phishing

A massive phishing campaign dubbed “EchoSpoofing” exploited now-fixed, weak permissions in Proofpoint’s email protection service to dispatch millions of spoofed emails impersonating big entities like Disney, Nike, IBM, and Coca-Cola, to target Fortune 100 companies.

The campaign started in January 2024, disseminating an average of 3 million spoofed emails daily and reaching a peak of 14 million emails in early June.

Volume of 'EchoSpoofing' email distribution
Volume of ‘EchoSpoofing’ email distribution
Source: Guardio Labs

The phishing emails were designed to steal sensitive personal information and incur unauthorized charges. They also included properly configured Sender Policy Framework (SPF) and Domain Keys Identified Mail (DKIM) signatures, making them appear authentic to the recipients.

Overview of the phishing attack
Overview of the phishing attack
Source: Guardio Labs

Guardio Labs helped discover the phishing campaign and security gap in Proofpoint’s email relay servers. In May 2024, they notified the firm and helped them fix it.

The EchoSpoofing campaign

To conduct the campaign, threat actors set up their own SMTP servers to create spoofed emails with manipulated headers and then relayed them through Proofpoint’s relay servers using compromised or rogue Microsoft Office 365 accounts.

The attackers used Virtual Private Servers (VPS) hosted by OVHCloud and Centrilogic to send those emails and used various domains registered through Namecheap.

Threat actor's infrastructure
Threat actor’s infrastructure
Source: Guardio Labs

The threat actors could pass SPF checks and send emails through Proofpoint’s servers due to a very permissive SPF record configured on domains by the email security services.

When configuring a domain to use Proofpoint’s email gateway, the company provides a configuration option to select the various email services through which you wish to allow email to be relayed.

When Office 365 is selected, an overly permissive SPF record was created, allowing any Office 365/Microsoft 365 account to relay email through Proofpoint’s secure email service.

include:spf.protection.outlook.com include:spf-00278502.pphosted.com

On the default setting, no specific accounts or tenants can be specified. Instead, Proofpoint trusted any Office 365 IP address range, meaning any account could use its relay.

For DKIM, when a company works with Proofpoint, it uploads its DKIM private keys to the platform so that emails flowing through the service are properly signed.

As the emails now passed both the DKIM and SPF checks, they were allowed to be delivered to inboxes without being flagged as spam.

Guardio Labs explains that major email platforms such as Gmail treated these emails as authentic, and instead of sending them to people’s spam folders, they delivered them to their inboxes.

Email headers from start to finish
Email headers from start to finish
Source: Guardio Labs

The emails featured lures related to the impersonated brand, claiming account expirations, or renewal/payment approval requests.

Sample email from the campaign
Sample email from the campaign
Source: Guardio Labs

Proofpoint tightens security

In a coordinated report from Proofpoint, the company says they had been monitoring this campaign since March,

With the technical IOCs shared by Guardio, Proofpoint was further able to mitigate these attacks and provide new settings and advice on how to prevent them in the future.

The company has a detailed guide on how users can add anti-spoof checks and tighten up their email security, but some organizations didn’t perform any of those manual actions to prevent abuse, allowing campaigns like EchoSpoofing to materialize.

Proofpoint reached out to customers with permissive settings to help them secure the configuration of their accounts.

The company introduced the ‘X-OriginatorOrg’ header to help verify the email source and filter out non-legitimate and unauthorized emails.

Also, a new Microsoft 365 onboarding configuration screen allows customers to configure more restrictive permissions on Microsoft 365 connectors. These permissions specify the Microsoft 365 tenants that can be relayed through Proofpoint’s servers.

New filter (top) and onboarding screen (bottom)
New filter (top) and onboarding screen (bottom)
Source: Guardio Labs

Finally, Proofpoint has notified affected customers that phishing actors successfully abused their brands in a large-scale operation.

Although Microsoft has also been notified about the Microsoft 365 abuse, the offending accounts remain active, some for over seven months.


Previous Post

Proofpoint Email Routing Flaw Exploited to Send Millions of Spoofed Phishing Emails

Next Post

7 Sessions Not to Miss at Black Hat USA 2024

wcisrvadm

wcisrvadm

Next Post

7 Sessions Not to Miss at Black Hat USA 2024

Recent Posts

  • New FileFix attack weaponizes Windows File Explorer for stealthy commands
  • Researchers Find Way to Shut Down Cryptominer Campaigns Using Bad Shares and XMRogue
  • How Today’s Pentest Models Compare and Why Continuous Wins
  • How the US Military Is Redefining Zero Trust
  • US House bans WhatsApp on staff devices over security concerns

Recent Comments

No comments to show.

Archives

  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024

Categories

  • Cyber Security

Browse by Category

  • Cyber Security
  • About
  • Advertise
  • Privacy & Policy
  • Contact

© 2025 JNews - Premium WordPress news & magazine theme by Jegtheme.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Cyber Security

© 2025 JNews - Premium WordPress news & magazine theme by Jegtheme.