HomeCyber BalkansPhishers used Proofpoint weakness to send spoof emails impersonating IBM, Nike, and...

Phishers used Proofpoint weakness to send spoof emails impersonating IBM, Nike, and others

Published on

spot_img

In a surprising turn of events, Guardio recently uncovered a sophisticated email phishing scheme that left cybersecurity experts scratching their heads. The phishing emails in question were traced back to an SMTP virtual server connected to Office365 Online Exchange before being redirected to a domain-specific relay server managed by Proofpoint.

Upon closer inspection, Guardio discovered that the final Proofpoint server was able to authenticate the emails using DKIM and SPF protocols, giving the appearance of legitimacy as they were relayed on behalf of the customers. This loophole allowed the phishing emails to slip through undetected, posing a significant security risk to unsuspecting recipients.

This elaborate scheme, dubbed “EchoSpoofing” by Guardio, involved two key components. The first step was to circumvent the SPF IP-to-domain check by sending spoofed emails from an SMTP server under the cybercriminals’ control through an Office365 account. By leveraging this method, the attackers were able to bypass the security measures put in place to prevent email spoofing from Office365 accounts, ultimately evading detection.

What made this phishing campaign particularly alarming was its ability to deceive both individuals and organizations, as the fraudulent emails appeared to be coming from trusted sources. Guardio’s investigation highlighted the need for enhanced email security measures to combat increasingly sophisticated cyber threats like “EchoSpoofing.”

As the cybersecurity landscape continues to evolve, it is crucial for businesses and individuals alike to remain vigilant and proactive in safeguarding their sensitive information. Implementing robust email security protocols, such as multi-factor authentication and regular phishing awareness training, can help mitigate the risks associated with malicious email attacks.

Guardio’s discovery serves as a stark reminder of the ever-present threat posed by cybercriminals and the importance of staying informed and educated on the latest cybersecurity trends. By staying one step ahead of potential threats and taking proactive measures to bolster email security, individuals and organizations can reduce their susceptibility to phishing attacks and other malicious activities.

In conclusion, Guardio’s investigation into the “EchoSpoofing” phishing scheme sheds light on the need for continued vigilance and diligence in protecting against evolving cyber threats. By remaining alert and proactive in implementing robust security measures, we can effectively safeguard against malicious email attacks and mitigate the potential risks associated with cybercrime.

Source link

Latest articles

VECT 2.0 Ransomware Permanently Destroys Files Larger than 131KB on Windows, Linux, and ESXi

Threat hunters have raised alarms regarding a new cybercriminal operation named VECT 2.0. Unlike...

Cybersecurity Professionals Feel Underappreciated

Growing Dissatisfaction Among Cybersecurity Professionals: A Call for Recognition and Support A recent report by...

More Fraudulent Extensions Associated with GlassWorm Discovered in Open VSX Code Marketplace

Security Risks of IDE Extensions: A Growing Concern for Developers In the evolving landscape of...

AI Governance Transitions from Theory to Practice

CIOs Navigate Growing Demands on Risk, Data, and Board Reporting in AI Governance In recent...

More like this

VECT 2.0 Ransomware Permanently Destroys Files Larger than 131KB on Windows, Linux, and ESXi

Threat hunters have raised alarms regarding a new cybercriminal operation named VECT 2.0. Unlike...

Cybersecurity Professionals Feel Underappreciated

Growing Dissatisfaction Among Cybersecurity Professionals: A Call for Recognition and Support A recent report by...

More Fraudulent Extensions Associated with GlassWorm Discovered in Open VSX Code Marketplace

Security Risks of IDE Extensions: A Growing Concern for Developers In the evolving landscape of...