HomeCyber BalkansProofpoint's Email Protection Allows Attackers to Send Millions of Phishing Emails

Proofpoint’s Email Protection Allows Attackers to Send Millions of Phishing Emails

Published on

spot_img

In a recent discovery by Guardio Labs, a serious vulnerability in Proofpoint’s email protection service has been uncovered. This vulnerability, known as “EchoSpoofing,” has the potential to be exploited by hackers to impersonate major brands like Disney and IBM, sending phishing emails that could steal money or private information from unsuspecting recipients. This flaw in Proofpoint’s email protection service is used by 87% of Fortune 100 companies, raising concerns about the potential impact of such an exploit.

Hackers have been utilizing phishing emails to deceive recipients into providing personal data such as usernames, passwords, credit card numbers, or social security numbers. This method preys on human emotions and trust, allowing threat actors to compromise accounts, steal identities, or disseminate malware with little technical skill.

In this phishing campaign, threat actors were able to bypass modern email security protocols by creating spoofed emails on their SMTP servers, relaying them through misconfigured Office 365 accounts, and exploiting Proofpoint’s permissive email flow settings. This allowed them to send millions of fully authenticated phishing emails impersonating major brands, tricking recipients and email security systems into thinking they were legitimate.

The goal of this campaign was to steal credit card information and other sensitive data through fake branded landing pages and offers. The attackers were able to send out about 3 million spoofed emails every day for two weeks, with a peak of 14 million emails. They frequently changed spoofed domains and infiltrated Office 365 accounts to avoid detection, impersonating well-known brands like Disney, IBM, Best Buy, and Nike.

Despite being made aware of this vulnerability in March, Proofpoint was only alerted by Guardio in May 2024. Together, they traced the phishing operations back, made customer notifications, reported compromised accounts to Microsoft and VPS providers, and implemented a new security measure using the X-OriginatorOrg header to mitigate further attacks.

As a result of this incident, Proofpoint updated its admin panel to include clearer risk descriptions and approval processes, emphasizing the importance of stronger default security configurations in email protection services. The complexity and scale of this phishing campaign demonstrate the evolving nature of cybersecurity threats and the need for proactive measures against large-scale attacks.

Overall, Proofpoint’s management of the EchoSpoofing challenge showcases a mature approach to risk management. By collaborating with partners like Guardio to implement effective, non-disruptive solutions, Proofpoint demonstrates a commitment to addressing cybersecurity risks and protecting its clients. The incident serves as a reminder of the constant vigilance required in the ever-changing landscape of cybersecurity threats.

Source link

Latest articles

VECT 2.0 Ransomware Permanently Destroys Files Larger than 131KB on Windows, Linux, and ESXi

Threat hunters have raised alarms regarding a new cybercriminal operation named VECT 2.0. Unlike...

Cybersecurity Professionals Feel Underappreciated

Growing Dissatisfaction Among Cybersecurity Professionals: A Call for Recognition and Support A recent report by...

More Fraudulent Extensions Associated with GlassWorm Discovered in Open VSX Code Marketplace

Security Risks of IDE Extensions: A Growing Concern for Developers In the evolving landscape of...

AI Governance Transitions from Theory to Practice

CIOs Navigate Growing Demands on Risk, Data, and Board Reporting in AI Governance In recent...

More like this

VECT 2.0 Ransomware Permanently Destroys Files Larger than 131KB on Windows, Linux, and ESXi

Threat hunters have raised alarms regarding a new cybercriminal operation named VECT 2.0. Unlike...

Cybersecurity Professionals Feel Underappreciated

Growing Dissatisfaction Among Cybersecurity Professionals: A Call for Recognition and Support A recent report by...

More Fraudulent Extensions Associated with GlassWorm Discovered in Open VSX Code Marketplace

Security Risks of IDE Extensions: A Growing Concern for Developers In the evolving landscape of...