Proofpoint configuration problem exploited in huge spam attacks

July 29, 2024 Proofpoint is a commercial email security service aimed at protecting organizations. However, until recently a threat actor was able to abuse Proofpoint relay servers to spoof authenticated emails that seemed to come from brand names like Disney+, Fox News, Coca-Cola, Nike, IBM and others.

Researchers at Guardio Labs call the technique echo spoofing, and say it has been sending millions of phony emails since January.

“These emails echoed from official Proofpoint email relays with authenticated SPF (Sender Policy Framework) and DKIM (DomainKeys Identified Mail, a method of email authentication that helps prevent impersonating a legitimate domain signatures) thus bypassing major security protections,” the researchers said in a report released Monday.

The goal: To deceive email recipients and steal funds and credit card details.

For example, a recipient would get an email that looked like it came from disney.com saying their Disney+ account had expired and asking them to take action. Clicking on the included link sends victims to a fake Disney page with a tempting offer.

Spoofing the “FROM” address is supposed to be almost impossible if corporate email servers are configured with SPF and DKIM. However, in this email campaign the unnamed threat actor was able to get their fake messages properly signed.

Briefly, the attacker took advantage of Proofpoint’s trust in emails coming from Microsoft Office365, and a flaw in Outlook365. In the Disney+ fake emails example, the messages came from an Office365 account. Normally a sender needs to provide proof to Microsoft it owns a domain used in the FROM or sending account. But not, apparently, if the email is being relayed by another service, like Proofpoint. For its part customers using Proofpoint can trust messages coming from Outlook365 – or, more accurately, a range of IP addresses — under a configuration option for hosted services. Those messages are trusted unless a special rule is added.

Guardio calls this a “super-permissive misconfiguration flaw.”

The attackers needed the specific hostname for each spoofed domain – for example, disney.com. But it’s not hard to find: Organizations set it in their publicly available mail exchange (MX) record.

A daily average of 3 million perfectly spoofed emails were sent this way, the researchers say.

Proofpoint, which had started tracking this campaign, was alerted by Guardio in May and notified customers of the configuration problem. “Once the campaign was spotted and Proofpoint customers started to patch and block this exploit, the threat actor realized the decline and started burning out assets — realizing “the end is near,” the report says.

On the other hand some compromised Office365 accounts are still active.

Top Stories

Related Articles

October 27, 2025 ESET researchers say North Korea’s Lazarus hacking group has launched a new wave of cyberattacks on defence more...

October 18, 2025 Public announcement systems at several airports in Canada and the United States were hijacked this week to more...

October 16, 2025 Canadian Tire Corp. Ltd. says a data breach in its e-commerce system exposed personal information from customers more...

October 7, 2025 LinkedIn has filed a federal lawsuit accusing a data-scraping company of creating more than a million fake more...

Jim Love

Jim is an author and podcast host with over 40 years in technology.

Share:
Facebook
Twitter
LinkedIn